Answered step by step
Verified Expert Solution
Question
1 Approved Answer
This computer networking question Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request
This computer networking question
Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request message and answer the following questions: a) What is the IP address of host computer?(2) b) Within the IP packet header, what is the value in the upper layer protocol fleld? (2) c) How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the numbor of payload bytos. (6) d) Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. (5) 2. Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the "details of selected packet header" window. In the "listing of captured packets" window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer. a) Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? (5) b) Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why? (5) e) Describe the pattern you see in the values in the Identification field of the IP datagram. (5) Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request message and answer the following questions: a) What is the IP address of host computer?(2) b) Within the IP packet header, what is the value in the upper layer protocol fleld? (2) c) How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the numbor of payload bytos. (6) d) Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. (5) 2. Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the "details of selected packet header" window. In the "listing of captured packets" window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer. a) Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? (5) b) Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why? (5) e) Describe the pattern you see in the values in the Identification field of the IP datagramStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started