ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Data Communication - How 3-way Handshake is used in Wireshark?

Verified

Added on  2022/08/25

|6
|792
|46
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: DATA COMMUNICATION
DATA COMMUNICATION
Name of the Student
Name of the University
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DATA COMMUNICATION
Table of Contents
How 3-way Handshake is used in Wireshark?....................................................................2
Explain about DNS in Wireshark........................................................................................3
References............................................................................................................................5
Document Page
2DATA COMMUNICATION
How 3-way Handshake is used in Wireshark?
Ans: 3-way handshake is a well-known method required in TCP/IP network for establishing
proper connection in between two that is client and server. It comprises of three steps which
require both client and server for proper exchange synchronization. This aims in acknowledging
the packet before the data communication process begins (Cunha et al. 2016). The process has
been designed in such a way that both the sides help in initiate, negotiate and differentiate TCP
socket connections. This merely helps in proper transfer many TCP socket connections in two
direction at the same instance.
TCP traffic generally begins by the help of a three-way handshake. In this particular TCP
process, client need to start the conversation by establishing communication session with server
(Oliveira et al. 2017). Different kind of TCP messages are explained below:
Messages Description
Syn Required for initiation and establishing
connection.
ACK Helps in assuring that other side has received
SYN.
SYN-ACK SYN messages from the local server and
ACK of earlier package.
FIN Required for terminating a connection.
Step 1: In this step, client aims in establishing connection with server where it provides a
segment with SYN followed by informing server about client details.
Document Page
3DATA COMMUNICATION
Step 2: In this stage, server make response to client request by making use of the SYN-
ACK signal set (Regan and Abdel-Halim 2018). It merely helps in providing significance of
response in this particular segment. SYN completely signifies the sequence number with which
this will start.
Step 3: In the last stage, client completely acknowledges the server response. They create
a stable connection required for data transfer.
Fig 1: 3-way Handshake
(Source: Rajendran and Shetty 2018)
Explain about DNS in Wireshark
DNS stands for domain name system, which is used for resolving all the store
information inclusive of domain names. This mere includes IP address, mail servers and other
kind of associated information (Cunha et al. 2016). DNS providers does not only provide clarity

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DATA COMMUNICATION
to user but in addition, this provides much greater level of flexibility. If the network
administrator completely decides the changes in DNS server, then IP address is chosen for any
particular reason. Applications that are based on this does not require to be modified. Only the
configuration of client workstation requires to be modified so that it become valid for most of the
application. DNS is known to be either a response or query protocol (Oliveira et al. 2017). Client
will have all the required information which is provided in just a single request of UDP. The
request followed by the single UDP is replied from the DNS server. DNS makes use of UDP port
53 for establishing connection with server (Regan and Abdel-Halim 2018). TCP is required for
providing response to data size which exceeds 512 bytes for the given task like zone transfer.
DNS is being used for a list of steps like
Changing the hostnames into IP address
Changing IP addresses into hostnames
Complete transfer of information between the DNS servers.
Looking up for some other elements like MX records.
Document Page
5DATA COMMUNICATION
References
Cunha, F., Villas, L., Boukerche, A., Maia, G., Viana, A., Mini, R.A. and Loureiro, A.A., 2016.
Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44,
pp.90-103.
Oliveira, T.R., Picorone, A.A., Netto, S.L. and Ribeiro, M.V., 2017. Characterization of
Brazilian in-home power line channels for data communication. Electric Power Systems
Research, 150, pp.188-197.
Rajendran, B. and Shetty, P., 2018. Domain Name System (DNS) Security: Attacks
Identification and Protection Methods. In Proceedings of the International Conference on
Security and Management (SAM) (pp. 27-33). The Steering Committee of The World Congress
in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Regan, G. and Abdel-Halim, A., 2018. INTERNET OF THINGS SECURITY DOMAIN NAME
SYSTEM POLICY AND ANALYTICS.
1 out of 6
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]