Answered step by step
Verified Expert Solution
Question
1 Approved Answer
COSC 4 4 3 6 COMPUTER NETWORKS The assignment needs to be completed individually. Total Marks: 2 0 Marks Due date: Friday, July 5 th
COSC COMPUTER NETWORKS
The assignment needs to be completed individually.
Total Marks: Marks
Due date: Friday, July th
Assignment
In this assignment, we will investigate the IP protocol, focusing on the IPv In the first part, well analyse
packets in a trace of IPv datagrams sent and received by the traceroute program. We will also explore
several aspects of the ICMP protocol.
Capturing packets from an execution of traceroute
To generate a trace of IPv datagrams for the first two parts of this lab, well use the traceroute
program to send datagrams of two different sizes to algomau.ca The traceroute operates by first
sending one or more datagrams with the timetolive TTL field in the IP header set to ; it then sends
a series of one or more datagrams towards the same destination with a TTL value of ; it then sends a
series of datagrams towards the same destination with a TTL value of ; and so on Recall that a router
must decrease the TTL in each received datagram by actually RFC says that the router must
decrease the TTL by at least If the TTL reaches the router returns an ICMP message type
TTLexceeded to the sending host. As a result of this behaviour, a datagram with a TTL of sent by
the host executing traceroute will cause the router one hop away from the sender to send an ICMP
TTLexceeded message back to the sender; the datagram sent with a TTL of will cause the router
two hops away to send an ICMP message back to the sender; the datagram sent with a TTL of will
cause the router three hops away to send an ICMP message back to the sender; and so on In this
manner, the host executing traceroute can learn the IP addresses of the routers between itself and the
destination by looking at the source IP addresses in the datagrams containing the ICMP TTLexceeded
messages.
Lets run traceroute and have it send datagrams of two different sizes. The larger of the two
datagram lengths will require traceroute messages to be fragmented across multiple IPv
datagrams.
LinuxMacOS With the LinuxMacOS traceroute command, the size of the UDP datagram
sent towards the final destination can be explicitly set by indicating the number of bytes in the
datagram; this value is entered in the traceroute command line immediately after the name
or address of the destination. For example, to send traceroute datagrams of bytes
towards gaia.csumass.edu, the command would be:
traceroute algomau.ca
Windows. The tracert program provided with Windows does not allow one to change the
size of the ICMP message sent by tracert. So it wont be possible to use a Windows
machine to generate ICMP messages that are large enough to force IP fragmentation.
However, you can use tracert to generate small, fixedlength packets to perform this
assignment. At the DOS command prompt, enter:
tracert algomau.ca
Do the following:
Start up Wireshark and begin packet capture. CaptureStart or click on the blue shark fin
button in the top left of the Wireshark window
Enter two traceroute commands, using algomau.ca as the destination, the first with a length of
bytes. Once that command has finished executing, enter a second traceroute command for
the same destination, but with a length of bytes.
Stop Wireshark tracing.
I. Basic IPv
In your trace, you should be able to see the series of UDP segments in the case of MacOSLinux or
ICMP Echo Request messages Windows sent by traceroute on your computer, and the ICMP TTLexceeded messages returned to your computer by the intermediate routers. In the questions below,
well assume youre using a MacOSLinux computer; the corresponding questions for the case of a
Windows machine should be clear. Your screen should look similar to the screenshot in Figure
where we have used the display filter udpicmpsee the lightgreenfilled displayfilter field in Figure
so that only UDP andor ICMP protocol packets are displayed.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started