Answers should all be in lowercase with no spaces between hex characters when hexadecimal is the answer expected.  All hex values must start with 0x, which stands for hexadecimal and therefore include 0x in your answers. Q1: What Transport protocol is encapsulated in the packet trace? Answer: The Transport protocol is encapsulated in the packet trace is:   Q2. What is the value in hexadecimal of the  Destination port address? Answer: The  value in hexadecimal of the  Destination Port Address is:   Q3: What is the value in hexadecimal of the Transport header Checksum? Answer: The value in hexadecimal of the Transport header Checksum is:   Q4: What is the value in hexadecimal of the Sequence Number? Answer: The value in hexadecimal of the Sequence Number is:   Q5: What is the value in hexadecimal of the Source Transport Port Address? Answer: The value in hexadecimal of the Source Port Address is:

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Answers should all be in lowercase with no spaces between hex characters when hexadecimal is the answer expected. 

All hex values must start with 0x, which stands for hexadecimal and therefore include 0x in your answers.

Q1: What Transport protocol is encapsulated in the packet trace?

Answer: The Transport protocol is encapsulated in the packet trace is:  

Q2. What is the value in hexadecimal of the  Destination port address?

Answer: The  value in hexadecimal of the  Destination Port Address is:  

Q3: What is the value in hexadecimal of the Transport header Checksum?

Answer: The value in hexadecimal of the Transport header Checksum is:  

Q4: What is the value in hexadecimal of the Sequence Number?

Answer: The value in hexadecimal of the Sequence Number is:  

Q5: What is the value in hexadecimal of the Source Transport Port Address?

Answer: The value in hexadecimal of the Source Port Address is: 

