Question: This computer networking question Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request

This computer networking question

This computer networking question Question 1: Analyze the given peap file and

Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request message and answer the following questions: a) What is the IP address of host computer?(2) b) Within the IP packet header, what is the value in the upper layer protocol fleld? (2) c) How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the numbor of payload bytos. (6) d) Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. (5) 2. Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the "details of selected packet header" window. In the "listing of captured packets" window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer. a) Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? (5) b) Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why? (5) e) Describe the pattern you see in the values in the Identification field of the IP datagram. (5) Question 1: Analyze the given peap file and answer the following questions. (30 Marks) 1. Select the first ICMP Echo request message and answer the following questions: a) What is the IP address of host computer?(2) b) Within the IP packet header, what is the value in the upper layer protocol fleld? (2) c) How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the numbor of payload bytos. (6) d) Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. (5) 2. Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the "details of selected packet header" window. In the "listing of captured packets" window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer. a) Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? (5) b) Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why? (5) e) Describe the pattern you see in the values in the Identification field of the IP datagram

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!