Question

Backgound

The Internet Protocol (IP), the main protocol in the Internet layer of the TCP/IP protocol suite, is used to route datagrams from source to destination based on the logical (IP) addresses. Like UDP, IP is a connectionless protocol. This means that we cannot find any frame with the source or sink at the network layer. An IP header can be captured only when an upper-layer protocol uses IP.

The Internet Control Message Protocol (ICMP) is an auxiliary protocol at the network layer. It is designed for two purposes. It reports errors (unexpected conditions) about IP, UDP, and TCP. It can also be used to check the liveliness of the hosts or routers or finds the route followed by an IP datagram.

Start your web browser and clear the browser's cache memory, but do not access any site yet.
Open Wireshark and start capturing.
Go back to your web browser and retrieve any file from a site. Wireshark startscapturing packets.
After enough packets have been captured, stop Wireshark and save the capturedfile.
In the packet list pane, select any packet. In the packet detail pane, select the Internet Protocol. The hexdump of the IP header will be highlighted in the packet byte lane.

Tasks

Part 1. IP

1. Using the hexdump and consulting Figure 19.2 in the textbook, create a word processing document that demonstrates completion of the following tasks. (Include the questions and supporting screenshots in your document.)

a. IP version.

b. header length and number of bytes in the header.

c. service type.

d. total length.

e. identification.

f. set flags.

g. fragmentation offset.

h. TTL value.

i. upper-layer protocol.

j. checksum.

k. source IP address.

l. destination IP address.

2. Demonstrate if answers to question 1 are verified by information in packet detail pane.

3. If the checksum field in the packet detail pane is marked correct, can we conclude that the IP payload is not corrupted? Explain.

4. Is the datagram fragmented? Explain.

5. Does source or destination address belong to one of the special addresses? If yes, which one?

6. How many bytes of data are in IP payload?


Part 2. ICMP

Open Wireshark and start capturing.
Open Command Prompt and type ping hostname. The hostname can be the domain name or the IP address of a site you know (be sure that there is no firewall to filter out the packets).
Return to the Wireshark window, stop packet capturing, and save the captured file.


1. What is the destination IP address?

2. How many ping messages are sends?

3. How many bytes of data are in each ping message?

4. What is the round-trip time for each packet?

5. Filter for icmp. What is the destination IP address of Echo request ICMP messages? Does the result agree with question 1?

6. How many Echo request ICMP packet are in the packet list pane? How many Echoreply ICMP packets are in the packet list pane? Does the result agree with the information with question 2?

7. How many bytes of data are carried by each ICMP packet? Does the result agree with question 3?

8. Evaluate the difference between the time the first Echo message was sent and the time the first reply message was received. Does the result agree with question 4?

5. Comparing Echo request ICMP messages with Echo reply ICMP message, determine

a. What fields are the same? Explain the reason.

b. What fields are different? Explain the reason.

9. Comparing all Echo request ICMP messages, determine

a. What fields are the same? Explain the reason.

b. What fields are different? Explain the reason.

10. In one paragraph, explain what you have learned by performing this project.


Purpose

This assignment gives you experience with a white paper, a detailed written document about a technical topic. You will review, analyze, summarize, and critique a white paper by writing a critical review.   

Background

Writing a critical review requires you to read the selected white paper in detail so that you can present a fair and reasonable analysis of the selected text. A critical review does not mean to criticize in a negative manner. It asks requires you to question the information and present your evaluation of the material.

White Paper

The assignment white paper to review is:

Building a Forensically Capable Network

Instructions

Write a 1-2 page (excluding the title and reference pages) critical review in APA style using word processing software. Your critical review should include a title page, an introduction, a summary of the key points of the white paper, a critique of the strengths and weaknesses of the text, a conclusion, and a reference page

Solution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

Networking Standards and Protocols

This is only a preview of the solution. Please use the purchase button to see the entire solution

Assisting Tutor

Related Homework Solutions

Networking and Administration Questions
Homework Solution
$75.00
Computer Science
Networking
Administration
Data Communication
Routers
VPN
Implementation
Schemes
Graphs
MPLS Cloud
Security
Payroll
DHCP
Short Discussion on HTTP, FTP, SMTP, IMAP, and POP3
Homework Solution
$8.00
HTTP
FTP
SMTP
IMAP
POP3
Protocol
Application
TCP
UDP
File
Transfer
Hyper
Text
Mail
Post office
Internet
Message
Access
Network
Security
Computer Science
Network Security Solutions (570 words)
Homework Solution
$13.00
Short
Paper
Network
Provider
Security
Solution
Cisco
Barracuda
Company
Benefit
Device
Router
Switch
Perimeter
Vendor
Port
Segment
Get help from a qualified tutor
Live Chats