a) Examine the protocol type and time to live fields in the IP packet that carries...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
a) Examine the protocol type and time to live fields in the IP packet that carries the first ICMP Echo Request. ICMP packet doesn't have source and destination port numbers. Why? b) Study the ICMP message and what are the fields does ICMP packet have? Check the number of bytes for the checksum, sequence number and identifier fields. c) Identify the data bytes in request message and note the corresponding character sequence in third pane of Wireshark window. What is contained in this data field? (10 marks) ICMP echo reply: a) Compare the message identifier and sequence number in the reply message with the equivalent numbers in the request message. (5 marks) b) Recognize the data bytes in the reply message and compare the data sequence with that in the request message. (5 marks) c)To support the above questions 1 & 2, please provide screen dumps of the Wireshark packets you have captured. i.e. Like the screen dumps shown above in the procedure.(10 marks) ter kmp No.. Time 92 10.826517 93 10.872711 100 17.860322 101 17.906644 106 18.894 511 107 18.940406 117 19.928676 118 19.974502 124 20.963821 125 21.010552 Source 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 Total Length: 60 Identification: 0x8bf8 (35832) Flags: 0x00 Fragment offset: 0 Destination 0000 90 80 6b 72 39 ae 00 19 0010 00 3c 8b 18 00 00 80 01 0020 e7 68 08 00 01 5€ 02 00 0030 67 68 69 6a ob 6c od de 0040 77 61 62 63 64 65 66 67 Internet Protocol (p), 20 bytes Expression... Cear Apply Protocol TCMP ICMP 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 Frame 92 (74 bytes on wire, 74 bytes captured) Ethernet II, Sec: Intel 09:20:6f (00:19:d1:09:2c:6f), Dst: Schmidre 72:39:ae (00:80:6b:72:39:ae) Internet Protocol, Sec: 10.0.0.147 (10.0.0.147), Dst: 209.85.231.104 (209.85.231.104) version: 4 Header length: 20 bytes Differentiated services Field: 0x00 (DSCP 0x00: Default: ECN: 0X00) 45 00 di 09 2c of 08 eb 77-03 4a 00 61 65 66 of 70 71 72 73 74 75 76 68 69 ICMP ICMP ICMP ICMP ICMP ICMP ICMP ICMP Info Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply kro........ Keep. W ghijk imn opqrstuv wabcdefg hi Packets: 1174 Displayed: 10 Marked: 0 The screen shot of Wireshark output after filtering the 'icmp' messages. Profile: Defau a) Examine the protocol type and time to live fields in the IP packet that carries the first ICMP Echo Request. ICMP packet doesn't have source and destination port numbers. Why? b) Study the ICMP message and what are the fields does ICMP packet have? Check the number of bytes for the checksum, sequence number and identifier fields. c) Identify the data bytes in request message and note the corresponding character sequence in third pane of Wireshark window. What is contained in this data field? (10 marks) ICMP echo reply: a) Compare the message identifier and sequence number in the reply message with the equivalent numbers in the request message. (5 marks) b) Recognize the data bytes in the reply message and compare the data sequence with that in the request message. (5 marks) c)To support the above questions 1 & 2, please provide screen dumps of the Wireshark packets you have captured. i.e. Like the screen dumps shown above in the procedure.(10 marks) ter kmp No.. Time 92 10.826517 93 10.872711 100 17.860322 101 17.906644 106 18.894 511 107 18.940406 117 19.928676 118 19.974502 124 20.963821 125 21.010552 Source 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 Total Length: 60 Identification: 0x8bf8 (35832) Flags: 0x00 Fragment offset: 0 Destination 0000 90 80 6b 72 39 ae 00 19 0010 00 3c 8b 18 00 00 80 01 0020 e7 68 08 00 01 5€ 02 00 0030 67 68 69 6a ob 6c od de 0040 77 61 62 63 64 65 66 67 Internet Protocol (p), 20 bytes Expression... Cear Apply Protocol TCMP ICMP 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 209.85.231.104 10.0.0.147 Frame 92 (74 bytes on wire, 74 bytes captured) Ethernet II, Sec: Intel 09:20:6f (00:19:d1:09:2c:6f), Dst: Schmidre 72:39:ae (00:80:6b:72:39:ae) Internet Protocol, Sec: 10.0.0.147 (10.0.0.147), Dst: 209.85.231.104 (209.85.231.104) version: 4 Header length: 20 bytes Differentiated services Field: 0x00 (DSCP 0x00: Default: ECN: 0X00) 45 00 di 09 2c of 08 eb 77-03 4a 00 61 65 66 of 70 71 72 73 74 75 76 68 69 ICMP ICMP ICMP ICMP ICMP ICMP ICMP ICMP Info Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply Echo (ping) request Echo (ping) reply kro........ Keep. W ghijk imn opqrstuv wabcdefg hi Packets: 1174 Displayed: 10 Marked: 0 The screen shot of Wireshark output after filtering the 'icmp' messages. Profile: Defau
Expert Answer:
Answer rating: 100% (QA)
The questions are related to the analysis of Internet Control Message Protocol ICMP packets using the Wireshark network protocol analyzer Unfortunately I cant perform interactive actions such as using ... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these computer network questions
-
Discuss the implications of collateral scarcity and collateral velocity for market liquidity and financial stability. How do changes in market conditions, such as regulatory reforms, market...
