What is the maximum number of bytes

Assignment Help Basic Computer Science
Reference no: EM13768927

The Assignment

Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets. It's also likely that just by doing nothing (except capturing packets via Wireshark) that some UDP packets sent by others will appear in your trace. In particular, the Simple Network Management Protocol (SNMP) sends SNMP messages inside of UDP, so it's likely that you'll find some SNMP messages (and therefore UDP packets) in your trace.

After stopping packet capture, set your packet filter so that Wireshark only displays the UDP packets sent and received at your host. Pick one of these UDP packets and expand the UDP fields in the details window. If you are unable to find UDP packets or are unable to run Wireshark on a live network connection, you can download a packet trace containing some UDP packets.

Whenever possible, when answering a question below, you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout3 to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn't look in the textbook! Answer these questions directly from what you observe in the packet trace.) Name these fields.

2. By consulting the displayed information in Wireshark's packet content field for this packet, determine the length (in bytes) of each of the UDP header fields.

3. The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet.

4. What is the maximum number of bytes that can be included in a UDP payload? (Hint: the answer to this question can be determined by your answer to 2. above)

5. What is the largest possible source port number? (Hint: see the hint in 4.)

6. What is the protocol number for UDP? Give your answer in both hexadecimal and decimal notation. To answer this question, you'll need to look into the Protocol field of the IP datagram containing this UDP segment (see Figure 4.13 in the text, and the discussion of IP header fields).

7. Examine a pair of UDP packets in which your host sends the first UDP packet and the second UDP packet is a reply to this first UDP packet. (Hint: for a second packet to be sent in response to a first packet, the sender of the first packet should be the destination of the second packet). Describe the relationship between the port numbers in the two packets.

Reference no: EM13768927

Previous Q& A

  Identify the deficiency initiated new policy-law or program

Type of focusing event and date that it occurred; president and FEMA Director;

  Effect of power transmission lines on human body

Effect of power transmission lines on human body.

  Change management - driver only operations

Brief Introduction to the key concepts of Change Management and a "desktop" review of potential barriers and safety concerns

  Looking to finance a plant in latin america

Despite some of the business challenges that you identified about your chosen country, you decided to move ahead and open an office in the financial center of this country. Your first customer is a large MNC that is looking to finance a plant in L..

  The number of observations minus the number of constraints

The number of observations minus the number of constraints or assumptions needed to calculate a statistical term is called the _____.

  What are the consequential incidental damages

The court finds that there is a breach of contract. What are the consequential, incidental, and compensatory damages that Barksdale is liable for in this case? Be sure to define each of those terms

  Planning process for executing a terrorist attack

What is the planning process for executing a terrorist attack - to what other types of planning processes is this similar? Explain.

  Cost of production-vs-the selling price

Find and describe 2 non-durable goods and 2 durable goods. Your explanation should include talking about the materials that are used, the intended use of the product, and how long it is supposed to last which includes explaining why each material ..

  Assuming he makes no withdrawals during that period

If Jackson deposits $90 at the end of each month in a savings account earning interest at a rate of 3%/year compounded monthly, how much will he have on deposit in his savings account at the end of 5 years, assuming he makes no withdrawals during tha..

  Describe is contract rescission a potential remedy

What is the likelihood that the daughter's suit will succeed? State your reasons. Is contract rescission a potential remedy? Why or why not? Is an award of monetary damages an adequate remedy? Why or why not

Reviews

Write a Review

 

Similar Q& A

  How many data links will there be along

How many data links will there be along the way when Host R transmits a packet to Host S - How many routes?

  Solve for the optimal investment decision

Solve for the optimal investment decision by constructing a decision tree.

  The evolution of e-marketing tools

The Evolution of E-Marketing Tools

  Is this technique taylorian in nature

As a system analyst to do requirement elicitation of UNB course registration system, use an example to tell how you can apply this technique to your elicitation task.

  Minimum number of edits required to convert string

Given two strings of size m, n and set of operations replace (R), insert (I) and delete (D) all at equal cost. Find minimum number of edits (operations) required to convert one string into another.

  Executing critical section in mutual exclusion protocol

In Lamport's mutual exclusion protocol, if process i is implementing critical section.

  What exactly active directory folders purposes

Active Directory folders (not shared folders) are unique objects in Active Directory.

  How value parameters useful in processing data in a program

Discuss some useful applications for n-dimensional arrays, such as graphical 3-D or biotechnology applications.

  What would say in a job interview

What would say in a job interview if you were asked to comment on the following statement: "A Database Administrator (DBA) should create as many indexes as possible for a table because that will result in the greatest speed for all operations ..

  In order to create a unique field in a table in a database

1. in order to create a unique field in a table in a database you need to define a .viewprimary keyhost keyjoin2.a in

  Cryptosystems and protocols in use to protect transaction

Go to a popular online electronic commerce site like Amazon.com. Place several items in  your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select "Propert..

  Use one of more of the nonmonotonic reasoning system

Use one of more of the nonmonotonic reasoning system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd