Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You use tcpdump to monitor our sockets programm from HW#2. Tcpdump can decode many of the TCP fields for you, the output shown below is

image text in transcribed

You use tcpdump to monitor our sockets programm from HW#2. Tcpdump can decode many of the TCP fields for you, the output shown below is the decoded packet sum hopefully obvious. In the "Flags" field, S-SYN, P-PSH, F-FIN, etc. Also note tcpdump by default uses "relative SEQ/ACK counts" which means after the initial packet it will print the difference rather than the raw SEQ/ACK values. mary. Fields like seq" and win" are (a) You start the server, then connect with the client and you see the following 16:38:55.451412 IP macbook-air.52658 > pi3.31337 Flags [S, seq 3649305635, win 29200, options mss 1460, sackoK, TS val 23595005 ecr 0, nop, wscale 71, length 0 16:38:55.451762 IP pi3.31337macbook-air.52658: Flags S.1, seq 2280757527, ack 3649305636, win 28960, options mss 1460, sackoK, TS val 122287507 ecr 23595005, nop, wscale 7, length 0 16:38:55.451829 IP macbook-air.52658 > pi3.31337 Flags , ack 1, win 229, options nop, nop, TS val 23595005 ecr 1222875071, length 0 What just happened? How do you know? (b) Your "uppercase" server from HW#2 is running. You type "Hi" on the client and press enter and the following happens 16:39:01.056250 IP macbook-air.52658 > pi3.31337: Flags [P., seq 1:4, ack 1, win 229, options [nop, nop, TS val 23596406 ecr 122287507, length 3 16:39:01.056551 IP p3.31337 > macbook-air.52 658: Flags , ack 4, win 227, options nop, nop, TS val 122288067 ecr 235964061, length 0 16:39:01057167 IP pi3.31337macbook-air.52658: Flags [P., seq 1:4, ack 4, win 227, options [nop, nop, TS val 122288067 ecr 23596406, length 3 16:39:01.057265 IP macbook-air.52658 > pi3.31337: Flags , ack 4, win 229, options [nop, nop, TS val 23596406 ecr 1222880671, length 0 Describe briefly what is going on in each packet. (c) After typing "bye" and receiving the result BYE you see the following set of packets: 16:39:16.168569 IP macbook-air52658 > p3.31337: Flags [F, seq 18, ack 18, win 229, options [nop, nop, TS val 23600184 ecr 122289578, length 0 16:39:16.168921 IP pi3.31337> macbook-air.52658: Flags [F.], seq 18, ack 19, win 227, options [nop, nop, TS val 122289578 ecr 23600184], length 0 16:39:16.168974 IP macbook-air.52658> pi3.31337: Flags [, ack 19, win 229, options nop, nop, TS val 23600184 ecr 122289578, length 0 What is going on with these packets? You use tcpdump to monitor our sockets programm from HW#2. Tcpdump can decode many of the TCP fields for you, the output shown below is the decoded packet sum hopefully obvious. In the "Flags" field, S-SYN, P-PSH, F-FIN, etc. Also note tcpdump by default uses "relative SEQ/ACK counts" which means after the initial packet it will print the difference rather than the raw SEQ/ACK values. mary. Fields like seq" and win" are (a) You start the server, then connect with the client and you see the following 16:38:55.451412 IP macbook-air.52658 > pi3.31337 Flags [S, seq 3649305635, win 29200, options mss 1460, sackoK, TS val 23595005 ecr 0, nop, wscale 71, length 0 16:38:55.451762 IP pi3.31337macbook-air.52658: Flags S.1, seq 2280757527, ack 3649305636, win 28960, options mss 1460, sackoK, TS val 122287507 ecr 23595005, nop, wscale 7, length 0 16:38:55.451829 IP macbook-air.52658 > pi3.31337 Flags , ack 1, win 229, options nop, nop, TS val 23595005 ecr 1222875071, length 0 What just happened? How do you know? (b) Your "uppercase" server from HW#2 is running. You type "Hi" on the client and press enter and the following happens 16:39:01.056250 IP macbook-air.52658 > pi3.31337: Flags [P., seq 1:4, ack 1, win 229, options [nop, nop, TS val 23596406 ecr 122287507, length 3 16:39:01.056551 IP p3.31337 > macbook-air.52 658: Flags , ack 4, win 227, options nop, nop, TS val 122288067 ecr 235964061, length 0 16:39:01057167 IP pi3.31337macbook-air.52658: Flags [P., seq 1:4, ack 4, win 227, options [nop, nop, TS val 122288067 ecr 23596406, length 3 16:39:01.057265 IP macbook-air.52658 > pi3.31337: Flags , ack 4, win 229, options [nop, nop, TS val 23596406 ecr 1222880671, length 0 Describe briefly what is going on in each packet. (c) After typing "bye" and receiving the result BYE you see the following set of packets: 16:39:16.168569 IP macbook-air52658 > p3.31337: Flags [F, seq 18, ack 18, win 229, options [nop, nop, TS val 23600184 ecr 122289578, length 0 16:39:16.168921 IP pi3.31337> macbook-air.52658: Flags [F.], seq 18, ack 19, win 227, options [nop, nop, TS val 122289578 ecr 23600184], length 0 16:39:16.168974 IP macbook-air.52658> pi3.31337: Flags [, ack 19, win 229, options nop, nop, TS val 23600184 ecr 122289578, length 0 What is going on with these packets

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Flash XML Applications Use AS2 And AS3 To Create Photo Galleries Menus And Databases

Authors: Joachim Schnier

1st Edition

0240809173, 978-0240809175

More Books

Students also viewed these Databases questions

Question

=+What is your native language?

Answered: 1 week ago