Solution: What Is The IP Address of Your Computer?

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Họ và tên: Trần Nhật Huy

MSSV: 1913566
LAB 4A
1) Select the first ICMP Echo Request message sent by your computer, and expand
the Internet Protocol part of the packet in the packet details window.
What is the IP address of your computer?
SOLUTION
The IP address of my computer is 192.168.1.102

2) Within the IP packet header, what is the value in the upper layer protocol field?
SOLUTION
The value of the upper layer protocol field is ICMP (0X01)
3) How many bytes are in the IP header? How many bytes are in the payload of the
IP datagram? Explain how you determined the number of payload bytes.
According to the figure 1, the header length is 20 bytes and the total length is 56
bytes. Therefore, the payload of the IP datagram should be 36 bytes (56 bytes – 20
bytes).
4. Has this IP datagram been fragmented? Explain how you determined whether or not the
datagram has been fragmented.
This IP datagram has not been fragmented. I know this because the more fragments bit has not been
set.
5. Which fields in the IP datagram always change from one datagram to the next within this
series of ICMP messages sent by your computer?
The header checksum and the Identification changes from each datagram to the next.
6. Which fields stay constant? Which of the fields must stay constant? Which fields must
change? Why?
Fields that stay constant:
- Version (IPv4)
- Length of header
- Source IP (sending from same place)
- Destination IP (contacting same site)
- Upper layer protocol (always using ICMP)
Fields that must stay constant:
- Same as above
The fields that must change are:
- The header checksum (header changes)
- Identification (to verify packets)
7. Describe the pattern you see in the values in the Identification field of the IP datagram
The value of the identification field is incremented by 1 on every new outgoing
message.
8. What is the value in the Identification field and the TTL field?
Identification: 42507
TTL: 244

9. Do these values remain unchanged for all of the ICMP TTL-exceeded replies sent to your
computer by the nearest (first hop) router? Why?
- The Identification field changes from all of the replies because this field has to have a
unique value. If they (2 or more replies) have the same value then the replies must be
fragments of a bigger packet.
- The TTL field does not change because the time to live to the first hop router is always
the same.
10. Find the first ICMP Echo Request message that was sent by your computer after you changed
the Packet Size in pingplotter to be 2000. Has that message been fragmented across more than
one IP datagram?
Yes, that message has been fragmented across more than one IP datagram.
11. Print out the first fragment of the fragmented IP datagram. What information in the IP header
indicates that the datagram been fragmented? What information in the IP header indicates
whether this is the first fragment versus a latter fragment? How long is this IP datagram?
The fact that the flag is set fot more segments shows that the datagram has been fragmented (see
above). The fragment offset is set to 0 indicating that this is the first fragment rather than a latter
fragment where that value is set to 1480. The datagram has a total length of 1500.

12. Print out the second fragment of the fragmented IP datagram. What information in the IP
header indicates that this is not the first datagram fragment? Are the more fragments? How can
you tell?
The second fragment is obvious because it now has a a fragment offset of 1480. There are no
more fragments because it no longer has a flag set for more fragments.
13. What fields change in the IP header between the first and second fragment?

The fields that change are:


- Length
- Flags set
- Fragment offset
- Header checksum

14. How many fragments were created from the original datagram?

After switching to 3500 bytes, 3 fragments are created.


15. What fields change in the IP header among the fragments?
The fields that change are the fragment offset (0, 1480, 2960) and checksum. The first 2 packets also
have lengths of 1500 and more fragments flags set, while the last fragment is shorter (540) and does
not have a flag set.

You might also like