What is the maximum number of bytes

Assignment Help Basic Computer Science
Reference no: EM13768927

The Assignment

Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets. It's also likely that just by doing nothing (except capturing packets via Wireshark) that some UDP packets sent by others will appear in your trace. In particular, the Simple Network Management Protocol (SNMP) sends SNMP messages inside of UDP, so it's likely that you'll find some SNMP messages (and therefore UDP packets) in your trace.

After stopping packet capture, set your packet filter so that Wireshark only displays the UDP packets sent and received at your host. Pick one of these UDP packets and expand the UDP fields in the details window. If you are unable to find UDP packets or are unable to run Wireshark on a live network connection, you can download a packet trace containing some UDP packets.

Whenever possible, when answering a question below, you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout3 to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn't look in the textbook! Answer these questions directly from what you observe in the packet trace.) Name these fields.

2. By consulting the displayed information in Wireshark's packet content field for this packet, determine the length (in bytes) of each of the UDP header fields.

3. The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet.

4. What is the maximum number of bytes that can be included in a UDP payload? (Hint: the answer to this question can be determined by your answer to 2. above)

5. What is the largest possible source port number? (Hint: see the hint in 4.)

6. What is the protocol number for UDP? Give your answer in both hexadecimal and decimal notation. To answer this question, you'll need to look into the Protocol field of the IP datagram containing this UDP segment (see Figure 4.13 in the text, and the discussion of IP header fields).

7. Examine a pair of UDP packets in which your host sends the first UDP packet and the second UDP packet is a reply to this first UDP packet. (Hint: for a second packet to be sent in response to a first packet, the sender of the first packet should be the destination of the second packet). Describe the relationship between the port numbers in the two packets.

Reference no: EM13768927

Questions Cloud

Determining the financing analysis : Given a property information. Research on loan terms and assumptions, calculations on equity vs. debt, use of special financing programs (like tax credits), calculation of effective borrowing costs and/or lender yields.
Is shaming right : Is Shaming Right, Shame on You (or Shame on the Judge) Recently, some courts and some judges have ordered punishments that "shame" defendants as a result of the crimes these defendants have committed
Research and describe the concept of hrd : Research and describe the concept of HRD change in an organization. In addition, rationalize suitable interventions to address emotions of change by choosing one of the following theories to assess and evaluate.
Determine the necessity for a one-to-one correspondence : Compare differing conceptualizations of the mind and how the mind is studied - Determine the necessity for a one-to-one correspondence between a specific representation.
What is the maximum number of bytes : What is the maximum number of bytes that can be included in a UDP payload. The value in the Length field is the length of what
Identify the deficiency initiated new policy-law or program : Type of focusing event and date that it occurred; president and FEMA Director;
Effect of power transmission lines on human body : Effect of power transmission lines on human body.
Change management - driver only operations : Brief Introduction to the key concepts of Change Management and a "desktop" review of potential barriers and safety concerns
Looking to finance a plant in latin america : Despite some of the business challenges that you identified about your chosen country, you decided to move ahead and open an office in the financial center of this country. Your first customer is a large MNC that is looking to finance a plant in L..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  It systems that have affected business

Identify five different IT systems that have affected business in the past few years (i.e., business software applications, networks, hardware, internet-based technologies, databases). For each system, briefly note the following:

  The mft data block allocation algorithm

Write a program that implements the MFT data block allocation algorithm

  Computer crime essay

Identify and discuss the steps necessary to make electronic evidence admissible in court.

  How assembly language program is created-debugged-editors

Explain how the assembly language program is created and debugged by using system tools like editors, assemblers.

  Exploring information systems

Exploring information systems

  Demonstrate ability to collaborate with peers to analyse and

Demonstrate ability to collaborate with peers to analyse and solve business problems with information technologies, and present the solution in a team report.

  Computer science and engineering communication

Computer science and engineering communication

  Identify and explain some different types of risks

Identify and explain some different types of risks that a network environment might face.

  Provide injective function from to and explain why injective

Provide an injective function from ? to ? and explain why it's injective

  Identify content and functional requirements

Identify Content and Functional Requirements

  Explaining method effective in cracking web passwords

More people are utilizing online shopping and banking. Explain one method that you believe is most effective in cracking Web passwords.

  What is the probability that the observed traffic in network

what is the probability that the observed traffic in the network will be classified at threat level ‘Medium'?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd