SlideShare a Scribd company logo
1 of 10
Download to read offline
LAPORAN TUGAS WIRESHARK TCP
JARINGAN KOMPUTER
Nanda Afif Ashari
2110165028
2NANDA AFIF ASHARI | 2110165028
Buka wireshark dengan tcp-ethereal trace 1
TCP Basics
Answer the following questions for the TCP segments:
1. What is the IP address and TCP port number used by your client computer source) to
transfer the file to gaia.cs.umass.edu?
Client computer (source)
IP address:
192.168.1.102
TCP port number:
1161
2. What is the IP address and port number used by gaia.cs.umass.edu to receive the file.
Destination computer:
gaia.cs.umass.edu
IP address:
128.119.245.12
TCP port number:
80
3. If you did this problem on your own computer, you’ll have your own solution
3NANDA AFIF ASHARI | 2110165028
4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP
connection between the client computer and gaia.cs.umass.edu? What is it in the segment
that identifies the segment as a SYN segment?
Solution:
Sequence number of the TCP SYN segment is used to initiate the TCP connection between the
client computer and gaia.cs.umass.edu. The value is 0 in this trace.The SYN flag is set to 1
and it indicates that this segment is a SYN segment.
4NANDA AFIF ASHARI | 2110165028
5. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the
client computer in reply to the SYN? What is the value of the ACKnowledgement field in
the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the
segment that identifies the segment as a SYNACK segment?
Solution:
Sequence number of the SYNACK segment from gaia.cs.umass.edu to the client computer in
reply to the SYN has the value of 0 in this trace.The value of the ACKnowledgement field in
the SYNACK segment is 1.
The value of the ACKnowledgement field in the SYNACK segment is determined by
gaia.cs.umass.edu by adding 1 to the initial sequence number of SYN segment from the client
computer (i.e. the sequence number of the SYN segment initiated by the client computer is
0.).
The SYN flag and Acknowledgement flag in the segment are set to 1 and they indicate that
this segment is a SYNACK segment.
5NANDA AFIF ASHARI | 2110165028
6. What is the sequence number of the TCP segment containing the HTTP POST command?
Note that in order to find the POST command, you’ll need to dig into the packet content
field at the bottom of the Wireshark window, looking for a segment with a “POST” within
its DATA field.
Solution:
segment is the TCP segment containing the HTTP POST command. The sequence number of
this segment has the value of 164041.
7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP
connection. What are the sequence numbers of the first six segments in the TCP
connection (including the segment containing the HTTP POST)? At what time was each
segment sent? When was the ACK for each segment received? Given the difference
between when each TCP segment was sent, and when its acknowledgement was received,
what is the RTT value for each of the six segments? What is the EstimatedRTT value (see
page 237 in text) after the receipt of each ACK? Assume that the value of the
EstimatedRTT is equal to the measured RTT for the first segment, and then is computed
using the EstimatedRTT equation on page 237 for all subsequent segments.
Note:
Wireshark has a nice feature that allows you to plot the RTT for each of the TCP segments
sent. Select a TCP segment in the “listing of captured packets” window that is being sent
from the client to the gaia.cs.umass.edu server. Then select: Statistics->TCP Stream
Graph->Round Trip Time Graph
6NANDA AFIF ASHARI | 2110165028
8. What is the length of each of the first six TCP segments?
Solution:
Length of the first six TCP segment : 1460 bytes
7NANDA AFIF ASHARI | 2110165028
9. What is the minimum amount of available buffer space advertised at the received for the
entire trace? Does the lack of receiver buffer space ever throttle the sender?
Solution:
The minimum amount of buffer space (receiver window) advertised at gaia.cs.umass.edu for
the entire trace is 5840 bytes, which shows in the first acknowledgement from the server.
This receiver window grows steadily until a maximum receiver buffer size of 62780 bytes.
The sender is never throttled due to lacking of receiver buffer space by inspecting this trace.
10. Are there any retransmitted segments in the trace file? What did you check for (in the
trace) in order to answer this question?
Solution:
There are no retransmitted segments in the trace file. We can verify this by checking the
sequence numbers of the TCP segments in the trace file. In the Time-Sequence-Graph
(Stevens) of this trace, all sequence numbers from the source (192.168.1.102) to the
destination (128.119.245.12) are increasing monotonically with respect to time. If there is a
retransmitted segment, the sequence number of this retransmitted segment should be
smaller than those of its neighboring segments.
8NANDA AFIF ASHARI | 2110165028
11. How much data does the receiver typically acknowledge in an ACK? Can you identify
cases where the receiver is ACKing every other received segment (see Table 3.2 on page
247 in the text).
Solution:
The acknowledged sequence numbers of the ACKs are listed as follows.
acknowledged sequence
number
acknowledged data
ACK 1 566 566
ACK 2 2026 1460
ACK 3 3486 1460
ACK 4 4946 1460
ACK 5 6406 1460
ACK 6 7866 1460
ACK 7 9013 1147
ACK 8 10473 1460
ACK 9 11933 1460
ACK 10 13393 1460
ACK 11 14853 1460
ACK 12 16313 1460
……
The difference between the acknowledged sequence numbers of two consecutive ACKs
indicates the data received by the server between these two ACKs. By inspecting the
amount of acknowledged data by each ACK, there are cases where the receiver is ACKing
every other segment
9NANDA AFIF ASHARI | 2110165028
12. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain
how you calculated this value.
Solution:
The computation of TCP throughput largely depends on the selection of averaging time
period. As a common throughput computation, in this question, we select the average time
period as the whole connection time. Then, the average throughput for this TCP
connection is computed as the ratio between the total amount data and the total
transmission time. The total amount data transmitted can be computed by the difference
between the sequence number of the first TCP segment (i.e. 1 byte for No. 4 segment) and
the acknowledged sequence number of the last ACK (164091 bytes for No. 202 segment).
Therefore, the total data are 164091 - 1 = 164090 bytes. The whole transmission time is
the difference of the time instant of the first TCP segment (i.e., 0.026477 second for No.4
segment) and the time instant of the last ACK (i.e., 5.455830 second for No. 202 segment).
Therefore, the total transmission time is 5.455830 - 0.026477 = 5.4294 seconds. Hence,
the throughput for the TCP connection is computed as 164090/5.4294 = 30.222
KByte/sec.
10NANDA AFIF ASHARI | 2110165028

More Related Content

What's hot

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolIshtdeep Hora
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control anuragjagetiya
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPVIJAY SHARMA
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER Pramudya Maulana
 
UART(universal asynchronous receiver transmitter ) PPT
UART(universal asynchronous receiver transmitter ) PPTUART(universal asynchronous receiver transmitter ) PPT
UART(universal asynchronous receiver transmitter ) PPTSai_praneeth
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 

What's hot (20)

Wireshark tcp
Wireshark tcpWireshark tcp
Wireshark tcp
 
Ip multicast
Ip multicastIp multicast
Ip multicast
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDP
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
ICMP
ICMPICMP
ICMP
 
Hash Function.pdf
Hash Function.pdfHash Function.pdf
Hash Function.pdf
 
Fhrp notes
Fhrp notesFhrp notes
Fhrp notes
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Socket programming
Socket programmingSocket programming
Socket programming
 
INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER INTRODUCTION TO NETWORK LAYER
INTRODUCTION TO NETWORK LAYER
 
verilog code
verilog codeverilog code
verilog code
 
UART(universal asynchronous receiver transmitter ) PPT
UART(universal asynchronous receiver transmitter ) PPTUART(universal asynchronous receiver transmitter ) PPT
UART(universal asynchronous receiver transmitter ) PPT
 
I pv4 format
I pv4 formatI pv4 format
I pv4 format
 
Icmp
IcmpIcmp
Icmp
 
3g cdma-qualcom
3g cdma-qualcom3g cdma-qualcom
3g cdma-qualcom
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 

Similar to Wireshark tcp - 2110165028

Tugas komjar 7-yee
Tugas komjar 7-yeeTugas komjar 7-yee
Tugas komjar 7-yeeramasatriaf
 
Wireshark TCP Trace
Wireshark TCP Trace Wireshark TCP Trace
Wireshark TCP Trace Paras
 
13_TCP_Attack.pptx
13_TCP_Attack.pptx13_TCP_Attack.pptx
13_TCP_Attack.pptxAlmaOraevi
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer ProtocolsZahouAmel1
 
the transport layer
the transport layerthe transport layer
the transport layertumetr1
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerFaizan Shaikh
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdfEnumulaBhargava1
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxAnkitKumar891632
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxTekle12
 
Lecture 5
Lecture 5Lecture 5
Lecture 5ntpc08
 
Eshcol tech solutions pvt ltd
Eshcol tech solutions pvt ltdEshcol tech solutions pvt ltd
Eshcol tech solutions pvt ltdOjas Kumar
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 

Similar to Wireshark tcp - 2110165028 (20)

Tugas komjar 7-yee
Tugas komjar 7-yeeTugas komjar 7-yee
Tugas komjar 7-yee
 
Understanding TCP and HTTP
Understanding TCP and HTTP Understanding TCP and HTTP
Understanding TCP and HTTP
 
Wireshark TCP Trace
Wireshark TCP Trace Wireshark TCP Trace
Wireshark TCP Trace
 
13_TCP_Attack.pptx
13_TCP_Attack.pptx13_TCP_Attack.pptx
13_TCP_Attack.pptx
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
Osi model
Osi modelOsi model
Osi model
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Working of TCP
Working of TCP Working of TCP
Working of TCP
 
Mod4
Mod4Mod4
Mod4
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Eshcol tech solutions pvt ltd
Eshcol tech solutions pvt ltdEshcol tech solutions pvt ltd
Eshcol tech solutions pvt ltd
 
Olumide pidan b
Olumide pidan bOlumide pidan b
Olumide pidan b
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 

More from Nanda Afif

Konfigurasi Dynamic Routing Menggunakan RIP pada Mikrotik
Konfigurasi Dynamic Routing Menggunakan RIP pada MikrotikKonfigurasi Dynamic Routing Menggunakan RIP pada Mikrotik
Konfigurasi Dynamic Routing Menggunakan RIP pada MikrotikNanda Afif
 
Routing Static Menggunakan Winbox
Routing Static Menggunakan WinboxRouting Static Menggunakan Winbox
Routing Static Menggunakan WinboxNanda Afif
 
Lapend mikrotik - 2110165028
Lapend mikrotik - 2110165028Lapend mikrotik - 2110165028
Lapend mikrotik - 2110165028Nanda Afif
 
Diagram dns, router, web server, web client 2110165028
Diagram dns, router, web server, web client   2110165028Diagram dns, router, web server, web client   2110165028
Diagram dns, router, web server, web client 2110165028Nanda Afif
 
Wireshark http - 2110165028
Wireshark http - 2110165028Wireshark http - 2110165028
Wireshark http - 2110165028Nanda Afif
 
Laporan rip routing 2110165028
Laporan rip routing   2110165028Laporan rip routing   2110165028
Laporan rip routing 2110165028Nanda Afif
 
2110165028 konjar lj_virtual machine
2110165028 konjar lj_virtual machine2110165028 konjar lj_virtual machine
2110165028 konjar lj_virtual machineNanda Afif
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnettingNanda Afif
 
2110165028 konjar lj_vlan_routing
2110165028 konjar lj_vlan_routing2110165028 konjar lj_vlan_routing
2110165028 konjar lj_vlan_routingNanda Afif
 
2110165028 konjar lj_summary
2110165028 konjar lj_summary2110165028 konjar lj_summary
2110165028 konjar lj_summaryNanda Afif
 
2110165028 konjar lj_1
2110165028 konjar lj_12110165028 konjar lj_1
2110165028 konjar lj_1Nanda Afif
 

More from Nanda Afif (11)

Konfigurasi Dynamic Routing Menggunakan RIP pada Mikrotik
Konfigurasi Dynamic Routing Menggunakan RIP pada MikrotikKonfigurasi Dynamic Routing Menggunakan RIP pada Mikrotik
Konfigurasi Dynamic Routing Menggunakan RIP pada Mikrotik
 
Routing Static Menggunakan Winbox
Routing Static Menggunakan WinboxRouting Static Menggunakan Winbox
Routing Static Menggunakan Winbox
 
Lapend mikrotik - 2110165028
Lapend mikrotik - 2110165028Lapend mikrotik - 2110165028
Lapend mikrotik - 2110165028
 
Diagram dns, router, web server, web client 2110165028
Diagram dns, router, web server, web client   2110165028Diagram dns, router, web server, web client   2110165028
Diagram dns, router, web server, web client 2110165028
 
Wireshark http - 2110165028
Wireshark http - 2110165028Wireshark http - 2110165028
Wireshark http - 2110165028
 
Laporan rip routing 2110165028
Laporan rip routing   2110165028Laporan rip routing   2110165028
Laporan rip routing 2110165028
 
2110165028 konjar lj_virtual machine
2110165028 konjar lj_virtual machine2110165028 konjar lj_virtual machine
2110165028 konjar lj_virtual machine
 
2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting2110165028 konjar lj_subnetting
2110165028 konjar lj_subnetting
 
2110165028 konjar lj_vlan_routing
2110165028 konjar lj_vlan_routing2110165028 konjar lj_vlan_routing
2110165028 konjar lj_vlan_routing
 
2110165028 konjar lj_summary
2110165028 konjar lj_summary2110165028 konjar lj_summary
2110165028 konjar lj_summary
 
2110165028 konjar lj_1
2110165028 konjar lj_12110165028 konjar lj_1
2110165028 konjar lj_1
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Wireshark tcp - 2110165028

