Find the first tcp handshake

Assignment Help Computer Networking
Reference no: EM13751031

1. Find the first TCP handshake. What are the packet numbers in the handshake? The three packet numbers ____, _____, and _____.

2. What is the IP address of the host that started the handshake? __________________

3. What is the TCP port connection pair for this handshake? ______, ______

4. In the first packet of the handshake, the source port is the ephemeral port this host wants to use for the connection, and the destination port indicates the application the host wants to use on the serving host. What application does the host want to use on the serving host?______________

5. Look at packet number 14. Is this part of the conversation initiated by the first handshake? ______

Build a filter to see only the first handshake and the conversation for this connection.

Click Analyze (or "Edit" on other versions of ethereal) and select Display Filters from the drop-down list. This brings you to the Edit Display Filters List.

Click "Expression"

Expand TCP (click the plus sign next to TCP), and highlight "Source (src.port)".

In the Relation section highlight == .

In the Value field type the source port used by the host that initiated the conversation. (The source port should be 1097 in this example).

Click "OK". Now there is a filter string in the Edit Display Filter List window. (The filter string should be "tcp.port == 1097".)

In the Filter name box type "Conversation on Source Port 1097". Click New, then OK. Now you have defined a filter (but not yet applied it).

Apply the filter to the trace file.

Find the Filter button near the top left corner of the window and click it. (Note for older versions: If you don't see the Filter button, make sure the browser window is maximized and your task bar is not covering the bottom.)

Highlight "Conversation on Source Port 1097" and click Apply. (You will see the filter string in the filter field. You could also have typed in the filter by hand. You can take the filter off by clicking the Clear button next to the filter field at the bottom.).

The handshake establishes the initial sequence numbers for each connection. Try to follow the sequence numbers in the conversation. Now change the display to show relative sequence numbers:

Click Edit and select Preferences from the drop-down list.

Drill down into Protocols until you get to TCP.

Highlight TCP and select the options, "Analyze TCP sequence numbers" and "Relative sequence numbers and window scaling." Click OK. Try again to follow the sequence numbers.

You cannot see the "next sequence number" in the summary pane for packet number 6. Look for it in the protocol tree pane. Explain why packet number 7 says "ACK =344."

Reference no: EM13751031

Questions Cloud

How will you resolve the cybercrime : You are the chief information security officer (CISO) for VL Bank as depicted in the attached "VL Bank Case Study." How will you resolve the cybercrime
Technology sourcing and internal innovation : You have a choice to use either an existing company or a fictitious company(Please use a real company). Technology Sourcing and Internal Innovation and Product Development Strategy
What do you think are the likely consequences of the risk : What do you think are the likely consequences of the risk and What do you think is the likelihood of the risk occurring
Bonnie charitable contributions : Bonnie's charitable contributions and AGI for the past four years were as follows:
Find the first tcp handshake : Find the first TCP handshake. What are the packet numbers in the handshake? The three packet numbers and What is the IP address of the host that started the handshake
An international business compete more effectively : How can an efficient logistics function help an international business compete more effectively in the global marketplace
Examine culture as shared meanings : Examine culture as "shared meanings" and the "story of who we think we are." Explore assumptions and sharpen ideas on similarities and differences across cultures.
Parties [identify the plaintiff and the defendant : 1. Read and understand the case. Show your Analysis and Reasoning and make it clear you understand the material. Be sure to use the concepts of the course to show your reasoning. Summarize the situation. Dedicate at least one heading to each followin..
Write essay on the secession crisis and the jim crow world : Write an essay on the following topics- Antebellum White Society, The Secession Crisis, Free Labor and Violence in Reconstruction and The Jim Crow World.

Reviews

Write a Review

Computer Networking Questions & Answers

  A sub-network design that needs of acme corporation

Acme Computing Corp. has remote sites in Port Clinton and Napoleon in addition to their main site in Toledo. There are currently 29 devices connected to the network in Toledo.

  How and why are these processes more complex in a modern

1.describe authentication and authorization. which depends on the other? how and why are these processes more complex

  What are the main telecommunications transmission media and

1. what are the principal components of telecommunications networks and key networking technologies?2.describe the

  Determine number wait states for proper system operation

How many wait states (clock cycles) need to be inserted for proper system operation if bus clocking rate is 8 MHz?

  The childrenrsquos online privacy protection act coppa and

the childrenrsquos online privacy protection act coppa and the childrenrsquos internet protection act cipa are both

  Write characteristics of smtp-pop3-tcpprotocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols? What are they used for?

  Explain the steps take to stop cyber squatter

First protective strategy which is to register your trademark a trademark it can. Having it listed in the government registry is the right way to go, registry.

  Features to facilitate overcoming limits of security

What features do they incorporate to facilitate overcoming limits of security, merchant risk, cost, etc.? How do they validate cardholder identities?

  A rural medical centre in australia plans to improve its

a rural medical centre in australia plans to improve its services to the community by providing telemedicine and

  What types of devices are available today to secure a

write a 2-4 page paper on network security your paper should include the following topicsmiddot how a secure

  Determine total end-to-end delay to send packet of length l

Suppose that switches user store-and forward packet switching, determine the total end-to-end delay to send packet of length L?

  Determine rtcp bandwidth that each sender be assignied

Let the RTP session comprising of four users, all of which are sending and receiving packets to same multicast address. Determine RTCP bandwidth that each sender be assignied?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd