What is the maximum number of bytes

Assignment Help Basic Computer Science
Reference no: EM13768927

The Assignment

Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets. It's also likely that just by doing nothing (except capturing packets via Wireshark) that some UDP packets sent by others will appear in your trace. In particular, the Simple Network Management Protocol (SNMP) sends SNMP messages inside of UDP, so it's likely that you'll find some SNMP messages (and therefore UDP packets) in your trace.

After stopping packet capture, set your packet filter so that Wireshark only displays the UDP packets sent and received at your host. Pick one of these UDP packets and expand the UDP fields in the details window. If you are unable to find UDP packets or are unable to run Wireshark on a live network connection, you can download a packet trace containing some UDP packets.

Whenever possible, when answering a question below, you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout3 to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn't look in the textbook! Answer these questions directly from what you observe in the packet trace.) Name these fields.

2. By consulting the displayed information in Wireshark's packet content field for this packet, determine the length (in bytes) of each of the UDP header fields.

3. The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet.

4. What is the maximum number of bytes that can be included in a UDP payload? (Hint: the answer to this question can be determined by your answer to 2. above)

5. What is the largest possible source port number? (Hint: see the hint in 4.)

6. What is the protocol number for UDP? Give your answer in both hexadecimal and decimal notation. To answer this question, you'll need to look into the Protocol field of the IP datagram containing this UDP segment (see Figure 4.13 in the text, and the discussion of IP header fields).

7. Examine a pair of UDP packets in which your host sends the first UDP packet and the second UDP packet is a reply to this first UDP packet. (Hint: for a second packet to be sent in response to a first packet, the sender of the first packet should be the destination of the second packet). Describe the relationship between the port numbers in the two packets.

Reference no: EM13768927

Questions Cloud

Determining the financing analysis : Given a property information. Research on loan terms and assumptions, calculations on equity vs. debt, use of special financing programs (like tax credits), calculation of effective borrowing costs and/or lender yields.
Is shaming right : Is Shaming Right, Shame on You (or Shame on the Judge) Recently, some courts and some judges have ordered punishments that "shame" defendants as a result of the crimes these defendants have committed
Research and describe the concept of hrd : Research and describe the concept of HRD change in an organization. In addition, rationalize suitable interventions to address emotions of change by choosing one of the following theories to assess and evaluate.
Determine the necessity for a one-to-one correspondence : Compare differing conceptualizations of the mind and how the mind is studied - Determine the necessity for a one-to-one correspondence between a specific representation.
What is the maximum number of bytes : What is the maximum number of bytes that can be included in a UDP payload. The value in the Length field is the length of what
Identify the deficiency initiated new policy-law or program : Type of focusing event and date that it occurred; president and FEMA Director;
Effect of power transmission lines on human body : Effect of power transmission lines on human body.
Change management - driver only operations : Brief Introduction to the key concepts of Change Management and a "desktop" review of potential barriers and safety concerns
Looking to finance a plant in latin america : Despite some of the business challenges that you identified about your chosen country, you decided to move ahead and open an office in the financial center of this country. Your first customer is a large MNC that is looking to finance a plant in L..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use the graphics class to draw a line between the points

Given a graphics object g, write a few lines of code to have that graphics object draw a magenta circle (not filled in) that has a diameter of 200 pixels. What does invoking the base class paintComponent method accomplish?

  Function drawlinegraph that generates a line graph

Write a function DrawLineGraph that generates a line graph given an array of x-coordinate values, a second array of corresponding y-coordinate values, and the number of data points.

  Write a program to manage a dictionary

Then ask whether the user wants to add this new word to the dictionary. If the answer is yes, do so and go back to request the next word.

  How procedure calls go before registers saved in memory

How deep can the procedure calls go before registers must be saved in memory? (That is, what is the maximum number of "active'' procedure calls that can be made before we need to save any registers in memory?)

  Review julie hilden arguments

Review Julie Hilden's arguments

  Explain modern technology now embrace some technologies

Ten years ago there were still organizations that did not rely upon computer technology. These included small businesses that still took cash or checks and were not set up to handle credit or debit cards.

  We are interrupted or disintegrated

Research is compelling that it takes us approximately 4 to minutes return to our work with the same level of through processes whenever we are interrupted or disintegrated. Is it possible to information is fairly constant?

  Explain a pro or a con in a computer

Since the beginning, computers have trended to larger word sizes, 8 to 16 to 32 and now some 64 bit computers. Explain a pro or a con in a computer with a larger word size, or comment on someone else's pro or con.

  Explain the differences between server-side and client

Explain the differences between server-side and client - side scripting languages. Please provide at least 3 advantages and disadvantages of each. Please cite your sources if needed.

  Develop a program that will allow the district sales manager

You have been asked to develop a program that will allow the district sales manager to input each of the dealership's ID along with their four quarterly sales volumes for the year, calculate and display each quarter's rebate and the sales bonus fo..

  Design a circuit that takes two 3-bit binary number

design a circuit that takes two 3-bit binary numbers A2A1A0 and B2B1B0 as inputs and that has single output L that is "one" if and only if A2A1A0 is less than B2B1B0. Your design can make use of NOT gates, XNOR gates, AND gates and OR gates as requir..

  Which three editions vista allow to join domain on network

Which three editions of Vista allow you to join a domain on a network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd