What is the ip address and tcp port number

Assignment Help Computer Networking
Reference no: EM13949320

Assist me with LAB assignment using Wireshark network analyses Software tool.

Perform the instructions in the LAB document and provide a screenshot of the results from the Wireshark SW tool, and provide explanations to questions asked in the LAB workIn this lab, we'll investigate the behavior of the celebrated TCP protocol in detail. We'll do so by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the text of Lewis Carrol's Alice's Adventures in Wonderland) from your computer to a remote server. We'll study TCP's use of sequence and acknowledgement numbers for providing reliable data transfer; we'll see TCP's congestion control algorithm - slow start and congestion avoidance - in action; and we'll look at TCP's receiver-advertised flow control mechanism. We'll also briefly consider TCP connection setup and we'll investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server.

1. Capturing a bulk TCP transfer from your computer to a remote server

If you are unable to run Wireshark on a live network connection, you can download a packet trace file that was captured while following the steps above on one of the author's computers . You may well find it valuable to download this trace even if you've captured your own trace and use it, as well as your own trace, when you explore the questions below.

2. A first look at the captured trace

Before analyzing the behavior of the TCP connection in detail, let's take a high level view of the trace.

• First, filter the packets displayed in the Wireshark window by entering "tcp" (lowercase, no quotes, and don't forget to press return after entering!) into the display filter specification window towards the top of the Wireshark window.

What you should see is series of TCP and HTTP messages between your computer and gaia.cs.umass.edu. You should see the initial three-way handshake containing a SYN message. You should see an HTTP POST message. Depending on the version of Wireshark you are using, you might see a series of "HTTP Continuation" messages being sent from your computer to gaia.cs.umass.edu. Recall from our discussion in the earlier HTTP Wireshark lab, that is no such thing as an HTTP Continuation message - this is Wireshark's way of indicating that there are multiple TCP segments being used to carry a single HTTP message. In more recent versions of Wireshark, you'll see "[TCP segment of a reassembled PDU]" in the Info column of the Wireshark display to indicate that this TCP segment contained data that belonged to an upper layer protocol message (in our case here, HTTP). You should also see TCP ACK segments being returned from gaia.cs.umass.edu to your computer.

Answer the following questions, by opening the Wireshark captured packet file tcp-ethereal-trace-1 in https://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip (that is download the trace and open that trace in Wireshark; see footnote 2). Whenever possible, when answering a question you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? To answer this question, it's probably easiest to select an HTTP message and explore the details of the TCP packet used to carry this HTTP message, using the "details of the selected packet header window" (refer to Figure 2 in the "Getting Started with Wireshark" Lab if you're uncertain about the Wireshark windows.

2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection?

If you have been able to create your own trace, answer the following question:

3. What is the IP address and TCP port number used by your client computer (source) to transfer the file to gaia.cs.umass.edu?

TCP Basics

Answer the following questions for the TCP segments:

4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment?

5. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment?

6. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you'll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a "POST" within its DATA field.

7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection. What are the sequence numbers of the first six segments in the TCP connection (including the segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for each segment received? Given the difference between when each TCP segment was sent, and when its acknowledgement was received, what is the RTT value for each of the six segments? What is the EstimatedRTT value (see Section 3.5.3, page 239 in text) after the receipt of each ACK? Assume that the value of the EstimatedRTT is equal to the measured RTT for the first segment, and then is computed using the EstimatedRTT equation on page 239 for all subsequent segments.

Note: Wireshark has a nice feature that allows you to plot the RTT for each of the TCP segments sent. Select a TCP segment in the "listing of captured packets" window that is being sent from the client to the gaia.cs.umass.edu server. Then select: Statistics->TCP Stream Graph->Round Trip Time Graph.

8. What is the length of each of the first six TCP segments?

9. What is the minimum amount of available buffer space advertised at the received for the entire trace? Does the lack of receiver buffer space ever throttle the sender?

10. Are there any retransmitted segments in the trace file? What did you check for (in the trace) in order to answer this question?

11. How much data does the receiver typically acknowledge in an ACK? Can you identify cases where the receiver is ACKing every other received segment (see Table 3.2 on page 247 in the text).

12. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value.

