Professional Documents
Culture Documents
Lab4 202100887
Lab4 202100887
LAB – 2
WIRESHARK
Provide 3-screenshots showing the ping plotter traces after changing the
size to 56, 2000, and 3500 Bytes.
Size 56
Size 2000
Size 3000
Procedure
1. Download and install PingPlotter and Wireshark tools.
2. Use PingPlotter to send packets to a target website.
3. Capture packets using Wireshark during the packet sending process.
4. Send sets of datagrams with different lengths (56 bytes, 2000 bytes, and 3500
bytes).
5. Pause both PingPlotter and Wireshark after sending each set of datagrams.
6. Analyze the sent packets in Wireshark, focusing on the Internet Protocol Version
section and observing changes in identi cation, TTL, ags, offset, and Header
checksum with different packet lengths.
Discussions
1) What is the IP address of your computer? [ans+screenshot]
My computer’s IP is:192.168.100.41
2) Within the IP packet header, what is the value in the upper layer protocol eld?
[ans+screenshot]
ICMP
fi
fl
fi
3) What is the value of the Offset? [ans+screenshot]
Offset value is: 0
4) How many bytes are in the IP header? How many bytes are in the payload of theIP
datagram? Explain how you determined the number of payload bytes.
[ans+screenshot]
Ans: Number of bytes in the IP header: 20
Number of bytes in the Payload: 36
Calculation of the payload length: 56 (total length) - 20 (Datagram header)
fl
6) Which elds in the IP datagram always change from one datagram to the nextwithin
this series of ICMP messages sent by your computer?
The elds are: identi cation, Time to live(TTL) and Header checksum
7) Describe the pattern you see in the values in the Identi cation eld of the
IPdatagram.
The pattern observed is that the Identi cation eld in the IP header increases with
each ICMP Echo request.
8) What is the value in the Identi cation eld and the TTL eld? [ans+screenshot]
Identi cation: 0x0t2d(3885)
TTL:255
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
9) Do these values remain unchanged for all of the ICMP TTL-exceeded replies sentto
your computer by the nearest ( rst hop) router? Why?
Ans: No, The identi cation eld changes because it is assigned a unique value unless
the IP datagrams are fragmented, in which case multiple IP datagrams may have the
same identi cation value. On the other hand, the TTL eld remains constant as the TTL
for the rst hop router is consistently set to the same value
10) Find the rst ICMP Echo Request message that was sent by your computer after
you changed the Packet Size in pingplotter to be 2000. Has that message been
fragmented across more than one IP datagram? [ans+screenshot]
Yes, because the packet No.7 has the identi cation “0x101c” and the total length of
520. And in the packet No.6, it has the same identi cation which is “0x101c”and the
total length of 1500 This means the 2000 bytes has been fragmented into two packets
with same identi cation which is “0x101c”
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
11) Place a screenshot of the rst fragment of the fragmented IP datagram. What
information in the IP header indicates that the datagram been fragmented? What
information in the IP header indicates whether this is the rst fragment versus a latter
fragment?How long is this IP datagram? [ans+screenshot]
Ans: Information indicates that this datagram is fragmented: in ag section, the last bit
is 1, which indicates that this byte is fragmented and there’s more packets incoming
from the same datagram
Information indicates that this is the rst fragment: fragment offset is 0
Length of this datagram: 1500 including the header
12) Place a screenshot of the second fragment of the fragmented IP datagram. What
information inthe IP header indicates that this is not the rst datagram fragment? Are
the more fragments? How can you tell? [ans+screenshot]
Ans: Information indicates that this is not the rst fragment:
fragment offset is 1480
Are there more fragments: no
How can you tell: third bit in ag “More fragment : not set” and it’s 0, which indicates it’s false,
so there’s no more fragments
fl
fi
fi
fi
fi
fi
fl
13) What elds change in the IP header between the rst and second fragment?
Ans: elds: Total length, ags, fragment offset, and checksum.
14) How many fragments were created from the original datagram? [ans+screenshot]
Three,3
First =
Second=
Third=
fi
fi
fl
fi
15.How do you know that the fragments you found belong to the same original
datagram?
All of the packets with the same identi cation value of "0x87f5" are part of the same
datagram.
Conclusion
By observing the Maximum Segment Size (MSS), which is typically set to 1500, we
noticed a pattern. When we set the datagram size to 500, it utilized only one packet.
Similarly, for a datagram size of 2000, it used only two packets, and for a datagram
size of 3500, it used three packets.
fi