Find the first tcp handshake

Assignment Help Computer Networking
Reference no: EM13751031

1. Find the first TCP handshake. What are the packet numbers in the handshake? The three packet numbers ____, _____, and _____.

2. What is the IP address of the host that started the handshake? __________________

3. What is the TCP port connection pair for this handshake? ______, ______

4. In the first packet of the handshake, the source port is the ephemeral port this host wants to use for the connection, and the destination port indicates the application the host wants to use on the serving host. What application does the host want to use on the serving host?______________

5. Look at packet number 14. Is this part of the conversation initiated by the first handshake? ______

Build a filter to see only the first handshake and the conversation for this connection.

Click Analyze (or "Edit" on other versions of ethereal) and select Display Filters from the drop-down list. This brings you to the Edit Display Filters List.

Click "Expression"

Expand TCP (click the plus sign next to TCP), and highlight "Source (src.port)".

In the Relation section highlight == .

In the Value field type the source port used by the host that initiated the conversation. (The source port should be 1097 in this example).

Click "OK". Now there is a filter string in the Edit Display Filter List window. (The filter string should be "tcp.port == 1097".)

In the Filter name box type "Conversation on Source Port 1097". Click New, then OK. Now you have defined a filter (but not yet applied it).

Apply the filter to the trace file.

Find the Filter button near the top left corner of the window and click it. (Note for older versions: If you don't see the Filter button, make sure the browser window is maximized and your task bar is not covering the bottom.)

Highlight "Conversation on Source Port 1097" and click Apply. (You will see the filter string in the filter field. You could also have typed in the filter by hand. You can take the filter off by clicking the Clear button next to the filter field at the bottom.).

The handshake establishes the initial sequence numbers for each connection. Try to follow the sequence numbers in the conversation. Now change the display to show relative sequence numbers:

Click Edit and select Preferences from the drop-down list.

Drill down into Protocols until you get to TCP.

Highlight TCP and select the options, "Analyze TCP sequence numbers" and "Relative sequence numbers and window scaling." Click OK. Try again to follow the sequence numbers.

You cannot see the "next sequence number" in the summary pane for packet number 6. Look for it in the protocol tree pane. Explain why packet number 7 says "ACK =344."

Reference no: EM13751031

Questions Cloud

How will you resolve the cybercrime : You are the chief information security officer (CISO) for VL Bank as depicted in the attached "VL Bank Case Study." How will you resolve the cybercrime
Technology sourcing and internal innovation : You have a choice to use either an existing company or a fictitious company(Please use a real company). Technology Sourcing and Internal Innovation and Product Development Strategy
What do you think are the likely consequences of the risk : What do you think are the likely consequences of the risk and What do you think is the likelihood of the risk occurring
Bonnie charitable contributions : Bonnie's charitable contributions and AGI for the past four years were as follows:
Find the first tcp handshake : Find the first TCP handshake. What are the packet numbers in the handshake? The three packet numbers and What is the IP address of the host that started the handshake
An international business compete more effectively : How can an efficient logistics function help an international business compete more effectively in the global marketplace
Examine culture as shared meanings : Examine culture as "shared meanings" and the "story of who we think we are." Explore assumptions and sharpen ideas on similarities and differences across cultures.
Parties [identify the plaintiff and the defendant : 1. Read and understand the case. Show your Analysis and Reasoning and make it clear you understand the material. Be sure to use the concepts of the course to show your reasoning. Summarize the situation. Dedicate at least one heading to each followin..
Write essay on the secession crisis and the jim crow world : Write an essay on the following topics- Antebellum White Society, The Secession Crisis, Free Labor and Violence in Reconstruction and The Jim Crow World.

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine nr count back from secondary after last frame

If poll bits are in the sixth frame, determine the N(R) count back from secondary after last frame? Suppose error-free operation.

  Importance of computer networking

What are the three general reasons for the importance of computer networking

  Producing list of mac addresses and ip addresses

You have been asked in order to produce a list of the MAC addresses and the corresponding IP addresses and computer names within your network. Suggest at least two methods in order to complete this task.

  Network discussion - application layer collapse

Application layer protocols such as HTTP, FTP, SMTP, DNS, and P2P networks. Pick up one protocol that you are familiar with and write a brief overview using your own words.

  Identify the source port number

Identify the source port number and identify the destination port number and what is the length of the data?

  Create the network for use in training environment

You are asked to create the network for use in training environment. It must be mobile, ... Mobile Training is small training firm which offers mobile classrooms.

  How to decrypt a message using classical cryptography

Part 1a. How to encrypt a message using classical cryptography algorithms we covered in class? Are these methods secure?b. How to decrypt a message using classical cryptography

  Computer network i am sorry that i didnt notice you reduced

i am sorry that i didn39393939t notice you reduced fees for me. ltbrgti am willing to pay 50aud ltbrgtbut i need this

  Discuss the possibility of setting up a wireless network

Imagine you are a wireless network contractor and you are meeting with a potential client over lunch to discuss the possibility of setting up a wireless network in the client's building.

  Router information protocol

Question 1: What is the purpose of a routing protocol? Question 2: What is a distance-vector routing protocol?Question 3: What are the advantages and disadvantages of distance-vector protocols?

  Find round-trip delay due-speed of light equal transmission

At what data rate does round-trip delay due to speed of light equal transmission delay for 1-KB packet? Suppose speed of light in fibre to be 2/3 speed of light in vacuum.

  Recognize roi and npv of wireless order-taking system

Recognize ROI and NPV of wireless order-taking system. Explain some of intangibles Lisa requires to consider and make recommendation as to whether Lisa must order such a system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd