INFA 620 Laboratory 3: Identifying TCP Conversations
Context As in Lab 2, you will be using Wireshark. You will continue with packet analysis. You will examine network traffic with a display filter. You can perform this exercise either using Wireshark on your machine or a remote lab supplied by UMUC. I encourage that you carry out the exercise using the remote Lab. The instructions to use the remote UMUC machine is provided in the Accessing Remote Virtual Lab using VPN module under Course Content. A packet trace of normal network traffic will contain more than just the packets you want to look at. You can apply a display filter to isolate conversations within the trace. For this exercise you will use a trace file of a student at home using a browser to connect to UMUC. The trace captures the traffic that resulted when the student pointed a browser to www.umuc.edu. If you are using an older, or newer version of Wireshark, or different OS some of the buttons (options) may be in different positions/locations. Assignment Answer the following questions about trace file EX03 www_umuc_edu.cap. Download trace file EX03 www_umuc_edu.cap from the LEO Lab 3 assignment folder and open it with Wireshark. (If you are using the UMUC remote facility, the file is in the Lab3Folder on the desktop.)
1. Find the first TCP handshake. What are the packet numbers in the handshake? The three packet numbers ____, _____, and _____ (20 Points).
2. What is the IP address of the host that started the handshake? __________________ (15 Points)
3. What is the TCP port connection pair for this handshake? ______, ______ (15 Points)
4. In the first packet of the handshake, the source port is the ephemeral port this host wants to use for the connection, and the destination port indicates the application the host wants to use on the serving host. What application does the host want to use on the serving host?______________ (15 Points)
5. Look at packet number 14. Is this part of the conversation initiated by the first handshake? ______ (15 Points)
Build a filter to see only the first handshake and the conversation for this connection. • Click Analyze (or “Edit” on other versions of ethereal) and select Display Filters from the drop-down list. This brings you to the Edit Display Filters List. • Click “Expression” • Expand TCP (click the plus sign next to TCP), and highlight “Source (src.port)”. • In the Relation section highlight == . • In the Value field type the source port used by the host that initiated the conversation. (The source port should be 1097 in this example). • Click “OK”. Now there is a filter string in the Edit Display Filter List window. (The filter string should be “tcp.port == 1097”.) • In the Filter name box type “Conversation on Source Port 1097”. Click New, then OK. Now you have defined a filter (but not yet applied it). Apply the filter to the trace file. • Find the Filter button near the top left corner of the window and click it. (Note for older versions: If you don’t see the Filter button, make sure the browser window is maximized and your task bar is not covering the bottom.) • Highlight “Conversation on Source Port 1097” and click Apply. (You will see the filter string in the filter field. You could also have typed in the filter by hand. You can take the filter off by clicking the Clear button next to the filter field at the bottom.). The handshake establishes the initial sequence numbers for each connection. Try to follow the sequence numbers in the conversation. Now change the display to show relative sequence numbers: • Click Edit and select Preferences from the drop-down list. • Drill down into Protocols until you get to TCP. • Highlight TCP and select the options, “Analyze TCP sequence numbers” and “Relative sequence numbers and window scaling.” Click OK. Try again to follow the sequence numbers. 6. You cannot see the “next sequence number” in the summary pane for packet number 6. Look for it in the protocol tree pane. Explain why packet number 7 says “ACK =344.” (20 Points) Post your answer to the assignment folder for LAB3. Extra practice