What is the ip address and tcp port number

Assignment Help Computer Networking
Reference no: EM13949320

Assist me with LAB assignment using Wireshark network analyses Software tool.

Perform the instructions in the LAB document and provide a screenshot of the results from the Wireshark SW tool, and provide explanations to questions asked in the LAB workIn this lab, we'll investigate the behavior of the celebrated TCP protocol in detail. We'll do so by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the text of Lewis Carrol's Alice's Adventures in Wonderland) from your computer to a remote server. We'll study TCP's use of sequence and acknowledgement numbers for providing reliable data transfer; we'll see TCP's congestion control algorithm - slow start and congestion avoidance - in action; and we'll look at TCP's receiver-advertised flow control mechanism. We'll also briefly consider TCP connection setup and we'll investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server.

1. Capturing a bulk TCP transfer from your computer to a remote server

If you are unable to run Wireshark on a live network connection, you can download a packet trace file that was captured while following the steps above on one of the author's computers . You may well find it valuable to download this trace even if you've captured your own trace and use it, as well as your own trace, when you explore the questions below.

2. A first look at the captured trace

Before analyzing the behavior of the TCP connection in detail, let's take a high level view of the trace.

• First, filter the packets displayed in the Wireshark window by entering "tcp" (lowercase, no quotes, and don't forget to press return after entering!) into the display filter specification window towards the top of the Wireshark window.

What you should see is series of TCP and HTTP messages between your computer and gaia.cs.umass.edu. You should see the initial three-way handshake containing a SYN message. You should see an HTTP POST message. Depending on the version of Wireshark you are using, you might see a series of "HTTP Continuation" messages being sent from your computer to gaia.cs.umass.edu. Recall from our discussion in the earlier HTTP Wireshark lab, that is no such thing as an HTTP Continuation message - this is Wireshark's way of indicating that there are multiple TCP segments being used to carry a single HTTP message. In more recent versions of Wireshark, you'll see "[TCP segment of a reassembled PDU]" in the Info column of the Wireshark display to indicate that this TCP segment contained data that belonged to an upper layer protocol message (in our case here, HTTP). You should also see TCP ACK segments being returned from gaia.cs.umass.edu to your computer.

Answer the following questions, by opening the Wireshark captured packet file tcp-ethereal-trace-1 in https://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip (that is download the trace and open that trace in Wireshark; see footnote 2). Whenever possible, when answering a question you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? To answer this question, it's probably easiest to select an HTTP message and explore the details of the TCP packet used to carry this HTTP message, using the "details of the selected packet header window" (refer to Figure 2 in the "Getting Started with Wireshark" Lab if you're uncertain about the Wireshark windows.

2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection?

If you have been able to create your own trace, answer the following question:

3. What is the IP address and TCP port number used by your client computer (source) to transfer the file to gaia.cs.umass.edu?

TCP Basics

Answer the following questions for the TCP segments:

4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment?

5. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment?

6. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you'll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a "POST" within its DATA field.

7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection. What are the sequence numbers of the first six segments in the TCP connection (including the segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for each segment received? Given the difference between when each TCP segment was sent, and when its acknowledgement was received, what is the RTT value for each of the six segments? What is the EstimatedRTT value (see Section 3.5.3, page 239 in text) after the receipt of each ACK? Assume that the value of the EstimatedRTT is equal to the measured RTT for the first segment, and then is computed using the EstimatedRTT equation on page 239 for all subsequent segments.

Note: Wireshark has a nice feature that allows you to plot the RTT for each of the TCP segments sent. Select a TCP segment in the "listing of captured packets" window that is being sent from the client to the gaia.cs.umass.edu server. Then select: Statistics->TCP Stream Graph->Round Trip Time Graph.

8. What is the length of each of the first six TCP segments?

9. What is the minimum amount of available buffer space advertised at the received for the entire trace? Does the lack of receiver buffer space ever throttle the sender?

10. Are there any retransmitted segments in the trace file? What did you check for (in the trace) in order to answer this question?

11. How much data does the receiver typically acknowledge in an ACK? Can you identify cases where the receiver is ACKing every other received segment (see Table 3.2 on page 247 in the text).

12. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value.

Answer the following questions for the TCP segments the packet trace tcp-ethereal-trace-1 in https://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip

13. Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence number versus time plot of segments being sent from the client to the gaia.cs.umass.edu server. Can you identify where TCP's slowstart phase begins and ends, and where congestion avoidance takes over? Comment on ways in which the measured data differs from the idealized behavior of TCP that we've studied in the text.

14. Answer each of two questions above for the trace that you have gathered when you transferred a file from your computer to gaia.cs.umass.edu

Attachment:- Wireshark TCP.rar

Reference no: EM13949320

Questions Cloud

Federal-state laws that are intended to promote competition : Give an example of a recent regulatory reform or change in federal or state laws that are intended to promote competition among financial intermediaries and how they are to do so. Within your discussion, provide an analysis of how market forces, such..
About the causal link between smoking marijuana : In a Chapter discussion about the causal link between smoking marijuana and using other illegal drugs, sociologist Erich Goode distinguished between two schools of thought that should be looked at when considering and researching whether marijuana..
How many different products are there in the hospital : How many different products are there in the hospital? How do you assign the costs of the support departments to individual products?
Dividends are expected to grow-what is projected dividend : ACME is growing fast. Dividends are expected to grow at 30% per year during the next 3 years, 18 % over the following year, and then 8% per year indefinitely. The discount rate is 13%, and the stock currently sells for $65 per share. What is the proj..
What is the ip address and tcp port number : What is the IP address and TCP port number used by the client computer that is transferring the file - What is the IP address and TCP port number used by your client computer to transfer the file to gaia.cs.umass.edu?
Repurchasing all of the outstanding shares : ACME is a very cyclical type of business which is reflected in its dividend policy. The firm pays a $2.00 a share dividend every other year. The last dividend was paid last year. Five years from now, the company is repurchasing all of the outstanding..
How each influence the design of the logical database model : Your supervisor requested a short memo identifying each of the five W's and the H (Who, What, Where, When, Why, and How) and how each could influence the design of the logical database model. Compose an 600-word e-mail to your supervisor.
Why do we use foretasted cash flows instead : Why do we use foretasted cash flows instead of foretasted accounting earnings in estimating the NPV of a project?
Introduce new portable camper to fill out its product line : Winnebagel Corp. currently sells 23,000 motor homes per year at $61,000 each, and 8,500 luxury motor coaches per year at $98,000 each. The company wants to introduce a new portable camper to fill out its product line; it hopes to sell 18,000 of these..

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the process of litigation and expert reports

Describe the process of litigation and expert reports

  Problem-solving procedure to find files from unknown source

Use problem-solving and brainstorming skills to find a procedure to follow. Write a short report outlining what to do.

  You are the network administrator for your lan

You are the network administrator for your LAN. You have just captured the network traffic for the last ten minutes and have thousands of packets captured.

  Significant benefits of cloud computing technology

Explain three significant benefits of cloud computing technology. How do these three items benefit the business strategy in the natural world

  Centralized versus decentralized database management systems

Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly used.

  How duplex link are actually implemented in the netml system

This is how duplex links are actually implemented in the NetML system, so, just make sure the links are duplex in Netml.

  Display the top ten ip addresses in your file

You will given a web server log file to process. Using a command-line pipeline display the top ten IP addresses in your file along with the count of how many times the IP address appeared.

  Assignment on disaster recovery

You have been asked to create the disaster recovery plan for a small neighborhood veterinary clinic. This clinic provides services for dogs and cats only. These services include office visits, surgery, hospitalization, and boarding.

  Explain software defined networking

Explain Software defined networking. What is open flow? How SDN outgrows open flow initiative. Define the market of major vendors who use it.

  Wireless and mobile technologies

Wireless and Mobile Technologies

  Describe the features and benefits of csma-cd

For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD.

  Maximum ethernet payload

Host B can send TCP acknowledgements to host A, even though it has no data to send - experiment in which host A blasts a 26 Megabyte file to host B through a single TCP Tahoe connection over a 1 Gigabit/sec Ethernet. B transmits no data. Neither ho..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd