0% found this document useful (0 votes)
43 views

Lab Manual 7

The document provides instructions for analyzing TCP, UDP, and ICMP packets using Wireshark. It contains 3 lab statements with steps and questions about analyzing sample packet capture files to observe the structure and workings of each protocol.

Uploaded by

k
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Lab Manual 7

The document provides instructions for analyzing TCP, UDP, and ICMP packets using Wireshark. It contains 3 lab statements with steps and questions about analyzing sample packet capture files to observe the structure and workings of each protocol.

Uploaded by

k
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

National University of Computer and Emerging Sciences

Laboratory Manuals
for
Computer Networks

(CL -307)

Course Instructor
Lab Instructor(s)
Section
Semester

Department of Computer Science


FAST-NU, Lahore, Pakistan

Page 1 of 5
Lab Manual 07

Objective:
 Observing the structure and working of TCP, UDP and ICMP Protocols in Wireshark.

Lab Statement 1: Analyzing TCP Packets using Wireshark


(10)

 Step 1: Run Wireshark.


 Step 2: Load the trace file tcp-ethereal-trace-1

 Step 3: Now filter out all TCP packets by typing “tcp” (without quotes) in the filter field
towards the top of the Wireshark window. You should see a series of TCP and HTTP
messages between the host in MIT and gaia.cs.umass.edu. The first three packets of the
trace consist of the initial three-way handshake containing the SYN, SYN ACK and ACK
messages. You should see a series of “TCP Segment of Reassembled PDU” messages
being sent from the host in MIT to gaia.cs.umass.edu. Recall from the previous lab that
there is no such thing as an HTTP Continuation message – this is Wireshark’s way of
indicating that there are multiple segments being used to carry a single HTTP message.
You should also see TCP ACK segments being returned from gaia.cs.umass.edu to the
host in MIT.

Question 1: What is the IP address and TCP port number used by the client computer
(source) that is transferring the file to gaia.cs.umass.edu?

Question 2: What is the IP address of gaia.cs.umass.edu? On what port number is it


sending and receiving TCP segments for this connection?

Question 3: What is the sequence number of the TCP SYN segment that is used to
initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is
in the segment that identifies the segment as a SYN segment?

Question 4: What is the sequence number of the SYNACK segment sent by


gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the
Acknowledgement field in the SYNACK segment? What is it in the segment that
identifies the segment as a SYNACK segment?

Page 2 of 5
*Question 5: In packet 9, Ack = 2026 and Seq = 1. Explain these values?

*Question 6: In packet 16, Ack = 7866 and Seq = 1. Explain these values?

Question 7: Why Wireshark uses relative sequence and ack?

Lab Statement 2: Analyzing UDP Packets using Wireshark


(5)

 Step 1: Run Wireshark


 Step 2: Load the trace file dns-ethereal-trace-2.

 Step 3: Now filter out all non-UDP packets by typing “udp” (without quotes) in the filter
field towards the top of the Wireshark window
 Step 4: Analyze the UDP Packets and answer the following questions

Question 1: Select the first DNS packet in the trace. Determine, how many fields there
are in the UDP header

Question 2: From the packet content field (click on any header and observe the display
in the Packet Bytes Window), determine the length (in bytes) of each of the UDP header
fields.

Question 3: The value in the Length field is the length of what? Verify your claim using
the selected packet.

Question 4: What is the port number to query the DNS Server?

Lab Statement 3: Analyzing ICMP Packets using Wireshark


(5)
 Step 1: Run Wireshark
 Step 2: Load the Session file ICMP_Session

 Step 3: Now filter out all non-ICMP packets by typing “icmp” (without quotes) in the
filter field towards the top of the Wireshark window

 Step 4: Analyze the ICMP Packets and answer the following questions

Page 3 of 5
1- Are ICMP messages sent over UDP or TCP?

2- What is the link-layer (e.g., Ethernet) address of the


host?
3- Which kind of request is sent through these ICMP
packets?
4- How many requests are sent through the host?

5- What is the IP address of your host? What is the IP


address of the destination host?
6- Why is it that an ICMP packet does not have source
and destination port numbers?
7- What values in the ICMP request message
differentiate this message from the ICMP reply
message?

8- Examine one of the ping request packets sent by your


host. What are the ICMP type and code numbers?
What other fields does this ICMP packet have? How
many bytes are the checksum, sequence number and
identifier fields?

9- Examine the corresponding ping reply packet. What


are the ICMP type and code numbers? What other
fields does this ICMP packet have? How many bytes
are the checksum, sequence number and identifier
fields?

10-Examine the packet no 56. What are the ICMP type


and code numbers? Why is the IP and TCP Header
included in the ICMP Header? What does these
headers depict?

Page 4 of 5
Page 5 of 5

You might also like