  • 1. LAPORAN TUGAS WIRESHARK TCP JARINGAN KOMPUTER Nanda Afif Ashari 2110165028
  • 2. 2NANDA AFIF ASHARI | 2110165028 Buka wireshark dengan tcp-ethereal trace 1 TCP Basics Answer the following questions for the TCP segments: 1. What is the IP address and TCP port number used by your client computer source) to transfer the file to gaia.cs.umass.edu? Client computer (source) IP address: 192.168.1.102 TCP port number: 1161 2. What is the IP address and port number used by gaia.cs.umass.edu to receive the file. Destination computer: gaia.cs.umass.edu IP address: 128.119.245.12 TCP port number: 80 3. If you did this problem on your own computer, you’ll have your own solution
  • 3. 3NANDA AFIF ASHARI | 2110165028 4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment? Solution: Sequence number of the TCP SYN segment is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu. The value is 0 in this trace.The SYN flag is set to 1 and it indicates that this segment is a SYN segment.
  • 4. 4NANDA AFIF ASHARI | 2110165028 5. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the ACKnowledgement field in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment? Solution: Sequence number of the SYNACK segment from gaia.cs.umass.edu to the client computer in reply to the SYN has the value of 0 in this trace.The value of the ACKnowledgement field in the SYNACK segment is 1. The value of the ACKnowledgement field in the SYNACK segment is determined by gaia.cs.umass.edu by adding 1 to the initial sequence number of SYN segment from the client computer (i.e. the sequence number of the SYN segment initiated by the client computer is 0.). The SYN flag and Acknowledgement flag in the segment are set to 1 and they indicate that this segment is a SYNACK segment.
  • 5. 5NANDA AFIF ASHARI | 2110165028 6. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you’ll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a “POST” within its DATA field. Solution: segment is the TCP segment containing the HTTP POST command. The sequence number of this segment has the value of 164041. 7. Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection. What are the sequence numbers of the first six segments in the TCP connection (including the segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for each segment received? Given the difference between when each TCP segment was sent, and when its acknowledgement was received, what is the RTT value for each of the six segments? What is the EstimatedRTT value (see page 237 in text) after the receipt of each ACK? Assume that the value of the EstimatedRTT is equal to the measured RTT for the first segment, and then is computed using the EstimatedRTT equation on page 237 for all subsequent segments. Note: Wireshark has a nice feature that allows you to plot the RTT for each of the TCP segments sent. Select a TCP segment in the “listing of captured packets” window that is being sent from the client to the gaia.cs.umass.edu server. Then select: Statistics->TCP Stream Graph->Round Trip Time Graph
  • 6. 6NANDA AFIF ASHARI | 2110165028 8. What is the length of each of the first six TCP segments? Solution: Length of the first six TCP segment : 1460 bytes
  • 7. 7NANDA AFIF ASHARI | 2110165028 9. What is the minimum amount of available buffer space advertised at the received for the entire trace? Does the lack of receiver buffer space ever throttle the sender? Solution: The minimum amount of buffer space (receiver window) advertised at gaia.cs.umass.edu for the entire trace is 5840 bytes, which shows in the first acknowledgement from the server. This receiver window grows steadily until a maximum receiver buffer size of 62780 bytes. The sender is never throttled due to lacking of receiver buffer space by inspecting this trace. 10. Are there any retransmitted segments in the trace file? What did you check for (in the trace) in order to answer this question? Solution: There are no retransmitted segments in the trace file. We can verify this by checking the sequence numbers of the TCP segments in the trace file. In the Time-Sequence-Graph (Stevens) of this trace, all sequence numbers from the source (192.168.1.102) to the destination (128.119.245.12) are increasing monotonically with respect to time. If there is a retransmitted segment, the sequence number of this retransmitted segment should be smaller than those of its neighboring segments.
  • 8. 8NANDA AFIF ASHARI | 2110165028 11. How much data does the receiver typically acknowledge in an ACK? Can you identify cases where the receiver is ACKing every other received segment (see Table 3.2 on page 247 in the text). Solution: The acknowledged sequence numbers of the ACKs are listed as follows. acknowledged sequence number acknowledged data ACK 1 566 566 ACK 2 2026 1460 ACK 3 3486 1460 ACK 4 4946 1460 ACK 5 6406 1460 ACK 6 7866 1460 ACK 7 9013 1147 ACK 8 10473 1460 ACK 9 11933 1460 ACK 10 13393 1460 ACK 11 14853 1460 ACK 12 16313 1460 …… The difference between the acknowledged sequence numbers of two consecutive ACKs indicates the data received by the server between these two ACKs. By inspecting the amount of acknowledged data by each ACK, there are cases where the receiver is ACKing every other segment
  • 9. 9NANDA AFIF ASHARI | 2110165028 12. What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value. Solution: The computation of TCP throughput largely depends on the selection of averaging time period. As a common throughput computation, in this question, we select the average time period as the whole connection time. Then, the average throughput for this TCP connection is computed as the ratio between the total amount data and the total transmission time. The total amount data transmitted can be computed by the difference between the sequence number of the first TCP segment (i.e. 1 byte for No. 4 segment) and the acknowledged sequence number of the last ACK (164091 bytes for No. 202 segment). Therefore, the total data are 164091 - 1 = 164090 bytes. The whole transmission time is the difference of the time instant of the first TCP segment (i.e., 0.026477 second for No.4 segment) and the time instant of the last ACK (i.e., 5.455830 second for No. 202 segment). Therefore, the total transmission time is 5.455830 - 0.026477 = 5.4294 seconds. Hence, the throughput for the TCP connection is computed as 164090/5.4294 = 30.222 KByte/sec.
  • 10. 10NANDA AFIF ASHARI | 2110165028