You are on page 1of 4

Name: Sumeet Sapkal

Roll No.:15
PRN No:12110238
Sub: CNS

Assignment No .3

Aim:
The aim of this assignment is to gain hands-on experience in capturing network packets using the
Wireshark application and analysing the information related to IPv4, UDP, and TCP protocols. This
exercise will enhance our understanding of how different layers of the network stack function and
communicate with each other.

Theory:
Wireshark is a widely used network protocol analyser that allows users to capture and inspect the
data traveling back and forth on a network. It provides valuable insights into various network
protocols and their interactions. In this assignment, we focus on capturing packets and examining
information related to the Internet Protocol version 4 (IPv4), User Datagram Protocol (UDP), and
Transmission Control Protocol (TCP).

IPv4 (Internet Protocol version 4): IPv4 is a widely used network layer protocol that facilitates packet
routing and addressing in the Internet. It provides unique IP addresses to devices for
communication.

UDP (User Datagram Protocol): UDP is a connectionless transport layer protocol that enables data
transmission without establishing a formal connection. It is often used for real-time applications due
to its lower overhead.

TCP (Transmission Control Protocol): TCP is a connection-oriented transport layer protocol that
ensures reliable and ordered data delivery between two devices. It establishes a connection before
data transfer.

Procedure:

Install Wireshark: If not already installed, download and install the Wireshark application on your
computer.
Start Packet Capture: Open Wireshark and select the network interface you want to capture packets
from. Click the "Start" button to begin capturing packets.

Generate Network Activity: Perform various network activities, such as browsing websites,
sending/receiving emails, or using online applications. This will generate a variety of network
packets for analysis.

Stop Packet Capture: After capturing sufficient packets, click the "Stop" button in Wireshark to halt
the packet capture process.

Analyse Captured Packets: Filter captured packets based on protocols. For IPv4, UDP, and TCP
analysis:

IPv4 Analysis: Locate IPv4 packets in the captured data. Identify the source and destination IP
addresses, TTL (Time-to-Live), and other relevant header information.

UDP Analysis: Filter UDP packets and analyse their source and destination port numbers, lengths,
and payload data.

TCP Analysis: Filter TCP packets and analyse their source and destination port numbers, sequence
and acknowledgment numbers, window size, and flags (e.g., SYN, ACK).

Results:
IP V4

VER HLEN SERVICE TOTAL LENGTH


4 4*5 = 20 0 52
IDENTIFICATION FLAG FRAGMENTATION
0xa8af 0x2 0
TIME TO LIVE PROTOCOL HEADER CHECKSUM
55 tcp(6) 0x0000
SOURCE IP
22 4c 00 8e : 34.76.0.142
DESTINATION IP
c0 a8 b9 bc: 192.168.185.188
OPTION

UDP

SOURSE PORT NUMBER DESTINATION PORT NUMBER


55225 53
TOTAL LENGTH CHECKSUM
46 0xf499

TCP
SOURCE PORT ADDRESS DESTINATION PORT ADDRESS
443 50376
SEQUENCE NUMBER
1
ACK NUMBER
2
HLEN RESERVER WINDOW SIZE
8 32
CHECKSUM URGENT POINTER
6a d1 0
OPTIONS AND PADDING

Ipv4:

UDP:
TCP :

Conclusion:
This assignment provided valuable practical experience in capturing network packets using
Wireshark and analysing the information related to IPv4, UDP, and TCP protocols. Through the
captured data, we were able to observe the intricate details of packet headers and their
interactions. This exercise enhanced our understanding of how these protocols contribute to the
functioning of network communication. By examining IP addresses, port numbers, sequence
numbers, and other relevant data, we gained insights into the underlying mechanisms that enable
reliable and efficient data transmission over the Internet.

You might also like