What is the maximum number of bytes

Assignment Help Basic Computer Science
Reference no: EM13768927

The Assignment

Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets. It's also likely that just by doing nothing (except capturing packets via Wireshark) that some UDP packets sent by others will appear in your trace. In particular, the Simple Network Management Protocol (SNMP) sends SNMP messages inside of UDP, so it's likely that you'll find some SNMP messages (and therefore UDP packets) in your trace.

After stopping packet capture, set your packet filter so that Wireshark only displays the UDP packets sent and received at your host. Pick one of these UDP packets and expand the UDP fields in the details window. If you are unable to find UDP packets or are unable to run Wireshark on a live network connection, you can download a packet trace containing some UDP packets.

Whenever possible, when answering a question below, you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout3 to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn't look in the textbook! Answer these questions directly from what you observe in the packet trace.) Name these fields.

2. By consulting the displayed information in Wireshark's packet content field for this packet, determine the length (in bytes) of each of the UDP header fields.

3. The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet.

4. What is the maximum number of bytes that can be included in a UDP payload? (Hint: the answer to this question can be determined by your answer to 2. above)

5. What is the largest possible source port number? (Hint: see the hint in 4.)

6. What is the protocol number for UDP? Give your answer in both hexadecimal and decimal notation. To answer this question, you'll need to look into the Protocol field of the IP datagram containing this UDP segment (see Figure 4.13 in the text, and the discussion of IP header fields).

7. Examine a pair of UDP packets in which your host sends the first UDP packet and the second UDP packet is a reply to this first UDP packet. (Hint: for a second packet to be sent in response to a first packet, the sender of the first packet should be the destination of the second packet). Describe the relationship between the port numbers in the two packets.

Reference no: EM13768927

Questions Cloud

Determining the financing analysis : Given a property information. Research on loan terms and assumptions, calculations on equity vs. debt, use of special financing programs (like tax credits), calculation of effective borrowing costs and/or lender yields.
Is shaming right : Is Shaming Right, Shame on You (or Shame on the Judge) Recently, some courts and some judges have ordered punishments that "shame" defendants as a result of the crimes these defendants have committed
Research and describe the concept of hrd : Research and describe the concept of HRD change in an organization. In addition, rationalize suitable interventions to address emotions of change by choosing one of the following theories to assess and evaluate.
Determine the necessity for a one-to-one correspondence : Compare differing conceptualizations of the mind and how the mind is studied - Determine the necessity for a one-to-one correspondence between a specific representation.
What is the maximum number of bytes : What is the maximum number of bytes that can be included in a UDP payload. The value in the Length field is the length of what
Identify the deficiency initiated new policy-law or program : Type of focusing event and date that it occurred; president and FEMA Director;
Effect of power transmission lines on human body : Effect of power transmission lines on human body.
Change management - driver only operations : Brief Introduction to the key concepts of Change Management and a "desktop" review of potential barriers and safety concerns
Looking to finance a plant in latin america : Despite some of the business challenges that you identified about your chosen country, you decided to move ahead and open an office in the financial center of this country. Your first customer is a large MNC that is looking to finance a plant in L..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What power of h is the error proportional to

Find the values of A and B such that error is minimized. What power of h is the error proportional to? Use this formula to find d/dx sin(x) at x = pi/3. Tabulate errors for different values of h.

  Write a program that reads the data in the file and displays

Write a program that reads the data in the file and displays the car number, miles driven, gallons used and the miles per gallon for each car.

  Traditional approach or a type of agile approach

When evaluating a proposal for acquisition and sourcing, are there considerations that are unique in the case of an IT project versus a non-IT project?

  Assignment on mobile app work breakdown structure

Create a Gantt chart for the project. Take a screenshot of the Gantt chart which can later be inserted into your written paper.

  Discuss the points and tabulate the strengths and weaknesses

Discuss the points and tabulate the strengths and weaknesses

  Asynchronous transaction processing mode

When operating in an asynchronous transaction processing mode, what information must be present in both the pending request and the received response messages for the response to be exclusively matched to its associated pending request?

  Describe the security vulnerabilities expoited

Describe the security vulnerabilities expoited by the hackers in the 21st century bank heist case study

  What was business impact of tjx-s data loss on tjx

What was the business impact of TJX's data loss on TJX, consumers and banks and how effectively did TJX deal with these problems?

  How do you create a 4d array of int in c++

How do you create a 4D array of int in C++

  Key factors limiting use of personalization

Two key factors limiting the use of personalization to more precisely target marketing efforts to individual customers are?

  Develop framework for it steering committee explaining roles

Develop a framework for the IT steering committee, explaining the roles and responsibilities of the members.

  Create a list with or more rows and topics

Can someone give me detailed instructions on how to do this step by step please? Create a list with 8 or more rows and 3 topics. After you have this done, separate this list by topic.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd