MITS4004 Networking Lab: ICMP, Ping, Traceroute Analysis

Verified

Added on  2025/05/03

|17
|864
|443
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
MITS4004
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
1. ICMP and Ping....................................................................................................................................2
2. ICMP and Traceroute..........................................................................................................................8
LAB – IP...................................................................................................................................................11
Table of Figure
Figure 1: starting Wireshark........................................................................................................................2
Figure 2: selecting an active network interface............................................................................................2
Figure 3: Packet capturing started...............................................................................................................3
Figure 4: pinging targeted host....................................................................................................................3
Figure 5: ping result....................................................................................................................................4
Figure 6: filtering packet tracer result in ICMP...........................................................................................4
Figure 7: Reviewing IPv4 information........................................................................................................5
Figure 8: Reviewing ICMP information......................................................................................................5
Figure 9: ICMP information........................................................................................................................6
Figure 10: Data information........................................................................................................................7
Figure 11: traceroute to the targeted host.....................................................................................................8
Figure 12: traceroute result..........................................................................................................................8
Figure 13: analysing captured packets.........................................................................................................9
Figure 14: Packet filtering.........................................................................................................................10
Figure 15: Figure description.....................................................................................................................10
Figure 16: Starting packet capturing..........................................................................................................11
Figure 17: sending packets to host using ping plotter................................................................................11
Figure 18: changing the data packet size...................................................................................................12
Figure 19: changing the data packet size...................................................................................................12
Figure 20: packet filtering.........................................................................................................................13
Figure 21: Fragmentation of IPv4..............................................................................................................14
Figure 22: Analyzing packet......................................................................................................................15
Figure 23: Analyzing packets....................................................................................................................15
1
Document Page
1. ICMP and Ping
Figure 1: starting Wireshark
Figure 2: selecting an active network interface
2
Document Page
Figure 3: Packet capturing started
Figure 4: pinging targeted host
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 5: ping result
Figure 6: filtering packet tracer result in ICMP
4
Document Page
Figure 7: Reviewing IPv4 information
Figure 8: Reviewing ICMP information
Answers:
1. Host IP Address: 192.168.43.157
Destination IP Address: 143.89.44.239
5
Document Page
2. The ICMP packet doesn’t have source and destination port number as the ICMP packet
communicate at the network layer of a host and a server or router which didn’t include the
interaction with the application layer of the system and its processes.
3. Type number: 8
Code Number: 0
The ICMP packet has the following fields:
Figure 9: ICMP information
Bytes occupied by various fields of ICMP packet are:
1. Checksum: 2 bytes
2. A sequence number is captured as two different types as:
a. Sequence number (Big endian representation): 2 bytes
b. Sequence number (Little endian representation): 2 bytes
3. The identifier is captured as two different types as:
a. Identifier (Big endian representation): 2 bytes
b. Identifier (Little endian representation): 2 bytes
4. Analysis of reply packet:
Type number: 0
Code Number: 0
The ICMP packet has the following fields:
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 10: Data information
Bytes occupied by various fields of ICMP packet are:
5. Checksum: 2 bytes
6. A sequence number is captured as two different types as:
a. Sequence number (Big endian representation): 2 bytes
b. Sequence number (Little endian representation): 2 bytes
7. The identifier is captured as two different types as:
a. Identifier (Big endian representation): 2 bytes
Identifier (Little endian representation): 2 bytes
7
Document Page
2. ICMP and Traceroute
Figure 11: traceroute to the targeted host
Figure 12: traceroute result
8
Document Page
Figure 13: analysing captured packets
Answers:
1. Host IP Address: 192.168.1.21
Destination IP Address: 128.93.162.84
2. No, but if ICMP packets are sent over UDP then the IP protocol will be numbered as 0x11.
3. No, it is not different from the ICMP packet as both the packets have the same fields.
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 14: Packet filtering
4. No, it is not the same as the ICMP packet contains IP header and the information related to the
error occurred within the header.
5. The last three packets of ICMP packet are of type 0 instead of type 11 as the packet is reached to
the destination before the TTL time.
6. Yes, both the steps took a long time as compared to others. As per the analysis of step 11 and 12,
it is observed that route is routed from the router in Aubervilliers and a router in Bagnolet.
Figure 15: Figure description
10
Document Page
LAB – IP
Figure 16: Starting packet capturing
Figure 17: sending packets to host using ping plotter
11
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]