Ox0000: 4500 0611 66f9 4000 4006 c697 c0a8 e782 E...f.@.@..
Ox0010: 6b14 f416 9a88 0lbb bc20 5fld 15b9 654e k.
Ox0020: 5018 ab40 Od5a 0000 1703 0305 e400 0000 P..@.Z.
Ox0030: 0000 0000 037e d222 445d 3b59 5dc4 feea
Ox0040: ebc1 b5a6 39c8 a333 d716 2682 17c8 08ec
Ox0050: 7d39 8f87 2d13 0fa7 ebla 2cla 00c1 6bcd }9..
Ox0060: d4c1 de38 4862 a382 039c 83bd d390 ld9f
eN
"D];Y].
9..3..&..
.k.
....
...8Hb.
Ox0070: 3a05 e656 3740 bcb7 eded 72a3 9db9 fb66 :..V7@.
..r.
Ox0080: 3bfO 5f3f d579 095c 861c 2727 132d de0a
;._?.y.\..
Ox0090:
Оx00а0:
9067 db12 9204 c38d d413 5d4d 78bd 95e0
6f52 3900 9fac c59c 9df5 60fe 1901 37db oR9.
. ]Mx...
..7.
.g.
Оx00b0: f34a fbe5 5f52 сlа4 2ff5 67е3 9bdf 66f7
.J.. R../.g...f.
Transcribed Image Text:Ox0000: 4500 0611 66f9 4000 4006 c697 c0a8 e782 E...f.@.@.. Ox0010: 6b14 f416 9a88 0lbb bc20 5fld 15b9 654e k. Ox0020: 5018 ab40 Od5a 0000 1703 0305 e400 0000 P..@.Z. Ox0030: 0000 0000 037e d222 445d 3b59 5dc4 feea Ox0040: ebc1 b5a6 39c8 a333 d716 2682 17c8 08ec Ox0050: 7d39 8f87 2d13 0fa7 ebla 2cla 00c1 6bcd }9.. Ox0060: d4c1 de38 4862 a382 039c 83bd d390 ld9f eN "D];Y]. 9..3..&.. .k. .... ...8Hb. Ox0070: 3a05 e656 3740 bcb7 eded 72a3 9db9 fb66 :..V7@. ..r. Ox0080: 3bfO 5f3f d579 095c 861c 2727 132d de0a ;._?.y.\.. Ox0090: Оx00а0: 9067 db12 9204 c38d d413 5d4d 78bd 95e0 6f52 3900 9fac c59c 9df5 60fe 1901 37db oR9. . ]Mx... ..7. .g. Оx00b0: f34a fbe5 5f52 сlа4 2ff5 67е3 9bdf 66f7 .J.. R../.g...f.
Byte
Offset
Byte
Offset 0 ILLL L
IHL (Header
Length)
Version
Type of Service (TOS)
Total Length
Source Port
Destination Port
IP Flags
x D M
Identification
Fragment Offset
4
Sequence Number
20
Bytes
20
Time To Live (TTL)
Protocol
Header Checksum
8
Acknowledgment Number
Bytes
IHL
(Internet
Header
Length)
▬▬- ▬▬▬ I▬▬
Offset
12
TCP Flags
CEUAPRSF
Source Address
12
Offset
Reserved
Window
16
Destination Address
16
Checksum
Urgent Pointer
---
----
20
IP Option (variable length, optional, not common)
20
TCP Options (variable length, optional)
1 2 3 4 5 6 7'8 9 . 1 2 3 4 5'6 7 8 9 0 12 3'4 5 67 8 9 0
1 2 3 4 56 7 8 9% 1 2 34 5 6 7 8 9
01 2 3 45 6 7'8 9 0 1 2 3 4 5'6 7 89 0 1 2 3'4 5 6 78 9 0
+Nibble F Byte
+Nibble FByte F Word
Word
TCP Flags
Congestion Notification
TCP Options
Offset
Version
IP Flags
Protocol
Fragment Offset
Version of IP Protocol. 4 and
6 are valid. This diagram
represents version 4
structure only.
IP Protocol ID. Including (but
not limited to):
1 ICMP 17 UDP
O End of Options List
1 No Operation (NOP, Pad)
2 Maximum segment size
3 Window Scale
CEUAP RS F
ECN (Explicit Congestion
Notification). See RFC
3168 for full details, valid
states below.
Number of 32-bit words in
TCP header, minimum value
of 5. Multiply by 4 to get
byte count.
Fragment offset from start of
IP datagram. Measured in 8
byte (2 words, 64 bits)
increments. If IP datagram is
fragmented, fragment size
(Total Length) must be a
multiple of 8 bytes.
X D M
Congestion Window
C Ox80 Reduced (CWR)
E Ox40 ECN Echo (ECE)
U Ox20 Urgent
A Ox10 Ack
P Ox08 Push
R Ox04 Reset
S Ox02 Syn
F Ox01 Fin
x Ox80 reserved (evil bit)
D Ox40 Do Not Fragment
M Ox20 More Fragments
57 SKIP
2 IGMP 47 GRE 88 EIGRP
89 OSPF
115 L2TP
6 TCP
50 ESP
4 Selective ACK ok
Packet State DSB ECN bis
Syn 00 11
Syn-Ack 00 01
Ack 01 00
Header Length
9 IGRP 51 AH
8 Timestamp
RFC 793
follow
RFC 791
Checksum
Please refer to RFC 793 for
Number of 32-bit words in
TCP header, minimum value
Total Length
Header Checksum
No Congestion 01
No Congestion 10
the complete Transmission
Control Protocol (TCP)
Specification.
00
00
Please refer to RFC 791 for
Total length of IP datagram,
or IP fragment if fragmented.
Measured in Bytes.
Checksum of entire TCP
segment and pseudo
header (parts of IP header)
of 5. Multiply by 4 to get byte
Checksum of entire IP
header
the complete Internet
Protocol (IP) Specification.
Congestion 11
00
01
count.
Receiver Response
1
Sender Response
11
11
Transcribed Image Text:Byte Offset Byte Offset 0 ILLL L IHL (Header Length) Version Type of Service (TOS) Total Length Source Port Destination Port IP Flags x D M Identification Fragment Offset 4 Sequence Number 20 Bytes 20 Time To Live (TTL) Protocol Header Checksum 8 Acknowledgment Number Bytes IHL (Internet Header Length) ▬▬- ▬▬▬ I▬▬ Offset 12 TCP Flags CEUAPRSF Source Address 12 Offset Reserved Window 16 Destination Address 16 Checksum Urgent Pointer --- ---- 20 IP Option (variable length, optional, not common) 20 TCP Options (variable length, optional) 1 2 3 4 5 6 7'8 9 . 1 2 3 4 5'6 7 8 9 0 12 3'4 5 67 8 9 0 1 2 3 4 56 7 8 9% 1 2 34 5 6 7 8 9 01 2 3 45 6 7'8 9 0 1 2 3 4 5'6 7 89 0 1 2 3'4 5 6 78 9 0 +Nibble F Byte +Nibble FByte F Word Word TCP Flags Congestion Notification TCP Options Offset Version IP Flags Protocol Fragment Offset Version of IP Protocol. 4 and 6 are valid. This diagram represents version 4 structure only. IP Protocol ID. Including (but not limited to): 1 ICMP 17 UDP O End of Options List 1 No Operation (NOP, Pad) 2 Maximum segment size 3 Window Scale CEUAP RS F ECN (Explicit Congestion Notification). See RFC 3168 for full details, valid states below. Number of 32-bit words in TCP header, minimum value of 5. Multiply by 4 to get byte count. Fragment offset from start of IP datagram. Measured in 8 byte (2 words, 64 bits) increments. If IP datagram is fragmented, fragment size (Total Length) must be a multiple of 8 bytes. X D M Congestion Window C Ox80 Reduced (CWR) E Ox40 ECN Echo (ECE) U Ox20 Urgent A Ox10 Ack P Ox08 Push R Ox04 Reset S Ox02 Syn F Ox01 Fin x Ox80 reserved (evil bit) D Ox40 Do Not Fragment M Ox20 More Fragments 57 SKIP 2 IGMP 47 GRE 88 EIGRP 89 OSPF 115 L2TP 6 TCP 50 ESP 4 Selective ACK ok Packet State DSB ECN bis Syn 00 11 Syn-Ack 00 01 Ack 01 00 Header Length 9 IGRP 51 AH 8 Timestamp RFC 793 follow RFC 791 Checksum Please refer to RFC 793 for Number of 32-bit words in TCP header, minimum value Total Length Header Checksum No Congestion 01 No Congestion 10 the complete Transmission Control Protocol (TCP) Specification. 00 00 Please refer to RFC 791 for Total length of IP datagram, or IP fragment if fragmented. Measured in Bytes. Checksum of entire TCP segment and pseudo header (parts of IP header) of 5. Multiply by 4 to get byte Checksum of entire IP header the complete Internet Protocol (IP) Specification. Congestion 11 00 01 count. Receiver Response 1 Sender Response 11 11
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Types of Protocols
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education