What is thefirst packets destination port number

Assignment Help Computer Engineering
Reference no: EM133540431

Lab Homework: Transport Protocols

This lab involves analysis of two packet capture (pcap) files (SNMP_Sample.cap and HTTP_Sample.cap) using the Wireshark network analysis tool. The pcap files are available on Blackboard as attachments to the project homework. Open each file in Wireshark and use it to determine answers to the questions below the underlined file name.

Turn-in Requirements: To complete the homework, upload a Word (.docx) or Adobe (.pdf) file with answers to the numbered questions as your submission to this homework in Blackboard.

SNMP Sample

Question A. Examine the details in the first packet. What transport layer protocol is being used?

Question B. What is thefirst packet's destination port number? What is the significance, if any, of this port number?

Question C. What is the first packet's source port number? What is the significance, if any, of this port number?

Question D. Consider all 8 packets in this pcap file. Taken together, are they part of a connection-oriented message between two endpoints? Why or why not?

Question E. Research and provide a brief description of a common SNMP security vulnerability?

HTTP Sample

Question A. Examine the details in the first packet. What transport layer protocol is being used?

Question B. What is thefirst packet's destination port number? What is the significance, if any, of this port number?

Question C. What is the first packet's source port number?

Question D. Examine the first 3 packets. What transport layer flags are set and what does this sequence of packets represent in terms of a connection-oriented messaging session? Which IP address initiated this connection?

Question E. Research and provide a brief description of a common HTTP security vulnerability?

Reference no: EM133540431

Questions Cloud

Prepare a report by interpreting the visualisations : Finish designing your visualisations, then prepare a report by interpreting the visualisations and integrating with theory from this subject
Create a new process and execute the command in new process : CSC 35500- With the exception of the cd and exit commands, each command should create a new process and execute the command in the new process.
Make recommendations on customer segmentation and targeting : Make recommendations on customer segmentation, targeting and product positioning; using the marketing mix to engage with the target segment; pricing tactics
What bundaberg can do to acquire new customers : What Bundaberg should do with customer relationship management and What Bundaberg can do to acquire new customers
What is thefirst packets destination port number : IS 3413- Examine the details in the first packet. What is thefirst packet's destination port number? What is the significance, if any, of this port number?
Describe how to identify and evaluate project development : SRM750 Built Environment Professional Practice, Deakin University - Describe how to identify and evaluate project development options in response to a project
Design and develop a real-world information systems project : Design and develop a real-world information systems project with a real industry client or simulated with an internal role or industry client supported
Explain the key processes for risk assessment and management : RIICWD507D Prepare detailed geotechnical design - Explain the key processes for risk assessment and management in preparing the detailed geotechnical designs
How technology can enable an organisations core : Critically evaluate how technology can enable an organisation's core business processes and support the strategic goals - Analyse and comprehend the issues

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd