Study Muddy
Study Muddy

Upload, organize, preview, and share study documents from one clean workspace.

Explore

BrowseAbout UsContact Us

Workspace

UploadDashboard

Legal

Privacy PolicyTerms & ConditionsDisclaimerReport Copyright & Abuse
Study Muddy
DOC·0% (0)·0 views·1 pages

Wireshark Lab: IP Version 8.0

Lab notes on IP packet analysis in Wireshark, covering UDP, ICMP, TTL, header fields, fragmentation, fragment offsets, and packet size changes.

Category: Technology

Uploaded by Emily Thompson on May 9, 2026

Copyright

© All Rights Reserved

We take content rights seriously. If you suspect this is your content, claim it here.

Available Formats

Download as PDF, TXT or DOCX.

Download PDF
/ 1
100%
1

Document text

Wireshark Lab: IP Version 8.0

IP address: 192.168.1.102.

The "upper layer protocol field" directly before the IP packet header states 17. Therefore, we conclude to the User Datagram Protocol (UDP), a protocol commonly used in connectionless communication.

The packet treats the IP header as a 20-byte extension. It discovers this in the IP header's "Header Length" field, which is equivalent to a length indicator of 5 (multiplied by 4). The second component of an IP datagram is the payload, which specifies the useful data, i.e. the IP payload length (56 bytes) is the result of deducting the IP header length (20 bytes) from the entire length of the IP datagram (76 bytes).

In IP datagrams, the lack of discontinuities is persistent. This conditional statement is based on the fact that the "Flags" field in the IP header is the same, while the "Don't Fragment" bit remains unchanged.

The host computer's changeable IP fields in a sequence of ICMP packets issued must include the Source Address, Identification, Time to Live (TTL) Checksum, and Sequence Number.

The constant portions of the header (Version, Header Length, Differentiated Services Codepoint (DSCP), Explicit Congestion Notification (ECN), Total Length, Flags, Fragment Offset, Protocol, and Destination Address) are naturally termed. This tenacity is not only required; it ensures exact and correct communication, but it is also essential when considering the persistence of routing.

The IP packet's destination Port field exhibits a sequential progression pattern, with values incrementing by one over prior packets. For example, such initial identifying numbers could be 13014, followed by 13015, and so on.

The TTLf value of 768 and the ICMP TTL-exceeded replies for the closest router value of 1 sent to the PC are noteworthy.

Yes, these values never change on every ICMP TTL-exceeded reply, and their consistency is critical for proper error interpretation and network repairability.

The IP fragmentation occurs as a result of the implementation of an ICMP Echo Request message with a packet size modification in Pingplotter to 2000 bytes.

Packet number 92 introduces the formation of the disjointed IP data packet, which consists of two fields: the Fragment Offset, which is coded as 0, and the More Fragments set missing, which represents the first and last fragments, respectively.

In contrast, packet number 93 elucidates additional fragmentary manifestations, as evidenced by the existence of the More Fragments flag and a Fragment Offset field set to 1480, indicating consecutive fragmentation.

The transition from the first to the second fragment emphasizes changes mostly seen in the "More Fragments" flag and the "Fragment Offset" field.

When the Packet Size in pingplotter is set to 3500 bytes, the original datagram is fragmented, resulting in 14 fragments.

Among the fragments, noticeable changes are mostly visible in the "Fragment Offset" and "Time to Live" (TTL) fields, which define the fragmented nature and routing characteristics of the datagram.

Related documents

DOCX
Wireshark Lab: IP v8.0
Wireshark Lab: IP v8.0

1 pages

0% (0)
PDF
CS725 Machine Learning Lecture Notes
CS725 Machine Learning Lecture Notes

116 pages

0% (0)
DOCX
Clustering Methods: K-means, Hierarchical, and DBSCAN
Clustering Methods: K-means, Hierarchical, and DBSCAN

3 pages

0% (0)
DOCX
Operating Systems, Networking and CPU Scheduling Answers
Operating Systems, Networking and CPU Scheduling Answers

5 pages

0% (0)
DOCX
SDN Security: DDoS Detection, Cryptography and IPsec
SDN Security: DDoS Detection, Cryptography and IPsec

3 pages

0% (0)
DOCX
The Adventures of Momo Game Product Introduction
The Adventures of Momo Game Product Introduction

2 pages

0% (0)
DOCX
Dream Weaver: A Tapestry of Artificial Imagination
Dream Weaver: A Tapestry of Artificial Imagination

1 pages

0% (0)
DOCX
Statement of Purpose for MSc in Digital Media and Communication
Statement of Purpose for MSc in Digital Media and Communication

4 pages

0% (0)
PDF
The History of Software Testing
The History of Software Testing

2 pages

0% (0)
DOCX
Statement of Purpose for MSc in Digital Media and Communication
Statement of Purpose for MSc in Digital Media and Communication

4 pages

0% (0)