C_Stottlemeyer_ECET375_WK4_Lab
.docx
keyboard_arrow_up
School
DeVry University, Chicago *
*We aren’t endorsed by this school
Course
375
Subject
Computer Science
Date
Jun 4, 2024
Type
docx
Pages
11
Uploaded by cls8879
WEEK 4 LAB
ECET 375
MARCH 31, 2019
CHRIS STOTTLEMEYER
Procedure:
I.
ARP protocol
To get started, startup the Wireshark program and open the capture file: ecet-
375WebBrowsing.pcap. This capture file was generated while surfing the Internet. You will see a window as shown below.
Follow the activities shown below and provide your answer to the questions.
a)
Highlight the Packet 97. i)
What is the protocol in this packet?
A.) The protocol is ARP.
ii)
What is the size of this packet?
A.) The size of this packet is 42 bytes.
b)
The Tree View pane shows all the protocols which form the Packet 97. The lowest layer, the physical layer data, is shown first, followed by the Ethernet layer, and then the Network layer. Expand the Address Resolution Protocol header.
i)
How many bytes is the ARP header? A.) There are 4 bytes in the ARP header.
ii)
Copy the ARP header bytes here. [Right click on the ARP protocol and select
Copy->Bytes (Hex Stream). Paste here by doing CTL + V. See figure below]
A.) 00010800060400010014a5f38dafc0a8012d000000000000c0a
80101
i)
Arrange the data in rows, each row with eight digits.
A.)
00010800
06040001
0014a5f3
8dafc0a8
012d0000
00000000
c0a80101
ii)
Identify the ARP protocol fields in the arrangement at iii) Provide your results
in the following table:
Hardware Type 0001
Protocol Type 0800
Hardware Size 06
Protocol Size 04
Command Type 0001
Sender Data Link Layer (MAC) …. 00 14 a5 f3 8d af
Address c0 a8 01 2d
Sender Network Layer ….
IP Address c0a8 012d
Target Data Link Layer 0000 0000 0000
MAC Address 0000 0000 0000
Target Network Layer IP Address c0a8 0101
c)
Highlight the Packet 98. i)
What is the protocol in this packet?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Decoding Data
Instructions
Hint: First do Google search for ‘packet dump decode’. Then cut and paste the block of data below into the input data section. Then press decode. You will be able to find the answer from the decoding result.
For the payload of the application layer, take the last few bytes in ASCII. It’s not in the packet dump, because it is not a part of header. You can use the ASCII character table to manually convert them. If you understanding the layer 4 destination port #, you understand what it is asking for. There is only one kind of information for the port #.
Data block to be decoded:
00 11 bc b5 49 40 b8 8d 12 00 0d fa 08 00 45 00
00 37 99 09 00 00 ff 11 ea 9f 0a 07 03 1a 42 aa
e8 41 c7 19 00 35 00 23 a3 9e 02 90 01 00 00 01
00 00 00 00 00 00 05 6d 69 74 72 65 03 6f 72 67
00 00 01 00 01
Please answer the following question after decoded the above data block:
Q1: (Layer 4) Protocol is:, Source MAC address:, Destination MAC address:, Source IP…
arrow_forward
PROJECT 2 - Data Transfer Efficiency
A packet consists of a header and a payload. The header is fixed at 20 bytes. The range of the user data
to be transferred over the network is from 64 bytes to 1518 bytes with an increment of 1 byte, i.e., 64,
65, 66, ..., 1518.
Plot transfer efficiency vs size of user data (y-axis is efficiency, x-axis is size of user data) on three
different plots corresponding to these cases:
(a) Maximum packet size = 100 bytes
(b) Maximum packet size = 500 bytes
(c) Maximum packet size = 2000 bytes
Clearly label the axes and the ranges.
What can you conclude looking at those three plots?
You may use Excel or your favorite programming language to generate the plots.
Submit the following on Canvas:
The plots AND the answer to the above question in PDF format.
• Your code.
arrow_forward
PACKET SNIFFERS: Please define/describe a PACKET SNIFFER and a PROTOCOL ANALYZER. (They are different). This will take more than a few sentences. You will most likely need 10 sentences or up to 1/4 of a page @ 12 font and 1 1/2 in spacing.
Define both UNICAST and BROADCAST TRAFFIC. This will be 1 or 2 lines maximum.
Pick 1 decimal number. List the equivalent for a) Binary b) Hexidecimal. Google is your friend for this one!
TRANSMISSION MEDIA TYPES. Please name each one and for each one, using a minimum of 2 sentences each, describe them physically and how they are used.
arrow_forward
TCP MULTIPLEXING AND DEMULTIPLEXING
In the scenario below, the left and right TCP clients communicate with a TCP server using TCP sockets. The Python code used to create a single
welcoming socket in the server is shown in the figure (the welcoming socket itself is not shown graphically); code is also shown for the client sockets
as well. The three sockets shown in server were created as a result of the server accepting connection requests on this welcoming socket from the
two clients (one connection from the client on the left, and two connections from the client on the right).
mySocket =
socket (AF_INET, SOCK_STREAM)
mySocket.bind (myaddr, 6189 );
P1
mySocket =
socket (AF_INET, SOCK_STREAM)
mySocket.bind (myaddr, 5854 );
U
transport
network
link
physical
QUESTION 2 OF 8
B
source port: ?
dest port: ?
What is the destination port # for packet C?
P4 P5 P6
transport
network
link
physical
A
source port: ?
dest port: ?
mySocket1 =
socket (AF_INET, SOCK_STREAM)
mySocket1.bind (myaddr, 5262…
arrow_forward
TCP MULTIPLEXING AND DEMULTIPLEXING
In the scenario below, the left and right TCP clients communicate with a TCP server using TCP sockets. The Python code used to create a single
welcoming socket in the server is shown in the figure (the welcoming socket itself is not shown graphically); code is also shown for the client sockets
as well. The three sockets shown in server were created as a result of the server accepting connection requests on this welcoming socket from the
two clients (one connection from the client on the left, and two connections from the client on the right).
mySocket =
socket (AF_INET, SOCK_STREAM)
mySocket.bind (myaddr, 6189 );
P1
Answer
mySocket =
socket (AF_INET, SOCK_STREAM)
mySocket.bind (myaddr, 5854 );
♫
transport
QUESTION 1 OF 8
network
link
physical
What is the source port # for packet C?
www
B
source port: ?
dest port: ?
P4
HIGH
A
source port: ?
dest port: ?
P5 P6
transport
network
lirk
physical
mySocket1 =
socket (AF_INET, SOCK_STREAM)
mySocket1.bind…
arrow_forward
Internal path length:
External path length:
arrow_forward
What is the distinction between blocking and nonblocking with respect to messages?
arrow_forward
Establish a list of DNS records, classifying each one according to the kind of record it includes, and then arrange this list. Examples of each of them, along with an explanation of why it is advisable to make use of them, have been provided for your perusal. Do you feel it is feasible to have a web server and a mail server both use the same name at the same time?
arrow_forward
If you are transmitting a large file, you must utilise cypher block chaining or cypher feedback mode.
How much more efficient is one?
arrow_forward
Tunneling procedure? Which three tunneling protocols exist?
arrow_forward
Cypher block chaining and cypher feedback mode may be compared with regards to the number of encryption operations needed to transmit a large file.How much more efficient is one option than the other?
arrow_forward
11. TCP receiver window:
O is an internal trasmitter parameter
O is a 32-bit number
O is related to the buffer space
D is constant for a certain connection
arrow_forward
Topic: Fibonacci Sequence
1. If F23 = 28 657 and F25 = 75 025, F24 =?
2. If two successive terms of a Fibonacci sequence are both odd, then the next term is?
Type a message...
arrow_forward
Assignment 2
Page Replacement
A computer has four page frames. The time of loading, time of last access, and
the R and M bits for each page are as shown below (the times are in clock ticks):
Page Loaded Last ref. R M
126
279
230
260
1 0
120
272
11
3.
160
280
11
1. Which page will NRU replace?
2. Which page will FIFO replace?
3. Which page will LRU replace?
4. Which page will second chance replace?
arrow_forward
Explain how headers are inserted as a data packet goes from the lower to the top levels.