-
The following questions are regarding Amdahl's Law as it relates to databases. a. If 65% of your program can be parallelized, and you are using 4 machines to run the parallel version of the program,...
-
Why does MongoDB make sure that each document has a unique id? Does this make it easier or more difficult to shard a MongoDB database? Why?
-
What type of insurance policy insures against all risks of loss that are not specifically excluded by the policy? OA) Binder policy OB) Named peril policy OC) Specified peril policy OD) Open peril...
-
Environmental Corporation specializes in the production and sale of ecofriendly packaging. In 2017, Environmental reported net income (earnings) in excess of analyst expectations. This included a...
-
An essential tool in the monitoring of the quality of a manufactured product is acceptance sampling. An acceptance sampling plan involves knowing the distribution of the life length of the item...
-
How many edges must be removed from Graph \(A\) to create a spanning tree? Use Graphs \(A, B\), and \(C\). Graph A Graph B Graph C
-
When Pill Ltd. acquired 85% of Sill Corporation on January 1, Year 1, for $238,000, the imputed acquisition differential of $60,000 was allocated entirely to goodwill . On December 31, Year 1, a...
-
The following table information represents the financial statements for the Genatron Manufacturing Corporation for the years 2016 and 2017: Selected Balance Sheet Information: Category 2016 2017 Cash...
-
1. What is your assessment of the financial performance of Nelson Nurseries? 2. Do you agree with Christine Barton?s accounts-payable policy? 3. What explains the erosion of the cash balance? 4. What...
-
If X Company has an order quantity of 50 and $1 carrying cost, $5 Order cost and 500 units annual demand, the number of orders per year is: A. 5 B. 8 C. 10 D. 14 E. 25
-
5. Your company just bought a commercial freezer to chill executive martinis. The freezer cost $23,000. You expect the freezer to last to last 9 years and be worth $1200 at the end of that period....
-
6. Quasi-fixed costs such as training costs, hiring costs, and employee benefits are among the sources of employer-side frictions in the labor market which can make the cost of hiring an additional...
-
Explain the concept of goodwill in accounting, including its recognition, measurement, and subsequent accounting treatment under both the International Financial Reporting Standards ( IFRS ) and the...
-
Consider the following direct labour costs data regarding the manufacture of a line of sofas by Glorious Sofa Manufacturer (GSM): Standards per sofa Direct manufacturing 0.5 hours of input at $20 per...
-
how do state farm employees analyze , evaluate , mitigate , montior and report thier risk within their company?
-
D Question 22 An equation of the function y(t) is shown. y(t) = +14t-40 pts Select all of the statements below that are true about the graph of y(t) for 6 t8 O The average rate of change over the...
-
Nike manufactures shoes and sportswear. How has the Internet changed the way this company communicates with its suppliers and retail customers?
-
Explain that the RM policy is a strategic document that formalizes much of the intent of the governance group. Explain that the RM policy must include purpose and scope, RM intent and objectives,...
-
Discuss the criteria on which selecting information security personnel is based, including the principles of supply and demand. This is likely a combination of experience, certifications, and...
-
True or False: Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.
-
The total assets and liabilities at the beginning and end of the year for Luther Company are listed below. Determine Luther Companys net income or loss for the year under each of the following...
-
Below is information from the statement of retained earnings of Mrs. Bells Cookies, Inc. for a recent year. Prepare the statement of retained earnings for Mrs. Bells Cookies in good form. You will...
-
Primorsk Corporation began the year 20x6 with cash of $55,900. In addition to earning a net income of $32,500 and paying a cash dividend of $19,500, Primorsk borrowed $78,000 from the bank and...
Study smarter with the SolutionInn App