Data Communication - How 3-way Handshake is used in Wireshark?
VerifiedAdded on 2022/08/25
|6
|792
|46
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: DATA COMMUNICATION
DATA COMMUNICATION
Name of the Student
Name of the University
Author Note:
DATA COMMUNICATION
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1DATA COMMUNICATION
Table of Contents
How 3-way Handshake is used in Wireshark?....................................................................2
Explain about DNS in Wireshark........................................................................................3
References............................................................................................................................5
Table of Contents
How 3-way Handshake is used in Wireshark?....................................................................2
Explain about DNS in Wireshark........................................................................................3
References............................................................................................................................5
2DATA COMMUNICATION
How 3-way Handshake is used in Wireshark?
Ans: 3-way handshake is a well-known method required in TCP/IP network for establishing
proper connection in between two that is client and server. It comprises of three steps which
require both client and server for proper exchange synchronization. This aims in acknowledging
the packet before the data communication process begins (Cunha et al. 2016). The process has
been designed in such a way that both the sides help in initiate, negotiate and differentiate TCP
socket connections. This merely helps in proper transfer many TCP socket connections in two
direction at the same instance.
TCP traffic generally begins by the help of a three-way handshake. In this particular TCP
process, client need to start the conversation by establishing communication session with server
(Oliveira et al. 2017). Different kind of TCP messages are explained below:
Messages Description
Syn Required for initiation and establishing
connection.
ACK Helps in assuring that other side has received
SYN.
SYN-ACK SYN messages from the local server and
ACK of earlier package.
FIN Required for terminating a connection.
Step 1: In this step, client aims in establishing connection with server where it provides a
segment with SYN followed by informing server about client details.
How 3-way Handshake is used in Wireshark?
Ans: 3-way handshake is a well-known method required in TCP/IP network for establishing
proper connection in between two that is client and server. It comprises of three steps which
require both client and server for proper exchange synchronization. This aims in acknowledging
the packet before the data communication process begins (Cunha et al. 2016). The process has
been designed in such a way that both the sides help in initiate, negotiate and differentiate TCP
socket connections. This merely helps in proper transfer many TCP socket connections in two
direction at the same instance.
TCP traffic generally begins by the help of a three-way handshake. In this particular TCP
process, client need to start the conversation by establishing communication session with server
(Oliveira et al. 2017). Different kind of TCP messages are explained below:
Messages Description
Syn Required for initiation and establishing
connection.
ACK Helps in assuring that other side has received
SYN.
SYN-ACK SYN messages from the local server and
ACK of earlier package.
FIN Required for terminating a connection.
Step 1: In this step, client aims in establishing connection with server where it provides a
segment with SYN followed by informing server about client details.
3DATA COMMUNICATION
Step 2: In this stage, server make response to client request by making use of the SYN-
ACK signal set (Regan and Abdel-Halim 2018). It merely helps in providing significance of
response in this particular segment. SYN completely signifies the sequence number with which
this will start.
Step 3: In the last stage, client completely acknowledges the server response. They create
a stable connection required for data transfer.
Fig 1: 3-way Handshake
(Source: Rajendran and Shetty 2018)
Explain about DNS in Wireshark
DNS stands for domain name system, which is used for resolving all the store
information inclusive of domain names. This mere includes IP address, mail servers and other
kind of associated information (Cunha et al. 2016). DNS providers does not only provide clarity
Step 2: In this stage, server make response to client request by making use of the SYN-
ACK signal set (Regan and Abdel-Halim 2018). It merely helps in providing significance of
response in this particular segment. SYN completely signifies the sequence number with which
this will start.
Step 3: In the last stage, client completely acknowledges the server response. They create
a stable connection required for data transfer.
Fig 1: 3-way Handshake
(Source: Rajendran and Shetty 2018)
Explain about DNS in Wireshark
DNS stands for domain name system, which is used for resolving all the store
information inclusive of domain names. This mere includes IP address, mail servers and other
kind of associated information (Cunha et al. 2016). DNS providers does not only provide clarity
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4DATA COMMUNICATION
to user but in addition, this provides much greater level of flexibility. If the network
administrator completely decides the changes in DNS server, then IP address is chosen for any
particular reason. Applications that are based on this does not require to be modified. Only the
configuration of client workstation requires to be modified so that it become valid for most of the
application. DNS is known to be either a response or query protocol (Oliveira et al. 2017). Client
will have all the required information which is provided in just a single request of UDP. The
request followed by the single UDP is replied from the DNS server. DNS makes use of UDP port
53 for establishing connection with server (Regan and Abdel-Halim 2018). TCP is required for
providing response to data size which exceeds 512 bytes for the given task like zone transfer.
DNS is being used for a list of steps like
Changing the hostnames into IP address
Changing IP addresses into hostnames
Complete transfer of information between the DNS servers.
Looking up for some other elements like MX records.
to user but in addition, this provides much greater level of flexibility. If the network
administrator completely decides the changes in DNS server, then IP address is chosen for any
particular reason. Applications that are based on this does not require to be modified. Only the
configuration of client workstation requires to be modified so that it become valid for most of the
application. DNS is known to be either a response or query protocol (Oliveira et al. 2017). Client
will have all the required information which is provided in just a single request of UDP. The
request followed by the single UDP is replied from the DNS server. DNS makes use of UDP port
53 for establishing connection with server (Regan and Abdel-Halim 2018). TCP is required for
providing response to data size which exceeds 512 bytes for the given task like zone transfer.
DNS is being used for a list of steps like
Changing the hostnames into IP address
Changing IP addresses into hostnames
Complete transfer of information between the DNS servers.
Looking up for some other elements like MX records.
5DATA COMMUNICATION
References
Cunha, F., Villas, L., Boukerche, A., Maia, G., Viana, A., Mini, R.A. and Loureiro, A.A., 2016.
Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44,
pp.90-103.
Oliveira, T.R., Picorone, A.A., Netto, S.L. and Ribeiro, M.V., 2017. Characterization of
Brazilian in-home power line channels for data communication. Electric Power Systems
Research, 150, pp.188-197.
Rajendran, B. and Shetty, P., 2018. Domain Name System (DNS) Security: Attacks
Identification and Protection Methods. In Proceedings of the International Conference on
Security and Management (SAM) (pp. 27-33). The Steering Committee of The World Congress
in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Regan, G. and Abdel-Halim, A., 2018. INTERNET OF THINGS SECURITY DOMAIN NAME
SYSTEM POLICY AND ANALYTICS.
References
Cunha, F., Villas, L., Boukerche, A., Maia, G., Viana, A., Mini, R.A. and Loureiro, A.A., 2016.
Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44,
pp.90-103.
Oliveira, T.R., Picorone, A.A., Netto, S.L. and Ribeiro, M.V., 2017. Characterization of
Brazilian in-home power line channels for data communication. Electric Power Systems
Research, 150, pp.188-197.
Rajendran, B. and Shetty, P., 2018. Domain Name System (DNS) Security: Attacks
Identification and Protection Methods. In Proceedings of the International Conference on
Security and Management (SAM) (pp. 27-33). The Steering Committee of The World Congress
in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Regan, G. and Abdel-Halim, A., 2018. INTERNET OF THINGS SECURITY DOMAIN NAME
SYSTEM POLICY AND ANALYTICS.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.