StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Network Packets - Case Study Example

Comments (0) Cite this document
Summary
This case study "Network Packets" performs network packet analysis on the given set of network packets by sniffing the packets. It identifies issues with the network setup in the given network, based on the type of events happen in the Network packet. It also proposes a solution to the existing problem…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Network Packets
Read Text Preview

Extract of sample "Network Packets"

Download file to see previous pages The receiver sends the response for the request number by sending an acknowledgment with an acknowledgment Number which is the same as that of the sequence number. The flag is an important field that marks the context of the network event.
The given network packets are compared with the predefined IP and TCP network packet structure. Each field of the predefined TCP packet structure is matched with the given network packet structure (as in Fig 1. and Fig 2.) and the interpretation of the network packet activity can be understood in this way.
The above table represents the IP Data-gram for the first packet. The version of the IP is “4”, the format of which is shown in Table.1. The identification number 48195 is used for distinguishing IP packets. The flag DF represents not to do fragmentation on the IP datagram. TTL is the measure for the existence of the IP datagrams, 128 indicates 128 secs or 128 hops. TCP is the protocol to be used in the transport layer.
A host from IP Address 193.63.129.192:1843 sends a connection request to server 193.63.129.187:139. The sequence number in the TCP packet is used as a reference by the client so that it can identify for which request it is getting a response from the server. The client specifies it can accept a 0x2000 size window. The MSS is 1460 represents the threshold value for the number of segments that can be used without fragmentation. Since the acknowledgment number is 0 it is understood that it is the first packet initiated by the client. It’s nothing but the first step in 3 way handshake which is represented by the flag parameter S. (Certified CCNA Guide, Wendell)
This packet is sent as a reply from the server to the client. The difference in this packet as that of the first one are:1. The FLAG (ACK SYN) instructs the client that the server has received the SYN request for the sequence number 0xF1908361 with the acknowledgment number 0xF1908362 (sequence number + 1). ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Packets Case Study Example | Topics and Well Written Essays - 1500 words, n.d.)
Network Packets Case Study Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1744098-msc-network-secutity-network-traffic
(Network Packets Case Study Example | Topics and Well Written Essays - 1500 Words)
Network Packets Case Study Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1744098-msc-network-secutity-network-traffic.
“Network Packets Case Study Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1744098-msc-network-secutity-network-traffic.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Network Packets

Network Security

...Network Packets... Network Packets... Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication...
24 Pages (6000 words) Essay

Social network

...Network Packets... Network Packets... in Social Networking Sites Social networking sites paved way in connecting individual with one another via the internet, making the collective connections a virtual community – thus the term “social network” indeed. The interesting nature of the social networking site is that it is able to provide the users the freedom to express themselves and this makes social network sites very addicting. Facebook, My Space, Friendster, Twitter are among of the popular social networking sites to date, with Facebook as the most famous with the list and followed by Twitter – also known as micro-blogging site. A report stated that there are some 120 million active users on Facebook alone in 2008. People of all ages are...
3 Pages (750 words) Research Paper

Network Security

...Network Packets... Network Packets... ID # Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era. Additionally, the innovations in computer and networking fields have open new ways for the businesses to boost their performance. New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies. In this regard, network security comprises the measures a company can take to protect its...
13 Pages (3250 words) Research Paper

Network Security

...Network Packets... Network Packets... Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor security management, incorrect implementation, and malicious intent can all contribute to the loss of company assets....
3 Pages (750 words) Case Study

Network Design

...Network Packets... Network Packets... ENTERTAINMENT LOCAL AREA NETWORK Design of the SMHL Network FIIRST FLOOR WAREHOUSE Warehouse offices RND compliance Sales and operations Showroom Figure 1: Design of SHFL Network Overview The network configuration has a reasonable design and pricing that satisfies most of the requirements of SHFL. It improves the efficiency of work and thus supports the businesses and all possible functions at SHFL Entertainment. It uses star network topology and its network cables are fiber optics as well as unshielded twisted pair network cabling. It recommends 5 APs (access points) to be able to generate and support wireless availability of Internet Connection more than 200 users at the same time. It will also have T3 of...
4 Pages (1000 words) Essay

3G Network

...Network Packets... Network Packets... The world had come a long way from personal letters sealed by wax in an envelope. People now live where a conversation with a love onefrom continents away is done with just a touch of a button. We are in a time where messages can be sent across seas in a matter of seconds, not months. This is a world where information and news can be received by anyone in the convenience of their own homes. This is the privilege of living in this decade. But what's next The communication technologies at work today may be at its finest but there always are innovations up ahead. A few years ago, the GPRS services seemed like the future, but it is now perceived as slow, expensive and is too much of a hassle. That is why a new g...
7 Pages (1750 words) Essay

Network Technology and Network Administration

...Network Packets... Network Packets... --------------------------- --------------------------- --------------------------- Network Technology and Network Administration Introduction Computers and the Internet are a wonderful addition to our lives. In today's computer world almost every person is connected to computer and internet in a way or other. A person spends a large portion of his life, interacting and collaborating with people all over the world, through the use of and Internet. But that does not mean that every user know every thing about computer and internet. It can be generalized that about 80% of the knowledge is concentrated in about 20% of the people, while the other 80% of the people possess only about 20% of the total knowledge. It...
5 Pages (1250 words) Essay

Network

...Network Packets... Network Packets... 802.3 Table of Contents Introduction 2.Basic Design Issues of an Ethernet network 1 Using Hubs/Repeaters 1.2. Hubs/Repeaters Limitations 1 1.3. Using Bridges/Switches 3 1.4. Basic Bridges/Switches Operations 4 1.5. Using Routers 6 3. References 7 Technick n.d. Ethernet Tutorial Part I: Networking Basics, viewed 23 May 2011, http://www.technick.net/public/code/cp_dpage.php?aiocp_dp=guide_networking_ethernet_01. 7 List of Figures Figure 1 Repeater and Hub with different topologies 2 Figure 2 Basic Switch Setup 3 Figure 3 Loop Removal Through STP 6 Figure 4 Typical Router Configuration 7 List of Tables Table 1 Node Limitation in Hubs 5 Till present, Ethernet maintains its position of being the most popular LAN te...
4 Pages (1000 words) Essay

LAB one

... February Lab Report This lab report focuses on a thorough analysis of the lab activity done using wireshark and wget applications in the examination of a packet trace in a particular computer network. Its aim is to aid in filtering and analyzing network packets thus playing a huge role in making it easy to understand the characteristics of different network protocols such as the HTTP and TCP. The lab simply entails fetching a web URL from a web server to my computer, which is basically, acting as the client. This is then followed by starting up wireshark and beginning a packet capture using the filter of the Transmission Control Protocol Port (TCP Port 80) number eighty. Upon a thorough analysis of the lab, the following is what was found...
1 Pages (250 words) Lab Report

Network

...Network Packets... Network Packets... International Company profile Network international is an independent card solution involved in payment services and providing solutions in the Gulf and Middle East region. It has pledged to fulfill the needs of institutions dealing with finance, corporate business and retailers (Network International). Network international gives a variety of services such as credit and debit card payment. According to Jim Randel, credit cards are used to borrow money from banks, which is a loan without collateral. A debit card is used to access a customer’s own money, which is backed by his or her own account. Outsourcing is important to keep up with the competition in the global business in order to be able to drive the mar...
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Network Packets for FREE!

Contact Us