Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This computer networking question Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request

This computer networking question

image text in transcribed

Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request message and answer the following questions: a) What is the IP address of host computer?(2) b) Within the IP packet header, what is the value in the upper layer protocol fleld? (2) c) How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the numbor of payload bytos. (6) d) Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. (5) 2. Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the "details of selected packet header" window. In the "listing of captured packets" window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer. a) Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? (5) b) Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why? (5) e) Describe the pattern you see in the values in the Identification field of the IP datagram. (5) Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request message and answer the following questions: a) What is the IP address of host computer?(2) b) Within the IP packet header, what is the value in the upper layer protocol fleld? (2) c) How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the numbor of payload bytos. (6) d) Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. (5) 2. Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the "details of selected packet header" window. In the "listing of captured packets" window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer. a) Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? (5) b) Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why? (5) e) Describe the pattern you see in the values in the Identification field of the IP datagram

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Visual Basic 6 Databases

Authors: Charles Williams

1st Edition

1861002025, 978-1861002020

More Books

Students also viewed these Databases questions

Question

Is the person willing to deal with the consequences?

Answered: 1 week ago