arrow_forward
Non-Repudiation and Anonymity ProtocolsFor the Zhou-Gollman non-repudiation protocol discussed in the lecture on “Non-Repudiation and Anonymity Protocols”, which one of the following statements is false:a) At time point 4, both A and B can produce evidence to prove that they received Kb) At time point 2, both A and B can produce evidence to prove that they received a signed message from the other partyc) At time point 0, S cannot prove anythingd) At time point 3, B cannot produce evidence to prove that A has access to key Ke) At time point 1, A can prove that B is alivef) At time point 4, S can prove that A is aliveg) At time point 3, S can produce evidence that that A has access to key Kh) At time point 0, A is not alivei) At time point 2, A can produce evidence to prove that B is alivej) At time point 4, the protocol terminatesExplain your answer below:
arrow_forward
5. Expand the information on the Transmission Control Protocol for this packet in
the Wireshark “Details of selected packet” window (see Figure 3 in the lab
writeup) so you can see the fields in the TCP segment carrying the HTTP
message. What is the destination port number (the number following “Dest Port:”
for the TCP segment containing the HTTP request) to which this HTTP request is
being sent?
arrow_forward
Both TCP and UDP are separate protocols that may be contrasted with one another. Give us an example of two circumstances in which you, as a software architect, might choose to make use of TCP rather than UDP.
arrow_forward
Computer Networks - Internet Architecture & Application Layer
Please answer the question
Someone suggested to use a local file called hosts.txt on each machine instead of DNS. Discuss the advantages (at least 2) and disadvantages (at least 2) of such suggestion. What is ‘saw-tooth’ behavior in TCP, and what is causing it?
arrow_forward
Both TCP and UDP are separate protocols that may be contrasted with one another. Give us an example of two situations in which you, as a software architect, might choose to make use of TCP rather than UDP.
arrow_forward
For NAT Network Address Translation Scenario: Jenny Bello is a small business owner selling and making customized computer peripherals. She has been finding it difficult to track her sales and inventories, however recently after an expert's advice, she adopted a Point of Sale (PoS) server. So, she can now track her sales and inventories at the store. However, she ran into another issue, the server can only be accessed within the store, because it has been assigned a private IPv4 address, it is not publicly accessible via the Internet.
a) Why is not having the PoS server accessible over the Internet a problem for the business?
b) What caused this problem?
c) Propose a solution for the problem and explain how the solution works.
arrow_forward
16K
10K
8K
Window
Size
B
Wisth
E
A
F
Time
1) The window size of the TCP sender decreases at several points in the graph,
including those marked by B and D.
a) Name the event occurred at B that causes the sender to decrease its window.
Triple duplicate ACK
b) "At event B, the network is fully congested, and it cannot deliver any packet to
the receiver". Is the previous statement "True" or "False"? If it is "False", change
any wording to make the statement correct. Justify your answer.
c) Name the event occurred at D that causes the sender to decrease its window.
TimeOut
d) "At event D, the network is fully congested, and it cannot deliver any packet to
the receiver". Is the previous statement "True" or "False"? If it is "False", change
any wording to make the statement correct. Justify your answer.
arrow_forward
Multiple Access Protocols: This is a 6 part question... you dont have to do 19 and 20 they are just there for context, just 21-24
arrow_forward
The tunneling process entails what steps, exactly? Can you name the three protocols used for tunneling?
arrow_forward
Question 18
Assume that you have received an encoded message that uses the rail-fence technique with a key of 3.
ipoatsaheushemoypsix
What is the decrypted message?
Note: Type in the message exactly as you decrypt it.
• No spaces
No uppercase letters
arrow_forward
Please solve it correctly and please provide explanation of your answers.
Please answer parts g, h and i.
A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ.
g) The second segment from webserver was corrupted. So the PC…
arrow_forward
A portion of the header of a UDP segment is captured as 8-bit hexadecimal numbers as shown below.
00 35 D2 71 00 86
For this UDP header, the checksum in hexadecimal is Ox[a] and the length of the UDP segment in decimal is [b].
Note: do not include 'Ox' in your first answer.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Decoding Data Instructions Hint: First do Google search for ‘packet dump decode’. Then cut and paste the block of data below into the input data section. Then press decode. You will be able to find the answer from the decoding result. For the payload of the application layer, take the last few bytes in ASCII. It’s not in the packet dump, because it is not a part of header. You can use the ASCII character table to manually convert them. If you understanding the layer 4 destination port #, you understand what it is asking for. There is only one kind of information for the port #. Data block to be decoded: 00 11 bc b5 49 40 b8 8d 12 00 0d fa 08 00 45 00 00 37 99 09 00 00 ff 11 ea 9f 0a 07 03 1a 42 aa e8 41 c7 19 00 35 00 23 a3 9e 02 90 01 00 00 01 00 00 00 00 00 00 05 6d 69 74 72 65 03 6f 72 67 00 00 01 00 01 Please answer the following question after decoded the above data block: Q1: (Layer 4) Protocol is:, Source MAC address:, Destination MAC address:, Source IP…arrow_forwardPROJECT 2 - Data Transfer Efficiency A packet consists of a header and a payload. The header is fixed at 20 bytes. The range of the user data to be transferred over the network is from 64 bytes to 1518 bytes with an increment of 1 byte, i.e., 64, 65, 66, ..., 1518. Plot transfer efficiency vs size of user data (y-axis is efficiency, x-axis is size of user data) on three different plots corresponding to these cases: (a) Maximum packet size = 100 bytes (b) Maximum packet size = 500 bytes (c) Maximum packet size = 2000 bytes Clearly label the axes and the ranges. What can you conclude looking at those three plots? You may use Excel or your favorite programming language to generate the plots. Submit the following on Canvas: The plots AND the answer to the above question in PDF format. • Your code.arrow_forwardPACKET SNIFFERS: Please define/describe a PACKET SNIFFER and a PROTOCOL ANALYZER. (They are different). This will take more than a few sentences. You will most likely need 10 sentences or up to 1/4 of a page @ 12 font and 1 1/2 in spacing. Define both UNICAST and BROADCAST TRAFFIC. This will be 1 or 2 lines maximum. Pick 1 decimal number. List the equivalent for a) Binary b) Hexidecimal. Google is your friend for this one! TRANSMISSION MEDIA TYPES. Please name each one and for each one, using a minimum of 2 sentences each, describe them physically and how they are used.arrow_forward
- TCP MULTIPLEXING AND DEMULTIPLEXING In the scenario below, the left and right TCP clients communicate with a TCP server using TCP sockets. The Python code used to create a single welcoming socket in the server is shown in the figure (the welcoming socket itself is not shown graphically); code is also shown for the client sockets as well. The three sockets shown in server were created as a result of the server accepting connection requests on this welcoming socket from the two clients (one connection from the client on the left, and two connections from the client on the right). mySocket = socket (AF_INET, SOCK_STREAM) mySocket.bind (myaddr, 6189 ); P1 mySocket = socket (AF_INET, SOCK_STREAM) mySocket.bind (myaddr, 5854 ); U transport network link physical QUESTION 2 OF 8 B source port: ? dest port: ? What is the destination port # for packet C? P4 P5 P6 transport network link physical A source port: ? dest port: ? mySocket1 = socket (AF_INET, SOCK_STREAM) mySocket1.bind (myaddr, 5262…arrow_forwardTCP MULTIPLEXING AND DEMULTIPLEXING In the scenario below, the left and right TCP clients communicate with a TCP server using TCP sockets. The Python code used to create a single welcoming socket in the server is shown in the figure (the welcoming socket itself is not shown graphically); code is also shown for the client sockets as well. The three sockets shown in server were created as a result of the server accepting connection requests on this welcoming socket from the two clients (one connection from the client on the left, and two connections from the client on the right). mySocket = socket (AF_INET, SOCK_STREAM) mySocket.bind (myaddr, 6189 ); P1 Answer mySocket = socket (AF_INET, SOCK_STREAM) mySocket.bind (myaddr, 5854 ); ♫ transport QUESTION 1 OF 8 network link physical What is the source port # for packet C? www B source port: ? dest port: ? P4 HIGH A source port: ? dest port: ? P5 P6 transport network lirk physical mySocket1 = socket (AF_INET, SOCK_STREAM) mySocket1.bind…arrow_forwardInternal path length: External path length:arrow_forward
- What is the distinction between blocking and nonblocking with respect to messages?arrow_forwardEstablish a list of DNS records, classifying each one according to the kind of record it includes, and then arrange this list. Examples of each of them, along with an explanation of why it is advisable to make use of them, have been provided for your perusal. Do you feel it is feasible to have a web server and a mail server both use the same name at the same time?arrow_forwardIf you are transmitting a large file, you must utilise cypher block chaining or cypher feedback mode. How much more efficient is one?arrow_forward
- Tunneling procedure? Which three tunneling protocols exist?arrow_forwardCypher block chaining and cypher feedback mode may be compared with regards to the number of encryption operations needed to transmit a large file.How much more efficient is one option than the other?arrow_forward11. TCP receiver window: O is an internal trasmitter parameter O is a 32-bit number O is related to the buffer space D is constant for a certain connectionarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education