Expert answer:Information system Networks and Security ASSIGNMEN

Solved by verified expert:There are two home works one with answers but not complete and you need to pharprase it and one with outAll involve networking tracing First you will need to download the app wire shark to start working then You must submit answers to the questions in a Word document and the Wire shark capture file. If you do not follow directions properly and answer each question and do plagiarism from the internet i wont accept it.Complete home work 4 and 3
asgn3___1_.docx

asgn3__answer.docx

4.docx

Unformatted Attachment Preview

Networks and Security
Assignment – 3
Maximum Points – 30
Date Due: Wednesday October 25, 2017
This assignment will enable you to understand how tracert works. You must submit
answers to the questions in a Word document and the Wireshark capture file. If you do
not follow directions properly you won’t get any credit.
Tracert and ICMP
In this class we used visual route/tracert to map the route from one networking device
to another. In this lab you will get an insight on the working of tracert.
• Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
• Trace route to a website such as www.facebook.com or another suitable domain
such as www.amazon.com, www.microsoft.com, www.nsf.gov etc.
• Use the command tracert if you are using Windows machine and
traceroute -P icmp if you are on a MAC.
• When the tracert program terminates, stop the packet capture in Wireshark.
• Filter the packets for ICMP packets
• Save the wireshark file using Save As command
1. Copy and paste information from the command window here.
2. What is the IP address of your host device? What is the IP address of the target
destination host?
3. Examine the ICMP echo (ping) request packet in your screenshot.
4. Examine any ICMP Time-to Live exceeded packet in your screenshot. It has more
fields than the ICMP echo packet. What is included in those fields?
5. Examine the last three ICMP packets received by the source host. How are these
packets different from the ICMP error packets? Why are they different?
6. Discuss clearly how tracert works.
7. What is TTL? Why TTL is necessary?
8. Discuss in detail what you learnt from this lab.
Assignment – 3
Maximum Points – 50
Date Due: Tuesday June 13, 2017
This assignment will enable you to understand how tracert works. You must submit
answers to the questions in a Word document and the Wireshark capture file. If you do
not follow directions properly you won’t get any credit.
Tracert and ICMP
In this class we used visual route/tracert to map the route from one networking device to
another. In this lab you will get an insight on the working of tracert.
• Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
• Trace route to a website such as www.facebook.com or another suitable domain
such as www.amazon.com, www.microsoft.com, www.nsf.gov etc.
• Use the command tracert if you are using Windows machine and
traceroute -P icmp if you are on a MAC.
• When the tracert program terminates, stop the packet capture in Wireshark.
• Filter the packets for ICMP packets
• Save the wireshark file using Save As command
1. Copy and paste information from the command window here.
2. What is the IP address of your host device? What is the IP address of the target
destination host?
3. Examine the ICMP echo (ping) request packet in your screenshot.
It starts with TTL 1. So TTL values are different.
4. Examine any ICMP Time-to Live exceeded packet in your screenshot. It has more
fields than the ICMP echo packet. What is included in those fields?
ICMP error packet. It contains the original IP packet.
5. Examine the last three ICMP packets received by the source host. How are these
packets different from the ICMP error packets? Why are they different?
Type 0 versus Type 11
6. Discuss clearly how tracert works.
Tracert utility sends packets with gradually increasing TTL value, starting with
TTL value = 1. The first router receives the packet, decrements the TTL value and
drops the packet because it then has TTL value zero. The router sends an ICMP
Time Exceeded error message (Type 11) back to the source and that contains the
address of the particular hop. The next packet is formatted with a TTL value of 2,
so the first router forwards the packets, but the second router drops it and replies
with ICMP TTL Exceeded. Proceeding in this way, tracert uses the returned
ICMP TTL Exceeded messages to build a list of routers that packets traverse,
until the destination is reached and returns an ICMP Echo Reply message (Type
0).
7. What is TTL? Why TTL is necessary?
Time to Live is a field in the IP packets. As we discussed earlier, IP packets are
reconstructed back in each hop. For some reason, it is possible that a packet may
be corrupted. In those cases, it is possible that packets could be in the Internet for
ever. To ensure such a scenario does not occur, a packet usually starts with a
TTL of 255. At each hop (router) it is reduced by 1. A hop no longer forwards the
packet once TTL reaches 0. Instead it sends an error message (ICMP, type 11) to
sender of the offending packet.
8. Discuss in detail what you learnt from this lab.
……………………….
Maximum Points – 40
Date Due: November 7, 2017
You will use ping command from the command prompts and capture the packets which are
sent back and forth using Wireshark and answer the following questions. While submitting you
must submit all the wireshark files and your answers in a word document.
Ping and ICMP
You may recall that the PING program is simple tool that allows anyone (for example, a network
administrator) to verify if a host is live or not. The PING program in the source host sends a
packet to the target IP address; if the target is live, the Ping program in the target host responds
by sending a packet back to the source host. As you might have guessed (given that this lab is
about ICMP), both of these PING packets are ICMP packets.
Do the following:
• Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
• ping nsf.gov using the command ping nsf.gov
• When the Ping program terminates, stop the packet capture in Wireshark.
• Save the wireshark file using Save As command
Now carefully inspect the wireshark window and answer the following questions:
1. What is the IP address of your host? 77.24
What is the IP address of the destination host? Destination: 192.168.223.1
Examine one of the ping request packets sent by your host. What are the ICMP type and
code numbers? What other fields does this ICMP packet have? How many bytes are the
checksum, sequence number and identifier fields?
2. Examine the corresponding ping reply packet. What are the ICMP type and code numbers?
What other fields does this ICMP packet have? How many bytes are the checksum,
sequence number and identifier fields?
IP Fragmentation


Start up the Wireshark packet sniffer, and begin Wireshark packet capture.
ping nsf.gov using the command
ping -l 2000 nsf.gov (It is the letter l not 1)


If you are on an Apple Computer please use
ping -s 2000 nsf.gov
When the Ping program terminates, stop the packet capture in Wireshark.
Save the wireshark file using Save As command
1. Find the first ICMP Echo Request message that was sent by your computer.
2. Has that message been fragmented across more than one IP datagram?
[Hint: If you are filtering on ICMP make sure you undo that and filter on only IP. Look out
the flags portion]
3. What information in the IP header indicates that the datagram been fragmented?
4. What information in the IP header indicates whether this is the first fragment versus a latter
fragment?
5. How long is this IP datagram?
6. Print out the second fragment of the fragmented IP datagram. What information in the IP
header indicates that this is not the first datagram fragment? Are the more fragments? How
can you tell?
7. What fields change in the IP header between the first and second fragment?
8. How many fragments were created from the original datagram? Was fragmentation
absolutely essential? Discuss

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP