Wireshark Lab: TCP v7.0

Wireshark Lab: TCP v7.0

Answer the following questions, by opening the Wireshark captured packet file tcpethereal-trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip (that is
download the trace and open that trace in Wireshark; see footnote 2). Whenever possible,
when answering a question you should hand in a printout of the packet(s) within the trace
that you used to answer the question asked. Annotate the printout3 to explain your
answer. To print a packet, use File->Print, choose Selected packet only, choose Packet
summary line, and select the minimum amount of packet detail that you need to answer
the question.

在这里插入图片描述

1. What is the IP address and TCP port number used by the client computer (source)

that is transferring the file to gaia.cs.umass.edu? To answer this question, it’s
probably easiest to select an HTTP message and explore the details of the TCP
packet used to carry this HTTP message, using the “details of the selected packet
header window” (refer to Figure 2 in the “Getting Started with Wireshark” Lab if
you’re uncertain about the Wireshark windows.

在这里插入图片描述
The IP address is 192.168.1.102. The TCP port number is 1161



If you have been able to create your own trace, answer the following question

2.What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection?

The IP address is 128.119.245.12. The port number is 80.



3.What is the IP address and TCP port number used by your client computer (source) to transfer the file to gaia.cs.umass.edu?

在这里插入图片描述
The IP address is 10.63.206.180. The port number is 25424.



4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment?

在这里插入图片描述
 Sequence number of the TCP SYN segment: 0. It was the SYN falg which is set to 1 that identifies the segment as a SYN segment



5. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment?

在这里插入图片描述
 Sequence number of the SYNACK segment: 0.
 The value of the acknowledgement field: 1 (which is the sequence number of SYN plus 1)
 It was the SYN falg which is set to 1 that identifies the segment as a SYN segment



6. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you’ll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a “POST” within its DATA field.

在这里插入图片描述
 Sequence number of the TCP segment containing POST command: 1



7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection. What are the sequence numbers of the first six segments in the TCP connection (including the segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for each segment received? Given the difference between when each TCP segment was sent, and when its acknowledgement was received, what is the RTT value for each of the six segments? What is the EstimatedRTT value (see Section 3.5.3, page 242 in text) after the receipt of each ACK? Assume that the value of the EstimatedRTT is equal to the measured RTT for the first segment, and then is computed using the EstimatedRTT equation on page 242 for all subsequent segments.

Note: Wireshark has a nice feature that allows you to plot the RTT for
each of the TCP segments sent. Select a TCP segment in the “listing of
captured packets” window that is being sent from the client to the
gaia.cs.umass.edu server. Then select: Statistics->TCP Stream Graph->Round Trip Time Graph.
在这里插入图片描述在这里插入图片描述
在这里插入图片描述
在这里插入图片描述
在这里插入图片描述
在这里插入图片描述

E s t i m a t e d R T T = 7 8 L a s t    E s t i m a t e d R T T + 1 8 S a m p l e    R T T EstimatedRTT = \frac{7}{8}Last\;EstimatedRTT + \frac{1}{8}Sample\;RTT EstimatedRTT=87LastEstimatedRTT+81SampleRTT

在这里插入图片描述

8. What is the length of each of the first six TCP segments?

  See the table above.

9. What is the minimum amount of available buffer space advertised at the received for the entire trace? Does the lack of receiver buffer space ever throttle the sender?

在这里插入图片描述
The receiver window size grows steadily til a maximum sindow size comes.
No throttle is made due to the lack of buffer space.




10. Are there any retransmitted segments in the trace file? What did you check for (in the trace) in order to answer this question?

在这里插入图片描述
There is no retransmmited segment inthe trace file.
We just need to chekc the sequence numbers of the trace file.
All sequence numbers are in ascending order, which indicates that there is no retransmitted segment.


11.How much data does the receiver typically acknowledge in an ACK? Can you identify cases where the receiver is ACKing every other received segment (seeTable 3.2 on page 250 in the text).

在这里插入图片描述

12. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value.

164090/5.4294=30.222

13. Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence number versus time plot of segments being sent from the client to the gaia.cs.umass.edu server. Can you identify where TCP’s slowstart phase begins and ends, and where congestion avoidance takes over? Comment on ways in which the measured data differs from the idealized behavior of TCP that we’ve studied in the text.

To be continue

14. Answer each of two questions above for the trace that you have gathered when you transferred a file from your computer to gaia.cs.umass.edu

To be continue

  • 10
    点赞
  • 52
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
### 回答1: Wireshark Lab: TCP v7.0 是一套用于学习和理解 TCP 协议的实验材料。通过这套实验材料,可以学习 TCP 建立连接的三次握手过程、数据传输过程中的流量控制和拥塞控制、TCP 连接终止的四次挥手过程等内容。同时,也可以通过实验了解 Wireshark 工具的使用方法,Wireshark 是一款流行的网络协议分析工具,可以用于捕获和分析网络数据包。 Wireshark Lab: TCP v7.0 包含一系列的实验,每个实验都配有详细的指导说明和实验要求,可以帮助用户逐步掌握 TCP 协议和 Wireshark 工具的使用。这套实验材料适合计算机网络和信息安全领域的学生、从业者以及对网络协议感兴趣的人士学习使用。 ### 回答2: 在Wireshark实验室TCP V7.0中,我们继续研究TCP协议。TCP(传输控制协议)是一种在计算机网络中使用的基于连接的协议,常用于互联网协议(IP)套接字。 本实验室中,我们观察了TCP流的详细数据包分析。我们学习了TCP协议中的流控制和拥塞控制机制,以及TCP如何应对网络丢包和重传数据的情况。 在该实验室中,我们使用了基于Linux的虚拟机来模拟一个TCP协议的请求响应场景。我们模拟了从客户端发送HTTP请求,到服务器返回响应的流程。我们使用了Wireshark这个强大的网络协议分析工具来捕获和解析网络数据包,以观察网络流量和分析网络传输。 在观察TCP协议的过程中,我们发现TCP是一个可靠但是较慢的协议。当网络出现问题时,它会花费很多时间来重传数据,从而保证数据完整性。我们也学习了TCP的拥塞控制机制。当网络拥塞时,TCP会自适应地调整传输速率,以避免网络出现更多的拥塞。 总之,Wireshark实验室TCP V7.0是一个非常有用的实验室,它向我们展示了TCP协议的更多细节和机制,使我们深入了解TCP如何在网络中工作。随着更多的网络应用程序在今后的发展中涌现出来,我们相信TCP协议还将继续发挥重要作用。 ### 回答3: Wireshark是一个开源的网络协议分析工具,可以用于抓取网络数据包,并对这些数据包进行分析和解码。Wireshark可以分析不同类型的协议,包括TCP、UDP、HTTP等。 本次实验主要是让我们使用Wireshark工具来分析TCP协议的数据包,了解TCP如何建立连接,传输数据以及释放连接等过程。我们使用的是一个HTTP文件下载的例子来说明TCP的工作过程。 在实验中,我们通过Wireshark进行数据包抓取和分析,可以看到TCP协议在传输数据时,会通过三次握手建立连接,并且在传输数据过程中进行数据校验和序列号的确认。TCP协议还具有可靠性,即数据包在传输中如果丢失或者出错,TCP会进行重传和数据校验,确保数据的完整性和正确性。同时,在TCP传输完成后,还会进行四次挥手来释放连接。 通过实验,我们进一步了解了TCP协议的工作原理以及在网络通信中的应用,这对我们深入学习和应用网络技术具有相当的帮助。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值