Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 1 115 marks Figure 1 is a Wireshark capture. Protocol Info No 110 192.168.1.96 111 121.123.204.11 112 192.168.1.96 121.123.204-11 Source Destination 21.123.204.11 192-168.2.96 GET/cenant/amp/entity

image text in transcribed
image text in transcribed
QUESTION 1 115 marks Figure 1 is a Wireshark capture. Protocol Info No 110 192.168.1.96 111 121.123.204.11 112 192.168.1.96 121.123.204-11 Source Destination 21.123.204.11 192-168.2.96 GET/cenant/amp/entity d/ HTTP/1.1 206 Partial Content GET/singletile/summary /alias 60184 443 [SYN] 13 192.168.1.96 13.75.124.215 P Seq-O Win-8192 Len- TCP MSS-1460 WS-256 SACK PERM-1 4360184 [SYN ACK Seq-0 Ack-1 Win-8192 Len-0 MSS-1440 WS-256 SACK PERM-1 0184 443 IACK) 114 13.75.124.215 3.75.124.215 TCP Seq-1 Ack-1 Win-1638 IntelCor Od:76 :e0 ThomsonT e:6d en-0 ho has 192.168.1-2547 Tell 192.168.1.96 ThomsonT fe:6d:49 IntelCor Od:7610 FE021d 39.255.255 250 92.168.1-96 116 00:1f:9f:fe:6e:48 63233 3702 Len#656 Fe80::902e:a95 61 8b12:a559 UDP UDP TCP 119192.168.1.96 en-656 8060240 [RST] 120 172.217.24.174 e2,Win-0 Len- 602 40 80 [RST, ACK) Seq-1 Ack-1 win-0 Len Router Advertisement 121 192.168.1.96 172.217.24.174 TCP 122 80 SEEEESEE f02::2 ICHPv6 ifite e80sffEEE EEE: ffe Router Solicitation 123 02::2 Figure 1 (a)Identify protocol X captured in Lines 110 to 112 2 marks] ii) State the source and destination IP addresses respectively. 3 marks (b)i) Compare and contrast the TCP connections in Lines 113 to 115 and 3 marks] Lines 120 to 121 (ii) Why do the connections necessary? 2 marks] (c) What is protocol Y? How is it different from ICMP 5 marks

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Security XI Status And Prospects

Authors: T.Y. Lin, Shelly Qian

1st Edition

0412820900, 978-0412820908

More Books

Students also viewed these Databases questions

Question

why should you implement a sexual orientation antiharassment policy

Answered: 1 week ago

Question

My opinions/suggestions are valued.

Answered: 1 week ago