Solved by verified expert:There are two home works one with answers but not complete and you need to pharprase it and one with outAll involve networking tracing First you will need to download the app wire shark to start working then You must submit answers to the questions in a Word document and the Wire shark capture file. If you do not follow directions properly and answer each question and do plagiarism from the internet i wont accept it.Complete home work 4 and 3
asgn3___1_.docx
asgn3__answer.docx
4.docx
Unformatted Attachment Preview
Networks and Security
Assignment – 3
Maximum Points – 30
Date Due: Wednesday October 25, 2017
This assignment will enable you to understand how tracert works. You must submit
answers to the questions in a Word document and the Wireshark capture file. If you do
not follow directions properly you won’t get any credit.
Tracert and ICMP
In this class we used visual route/tracert to map the route from one networking device
to another. In this lab you will get an insight on the working of tracert.
• Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
• Trace route to a website such as www.facebook.com or another suitable domain
such as www.amazon.com, www.microsoft.com, www.nsf.gov etc.
• Use the command tracert if you are using Windows machine and
traceroute -P icmp if you are on a MAC.
• When the tracert program terminates, stop the packet capture in Wireshark.
• Filter the packets for ICMP packets
• Save the wireshark file using Save As command
1. Copy and paste information from the command window here.
2. What is the IP address of your host device? What is the IP address of the target
destination host?
3. Examine the ICMP echo (ping) request packet in your screenshot.
4. Examine any ICMP Time-to Live exceeded packet in your screenshot. It has more
fields than the ICMP echo packet. What is included in those fields?
5. Examine the last three ICMP packets received by the source host. How are these
packets different from the ICMP error packets? Why are they different?
6. Discuss clearly how tracert works.
7. What is TTL? Why TTL is necessary?
8. Discuss in detail what you learnt from this lab.
Assignment – 3
Maximum Points – 50
Date Due: Tuesday June 13, 2017
This assignment will enable you to understand how tracert works. You must submit
answers to the questions in a Word document and the Wireshark capture file. If you do
not follow directions properly you won’t get any credit.
Tracert and ICMP
In this class we used visual route/tracert to map the route from one networking device to
another. In this lab you will get an insight on the working of tracert.
• Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
• Trace route to a website such as www.facebook.com or another suitable domain
such as www.amazon.com, www.microsoft.com, www.nsf.gov etc.
• Use the command tracert if you are using Windows machine and
traceroute -P icmp if you are on a MAC.
• When the tracert program terminates, stop the packet capture in Wireshark.
• Filter the packets for ICMP packets
• Save the wireshark file using Save As command
1. Copy and paste information from the command window here.
2. What is the IP address of your host device? What is the IP address of the target
destination host?
3. Examine the ICMP echo (ping) request packet in your screenshot.
It starts with TTL 1. So TTL values are different.
4. Examine any ICMP Time-to Live exceeded packet in your screenshot. It has more
fields than the ICMP echo packet. What is included in those fields?
ICMP error packet. It contains the original IP packet.
5. Examine the last three ICMP packets received by the source host. How are these
packets different from the ICMP error packets? Why are they different?
Type 0 versus Type 11
6. Discuss clearly how tracert works.
Tracert utility sends packets with gradually increasing TTL value, starting with
TTL value = 1. The first router receives the packet, decrements the TTL value and
drops the packet because it then has TTL value zero. The router sends an ICMP
Time Exceeded error message (Type 11) back to the source and that contains the
address of the particular hop. The next packet is formatted with a TTL value of 2,
so the first router forwards the packets, but the second router drops it and replies
with ICMP TTL Exceeded. Proceeding in this way, tracert uses the returned
ICMP TTL Exceeded messages to build a list of routers that packets traverse,
until the destination is reached and returns an ICMP Echo Reply message (Type
0).
7. What is TTL? Why TTL is necessary?
Time to Live is a field in the IP packets. As we discussed earlier, IP packets are
reconstructed back in each hop. For some reason, it is possible that a packet may
be corrupted. In those cases, it is possible that packets could be in the Internet for
ever. To ensure such a scenario does not occur, a packet usually starts with a
TTL of 255. At each hop (router) it is reduced by 1. A hop no longer forwards the
packet once TTL reaches 0. Instead it sends an error message (ICMP, type 11) to
sender of the offending packet.
8. Discuss in detail what you learnt from this lab.
……………………….
Maximum Points – 40
Date Due: November 7, 2017
You will use ping command from the command prompts and capture the packets which are
sent back and forth using Wireshark and answer the following questions. While submitting you
must submit all the wireshark files and your answers in a word document.
Ping and ICMP
You may recall that the PING program is simple tool that allows anyone (for example, a network
administrator) to verify if a host is live or not. The PING program in the source host sends a
packet to the target IP address; if the target is live, the Ping program in the target host responds
by sending a packet back to the source host. As you might have guessed (given that this lab is
about ICMP), both of these PING packets are ICMP packets.
Do the following:
• Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
• ping nsf.gov using the command ping nsf.gov
• When the Ping program terminates, stop the packet capture in Wireshark.
• Save the wireshark file using Save As command
Now carefully inspect the wireshark window and answer the following questions:
1. What is the IP address of your host? 77.24
What is the IP address of the destination host? Destination: 192.168.223.1
Examine one of the ping request packets sent by your host. What are the ICMP type and
code numbers? What other fields does this ICMP packet have? How many bytes are the
checksum, sequence number and identifier fields?
2. Examine the corresponding ping reply packet. What are the ICMP type and code numbers?
What other fields does this ICMP packet have? How many bytes are the checksum,
sequence number and identifier fields?
IP Fragmentation
•
•
Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
ping nsf.gov using the command
ping -l 2000 nsf.gov (It is the letter l not 1)
•
•
If you are on an Apple Computer please use
ping -s 2000 nsf.gov
When the Ping program terminates, stop the packet capture in Wireshark.
Save the wireshark file using Save As command
1. Find the first ICMP Echo Request message that was sent by your computer.
2. Has that message been fragmented across more than one IP datagram?
[Hint: If you are filtering on ICMP make sure you undo that and filter on only IP. Look out
the flags portion]
3. What information in the IP header indicates that the datagram been fragmented?
4. What information in the IP header indicates whether this is the first fragment versus a latter
fragment?
5. How long is this IP datagram?
6. Print out the second fragment of the fragmented IP datagram. What information in the IP
header indicates that this is not the first datagram fragment? Are the more fragments? How
can you tell?
7. What fields change in the IP header between the first and second fragment?
8. How many fragments were created from the original datagram? Was fragmentation
absolutely essential? Discuss
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more