Answer the following questions for the TCP segments the packet trace tcp-ethereal-trace-1 in https://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip

13. Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence number versus time plot of segments being sent from the client to the gaia.cs.umass.edu server. Can you identify where TCP's slowstart phase begins and ends, and where congestion avoidance takes over? Comment on ways in which the measured data differs from the idealized behavior of TCP that we've studied in the text.

14. Answer each of two questions above for the trace that you have gathered when you transferred a file from your computer to gaia.cs.umass.edu

Attachment:- Wireshark TCP.rar

Reference no: EM13949320

Questions Cloud

Federal-state laws that are intended to promote competition : Give an example of a recent regulatory reform or change in federal or state laws that are intended to promote competition among financial intermediaries and how they are to do so. Within your discussion, provide an analysis of how market forces, such..
About the causal link between smoking marijuana : In a Chapter discussion about the causal link between smoking marijuana and using other illegal drugs, sociologist Erich Goode distinguished between two schools of thought that should be looked at when considering and researching whether marijuana..
How many different products are there in the hospital : How many different products are there in the hospital? How do you assign the costs of the support departments to individual products?
Dividends are expected to grow-what is projected dividend : ACME is growing fast. Dividends are expected to grow at 30% per year during the next 3 years, 18 % over the following year, and then 8% per year indefinitely. The discount rate is 13%, and the stock currently sells for $65 per share. What is the proj..
What is the ip address and tcp port number : What is the IP address and TCP port number used by the client computer that is transferring the file - What is the IP address and TCP port number used by your client computer to transfer the file to gaia.cs.umass.edu?
Repurchasing all of the outstanding shares : ACME is a very cyclical type of business which is reflected in its dividend policy. The firm pays a $2.00 a share dividend every other year. The last dividend was paid last year. Five years from now, the company is repurchasing all of the outstanding..
How each influence the design of the logical database model : Your supervisor requested a short memo identifying each of the five W's and the H (Who, What, Where, When, Why, and How) and how each could influence the design of the logical database model. Compose an 600-word e-mail to your supervisor.
Why do we use foretasted cash flows instead : Why do we use foretasted cash flows instead of foretasted accounting earnings in estimating the NPV of a project?
Introduce new portable camper to fill out its product line : Winnebagel Corp. currently sells 23,000 motor homes per year at $61,000 each, and 8,500 luxury motor coaches per year at $98,000 each. The company wants to introduce a new portable camper to fill out its product line; it hopes to sell 18,000 of these..

Reviews

Write a Review

Computer Networking Questions & Answers

  Analyze the benefits of bpm mashups in terms of composition

a web service is a set of technologies used for exchanging data between applications. web services allow businesses to

  Encapsulate ftp datagram into tcp datagram

Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)

  Question 1a there are two analysis techniques in reverse

question 1a there are two analysis techniques in reverse engineering for mobile apps static and dynamic.i set apart

  Your company produces a product that weighs 750 gramsthe

your company produces a product that weighs 750 grams.the weight specification for the packaging container is lt 50

  Which leading vendor monitoring package would you select

you are working as the network administrator in abc technologies. your companys network has been experiencing many

  What would have been the state of enterprise-wide networks

Describe the process of how one would distribute network protocols on the network. In the absence of SNMP and Remote Monitoring (RMON) protocols, what would have been the state of enterprise-wide networks

  What is the name of the of the hand-held device thatnbsp

what is the name of the of the hand-held device thatb ups drivers use? how does it integrate with the ups erp system?no

  Generally the receiver in the tcp flow control scheme sends

normally the receiver in the tcp flow control scheme sends back ack packets with the sequence number that it is

  Case study - nibcos: big bang

Demonstrate the tradeoffs between Big Bang versus slower ERP implementation approaches that allow time for organizational learning.

  The tcpip protocol suite appears to have no equivalents to

1.the tcpip protocol suite appears to have no equivalents to the osi session and presentation layers. how are the

  Implement cipher-combining ascii representation of plaintext

Particular cipher is implemented by combining ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using XOR function.

  The law of diminishing returns

The law of diminishing returns says that you get a smaller and smaller return (benefit) as you invest more and more. An example would be: if you spend $100 on insulating your home

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd