Find the first tcp handshake

Assignment Help Computer Networking
Reference no: EM13751031

1. Find the first TCP handshake. What are the packet numbers in the handshake? The three packet numbers ____, _____, and _____.

2. What is the IP address of the host that started the handshake? __________________

3. What is the TCP port connection pair for this handshake? ______, ______

4. In the first packet of the handshake, the source port is the ephemeral port this host wants to use for the connection, and the destination port indicates the application the host wants to use on the serving host. What application does the host want to use on the serving host?______________

5. Look at packet number 14. Is this part of the conversation initiated by the first handshake? ______

Build a filter to see only the first handshake and the conversation for this connection.

Click Analyze (or "Edit" on other versions of ethereal) and select Display Filters from the drop-down list. This brings you to the Edit Display Filters List.

Click "Expression"

Expand TCP (click the plus sign next to TCP), and highlight "Source (src.port)".

In the Relation section highlight == .

In the Value field type the source port used by the host that initiated the conversation. (The source port should be 1097 in this example).

Click "OK". Now there is a filter string in the Edit Display Filter List window. (The filter string should be "tcp.port == 1097".)

In the Filter name box type "Conversation on Source Port 1097". Click New, then OK. Now you have defined a filter (but not yet applied it).

Apply the filter to the trace file.

Find the Filter button near the top left corner of the window and click it. (Note for older versions: If you don't see the Filter button, make sure the browser window is maximized and your task bar is not covering the bottom.)

Highlight "Conversation on Source Port 1097" and click Apply. (You will see the filter string in the filter field. You could also have typed in the filter by hand. You can take the filter off by clicking the Clear button next to the filter field at the bottom.).

The handshake establishes the initial sequence numbers for each connection. Try to follow the sequence numbers in the conversation. Now change the display to show relative sequence numbers:

Click Edit and select Preferences from the drop-down list.

Drill down into Protocols until you get to TCP.

Highlight TCP and select the options, "Analyze TCP sequence numbers" and "Relative sequence numbers and window scaling." Click OK. Try again to follow the sequence numbers.

You cannot see the "next sequence number" in the summary pane for packet number 6. Look for it in the protocol tree pane. Explain why packet number 7 says "ACK =344."

Reference no: EM13751031

Questions Cloud

How will you resolve the cybercrime : You are the chief information security officer (CISO) for VL Bank as depicted in the attached "VL Bank Case Study." How will you resolve the cybercrime
Technology sourcing and internal innovation : You have a choice to use either an existing company or a fictitious company(Please use a real company). Technology Sourcing and Internal Innovation and Product Development Strategy
What do you think are the likely consequences of the risk : What do you think are the likely consequences of the risk and What do you think is the likelihood of the risk occurring
Bonnie charitable contributions : Bonnie's charitable contributions and AGI for the past four years were as follows:
Find the first tcp handshake : Find the first TCP handshake. What are the packet numbers in the handshake? The three packet numbers and What is the IP address of the host that started the handshake
An international business compete more effectively : How can an efficient logistics function help an international business compete more effectively in the global marketplace
Examine culture as shared meanings : Examine culture as "shared meanings" and the "story of who we think we are." Explore assumptions and sharpen ideas on similarities and differences across cultures.
Parties [identify the plaintiff and the defendant : 1. Read and understand the case. Show your Analysis and Reasoning and make it clear you understand the material. Be sure to use the concepts of the course to show your reasoning. Summarize the situation. Dedicate at least one heading to each followin..
Write essay on the secession crisis and the jim crow world : Write an essay on the following topics- Antebellum White Society, The Secession Crisis, Free Labor and Violence in Reconstruction and The Jim Crow World.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd