What is the sequence number of the tcp syn segment

Assignment Help Computer Networking
Reference no: EM131535706

Wireshark Lab - TCP

Reference: Computer Networks: A Top-Down Approach (Kurose & Ross)

This lab studies the behavior of the IP transport control protocol (TCP).  Namely, this will be done by analyzing a trace of TCP segments that are sent and received in transferring a 150KB file from a client's computer to a remote server. The use of  sequence and acknowledgement numbers will be investigated for  providing reliable data transfer.  The TCP slow-start and congestion avoidance algorithms will also be investigate as well as receiver-based flow control.  TCP connection setup will also be briefly reviewed along with the performance (throughput and round-trip time) of the TCP connection between a client computer and the server. Note that this lab is presented within the context of the Microsoft Windows operating system.

Answer the following questions -

1) What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? To answer this question, note that it is easier to select a HTTP message and explore the details of the TCP packet used to carry this HTTP message (using the "details of the selected packet header window").

2) What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection?

TCP Basics -

Answer the following questions for the TCP segments:

1) What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment?

2) What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment?

3) What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you will need to check the packet content field at the bottom of the Wireshark window, i.e., for a segment with a "POST" within its DATA field.

4) Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection. What are the sequence numbers of the first six segments in the TCP connection (including the segment containing the HTTP POST)?  When was each segment sent? When was the ACK for each segment received? Given the difference between when each TCP segment was sent and when its acknowledgement was received, what is the RTT value for each of the six segments?

5) What is the length of each of the first six TCP segments?

6) What is the minimum amount of available buffer space advertised at the received for the entire trace? Does the lack of receiver buffer space ever throttle the sender?

7) Are there any retransmitted segments in the trace file? What did you check for (in the trace) in order to answer this question?

8) How much data does the receiver typically acknowledge in an ACK?

9) What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value.

10) Use the Time-Sequence-Graph plotting tool to view the sequence number versus time plot of segments being sent from the client to the gaia.cs.umass.edu server. Can you identify where TCP's slow start phase begins and ends, and where congestion avoidance takes over? Comment on ways in which the measured data differs from the idealized behavior of TCP.

Attachment:- Assignment Files.rar

Reference no: EM131535706

Questions Cloud

What is the flotation cost adjustment : What is the flotation cost adjustment that must be added to its cost of retained earnings?
What is the magnitude of the acceleration : observe and describe what happens when two balls, three balls, and finally four balls are swinging, and record your observations.
Declare bankruptcy : Company X has issued $200,000 in bonds but it has to declare bankruptcy.
Describe the indirect method of reporting cash flows : Use the following information to determine this company's cash flows from investing activities.
What is the sequence number of the tcp syn segment : What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer
Compute the company cash flow on total assets ratio : Use the following financial statements and additional information to (1) prepare a statement of cash flows for the year ended June 30, 2011.
Find what is fords weighted average cost of capital : Ford's debt trades with a yield to maturity of 9.5%. What is Ford's weighted average cost of capital if its tax rate is 30 percent?
Zero coupon bonds to get duration neutral : What position would you need to take in 20-year zero coupon bonds to get duration neutral?
Amount of units does samuelson have to produce during month : what amount of units does Samuelson have to produce during the month of January? A. 4,000 units.

Reviews

len1535706

6/19/2017 1:09:57 AM

All the information on the project attached. Please I need accurate and correct work. I also attached the file needed to complete the assignment. All submissions must be done on Canvas. You are required to submit a single file in either word or pdf form. Answer all the questions, providing the appropriate screenshots where asked. Mention your Name and student number at the top right of the page in the header.

len1535706

6/19/2017 1:09:51 AM

Download the Wireshark file trace named “tcp_trace” from the Canvas course section and open it (i.e., open chose the file “tcp_trace” from the directory where it is saved). Before analyzing the behavior of the TCP connection in detail, take a further look at this trace. Namely, filter the packets displayed in the Wireshark window by entering “tcp” (lowercase, no quotes) into the display filter specification window towards the top of the Wireshark window.

Write a Review

Computer Networking Questions & Answers

  The purpose of this two-part project is to compute the

the purpose of this two-part project is to compute the students ability to analyze security requirements and prepare a

  How can p2p file-sharing networks make money

What social issues are raised by P2P file-sharing protocols and programs such as BitTorrent? Is the record industry justified in attempting to shut them down? Why or why not?

  Draw the state graph for a finite-state machine

You have an account at First National Usury Trust (FNUT) and a card to operate their ATM (automated teller machine). Once you have inserted your card.

  Determine maximum value for tcp sequence numbers

Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number filed has four bytes.

  What is the purpose of priority queuing

Which queuing technique reserves channel bandwidth for selected data traffic?

  Explain potential issues associated with ip ownership

Assess the potential issues associated with IP ownership in organizations today. Suggest the factors organizations should consider when determining the ownership of IP and including IP ownership clauses into contracts.

  Search the web for security education and training program

Search the Web for security education and training program in your area. Keep a list and see which category has the most examples. See if you can determine the costs associated with example. Which do you think would be more cost-effective in terms of..

  Design a wide area network wan between offices

Design a wide area network WAN between offices that includes the appropriate math calculations to meet the bandwidth. Describe the general type of LAN connections and hardware that will be used to interconnect the offices.

  Protocols involved in establishing a site-to-site vpn

Analyze the basic protocols involved in establishing a site-to-site VPN connection between two or more sites.

  Document risk event-impact-probability and impact

Identify the top three risks in this situation. For each risk, document its risk event, impact, probability, impact rating/risk exposure, and mitigation strategy.

  Create a quality five minute video tutorial of pluralsight

Create a quality five minute video tutorial of the completed Pluralsight lesson including key points taken from the lesson.

  Recognize the dsl and cable modem services referenced in

research dsl and cable modem services available closest to your community. you may use neighboring communities or

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd