$29
• Introduction
This assignment focuses on the network’s ‘packets’ being sent around on a computer network. You will take a look at what is actually sent around on the transmission medium and what those packets ‘look like’. You may have heard of IP packets, but what exactly is ‘inside’ it? Or sending HTTP request to open a web page: how is that put across the transmission medium? The Wireshark tool, a packet ‘sni er’, will be used to obtain answers to such questions.
What you have to submit in one compressed le where no le is in a directory (as you should recall from prior exposure to the automated marker in previous courses):
1. A trace file called 'tcptrace.pcap' containing your trace for the first half of the aassignment (questions 1-9) ;
2. A trace file called 'iptrace.pcap' containing your trace for the second half of the aassignment (questions 10-18) ;
3. The answers to the automarker-marked questions in a structured text le called 'automark.txt'; these questions are indicated with \[AM]"; details of the file structure and a sample file are on the Vula page for the assignment;
4. The answers (optionally including annotated screenshots) to the remaining questions of the Wireshark section, as indicated.
NOTE
You can submit only FIVE times, so be careful and think and check twice, or even thrice, before submitting
Your traces must be saved as 'pcap' files, not 'pcapng' files.
NOTE
The Automarker is uniquely con gured for the Wireshark section, in that it processes your trace to pull out the answers, and compares it to what you have written in the txt le. As we have a list who gets assigned which le to upload, we immediately know who’s been copying in case you submit someone else’s trace and answer le. So don’t even try, unless you want a 0 for the assignment and be added onto the departmental plagiarism list, or if you are already on there, go through the full UCT disciplinary procedures for plagiarism (see departmental plagiarism policy for details). The format of the answer le and an example are available on Vula and shown in Appendix A of this le; check these before submitting it.
• Sni ng with Wireshark
• There’s a lengthy explanation of steps, but the trace capturing tasks are fairly short. You may wish to read through the TCP and IP section rst, then capture the required traces before proceeding to answer the questions. (
Note: when the description says you’re better o closing all other networked apps before starting the capture, do yourself a favour, and do so. Then answer the questions with that ‘clean’ trace.(It is most fascinating to see how busy your networked apps are even when you think nothing is happening, but that’s a di erent topic.)
2.1 TCP Wireshark lab
In this part of the practical assignment, you’ll investigate the behaviour of the TCP protocol. You’ll do so by analysing a trace of the TCP segments sent and received in transferring a le from your computer to a remote server. That le is allocated to you and is old enough to have had their copyright expired, such as Lewis Carrol’s Alice’s Adventures in Wonderland (many of those books are digitised and available from Project Gutenberg1). You’ll study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer. TCP’s congestion control algorithm is nice, but your data will look ‘hectic’ and therefore is an optional exercise, and likewise on TCP’s receiver-advertised ow control mechanism. You will also brie y consider TCP connection setup and investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server.
Before beginning this lab, you’ll probably want to review sections 3.5 and 3.7 in the textbook. There is a separate Wireshark introduction pdf le on vula that you may want to read through, which gives a little overview of the tool, and there’s the manual online. As they keep on changing things in the interface and there are slight di erences across OSs, it may be that the screenshots below in this document aren’t exactly the same as what you’ll see, but worry not, the questions can be answered.
2.1.1 Capturing a bulk TCP transfer from your computer to a remote server
You’ll need to use Wireshark to obtain a packet trace of the TCP transfer of a le from your computer to a remote server. You’ll do so by accessing a Web page that will allow you to enter the name of a le stored on your computer (which contains the ASCII text of your assigned Gutenberg ebook), and then transfer the le to a Web server using the HTTP POST method (see section 2.2.3 in the text). The POST method is used rather than the GET method, because you’re going to transfer a large amount of data from your computer to another computer. You have to run Wireshark during this time to obtain the trace of the TCP segments sent and received from your computer.
Do the following:
{ Start up your web browser. On Vula, go to CSC3002F,2017 Resources>Networks>Text File Allocations, and retrieve an ASCII copy of the Gutenberg ebook assigned to you, your gutenbergfile.txt. Store this file somewhere on your computer.
{ Next go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark-file1.html. You
should see a screen that looks like the screenshot in Fig. 1. Use the Browse button in this form to enter the name of the le (full path name) on your computer containing yourgutenbergfile (or do so manually). Don’t yet press the “Upload alice.txt file” button.
– Now start up Wireshark and begin packet capture (Capture −> Start) and then press OK on the Wireshark Packet Capture Options screen. Note: if it doesn’t work, go to Capture −> Interfaces and select the NIC and then click Start
1
https://www.gutenberg.org/
3
Figure 1: Upload page for yourgutenberg le.txt
{ Return to your browser and press the \Upload alice.txt le" button to upload the le to the
gaia.cs.umass.edu server. Once the le has been uploaded, a short congratulations message will be displayed in your browser window.
{ Stop the packet capture and save as 'tcptrace.pcap'.
{Your Wireshark window should look similar to the screenshot in Fig. 2. (Note: it may look slightly
di erent, which is due to either di erence in operating system or yet another version of the
software.). Scroll down to the IP section and do that part of the trace capture.
NOTE: you certainly will be able to run Wireshark in the labs. It may well be the case that when you (want to) start doing this exercise only some 5 hours before the assignment deadline, some server is down or the network happens to be not working. that’s your problem and not an excuse or a valid reason for extension. There’s plenty of time to do these exercises, and most of the time, the network and servers are working.
2.1.2 A rst look at the captured trace
Before analysing the behaviour of the TCP connection in detail, let’s take a high level view of the trace. First, lter the packets displayed in the Wireshark window by entering \tcp" (lowercase, no quotes, and don’t forget to press return after entering!) into the display lter speci cation window towards the top of the Wireshark window. What you should see is series of TCP and HTTP messages between your computer and gaia.cs.umass.edu. You should see the initial three-way handshake containing a SYN message. You should see an HTTP POST message. Depending on the version of Wireshark you are using, you might see a series of \HTTP Continuation" messages being sent from your computer to gaia.cs.umass.edu. There is no such thing as an HTTP Continuation message; this is Wireshark’s way of indicating that there are multiple TCP segments being used to carry a single HTTP message. In more recent versions of Wireshark, you’ll see \[TCP segment of a reassembled PDU]" in the Info column of the Wireshark display to indicate that this TCP segment contained data that belonged to an upper layer protocol message (in our case here, HTTP). You should also see TCP ACK segments being returned from gaia.cs.umass.edu to your computer.
4
Figure 2: A screenshot of Wireshark after packet capture.
Answer the following questions, by using your own trace. See Appendix A for the format of the txt le for the questions that will be marked by the automatic marker (indicated with \[AM]"). For the other manually marked questions, write the answer in a separate le (e.g., MS Word. Open O ce, LATEX) and, where applicable, include a screenshot of the packet(s) within the trace that you used to answer the question asked, or annotate the packet to explain your answers. (To print a packet, use File > Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.)
Exercises
1. What is the IP address and TCP port number used by the client computer (source) that is transferring the le to gaia.cs.umass.edu? To answer this question, it’s probably easiest to select an HTTP message and explore the details of the TCP packet used to carry this HTTP message, using the \details of the selected packet header window" (refer to Figure 2 in the ‘Getting Started with Wireshark’ Lab if you’re uncertain about the Wireshark windows. [AM]
2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection? [AM]
2.1.3 TCP Basics
Since this lab is about TCP rather than HTTP, let’s change Wireshark’s \listing of captured packets" window so that it shows information about the TCP segments containing the HTTP messages, rather than about the HTTP messages. To have Wireshark do this, select Analyze > Enabled Protocols.
5
Then uncheck the HTTP box and select OK. You should now see a Wireshark window that looks like the one in Fig. 3.
Figure 3: Another screenshot of Wireshark after packet capture.
This is what we’re looking for|a series of TCP segments sent between your computer and gaia.cs.umass.edu. We will use the packet trace that you have captured to study TCP behaviour in the rest of this lab.
Exercises
3. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identi es the segment as a SYN segment? [AM]
4. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement eld in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identi es the segment as a SYNACK segment? [AM]
5. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to nd the POST command, you’ll need to dig into the packet content eld at the bottom of the Wireshark window, looking for a segment with a \POST" within its DATA eld. [AM]
6. Consider the TCP segment containing the HTTP POST as the rst segment in the TCP connection. What are the sequence numbers of the rst six segments in the TCP connection
6
(including the segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for each segment received? Given the di erence between when each TCP segment was sent, and when its acknowledgement was received, what is the RTT value for each of the six segments? What is the EstimatedRTT value (see Section 3.5.3, page 239 in text) after the receipt of each ACK? Assume that the value of the EstimatedRTT is equal to the measured RTT for the rst segment, and then is computed using the EstimatedRTT equation on page 239 for all subsequent segments. (Note: Wireshark has a nice feature that allows you to plot the RTT for each of the TCP segments sent. Select a TCP segment in the \listing of captured packets" window that is being sent from the client to the gaia.cs.umass.edu server. Then select: Statistics > TCP Stream Graph > Round Trip Time Graph.) [AM]
7. What is the length of each of the rst six TCP segments? [AM]
8. a) What is the minimum amount of available bu er space advertised at the received for the entire trace? [AM]
b) Does the lack of receiver bu er space ever throttle the sender? note: Answer this in the document that will not be marked automatically
9. Are there any retransmitted segments in the trace le? What did you check for (in the trace) in order to answer this question? NOTE: Answer this in the document that will not be marked automatically.
2.1.4 TCP congestion control in action (optional!)
Let’s now examine the amount of data sent per unit time from the client to the server. Rather than (tediously!) calculating this from the raw data in the Wireshark window, we’ll use one of Wireshark’s TCP graphing utilities|Time-Sequence-Graph (Stevens)|to plot out data.
Select a TCP segment in the Wireshark’s \listing of captured-packets" window. Then select the menu : Statistics > TCP Stream Graph > Time-Sequence-Graph(Stevens). In theory, you should see a plot that looks similar to the plot as shown in Figure 4, which was created from the captured packets in the packet trace tcp-ethereal-trace-1 in http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip. In practice, you’re unlikely to see such neat results with your own trace.
Here, each dot represents a TCP segment sent, plotting the sequence number of the segment versus the time at which it was sent. Note that a set of dots stacked above each other represents a series of packets that were sent back-to-back by the sender.
Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence number versus time plot of segments being sent from the client to the gaia.cs.umass.edu server. Can you identify where TCP’s slowstart phase begins and ends, and where congestion avoidance takes over? If not (or extremely hard to nd out form the graph), why not? Comment on ways in which the measured data di ers from the idealised behaviour of TCP that we’ve studied in the text.
Note: the reason why this exercise is optional is because your own trace will not nearly be as neat as this one in Fig. 4. That’s not your bad. Can you think of a reason why yours will be so di erent?
2.2 IP Wireshark lab
In this part of the practical assignment, you’ll investigate the IP protocol, focusing on the IP datagram. You’ll do so by analysing a trace of IP datagrams sent and received by an execution of the traceroute program2. We’ll investigate the various elds in the IP datagram, and study IP fragmentation in detail.
2The traceroute program itself is explored in more detail elsewhere in the Wireshark ICMP lab that we don’t cover in the pracs, but is available on Vula in case you’re interested
7
Figure 4: Time sequence graph with the book’s clean data.
Before beginning this lab, you’ll probably want to review sections 1.4.3 in the text and section 3.4 of RFC 21513 to update yourself on the operation of the traceroute program. You’ll also want to read Section 4.4 in the text, and probably also have RFC 7914 on hand as well, for a discussion of the IP protocol.
2.2.1 Capturing packets from an execution of traceroute
In order to generate a trace of IP datagrams for this lab, we’ll use the traceroute program to send datagrams of di erent sizes towards some destination, X. Recall that traceroute operates by rst sending one or more datagrams with the time-to-live (TTL) eld in the IP header set to 1; it then sends a series of one or more datagrams towards the same destination with a TTL value of 2; it then sends a series of datagrams towards the same destination with a TTL value of 3; and so on. Recall that a router must decrement the TTL in each received datagram by 1 (actually, RFC 791 says that the router must decrement the TTL by at least one). If the TTL reaches 0, the router returns an ICMP message (type 11 { TTL-exceeded) to the sending host. As a result of this behaviour, a datagram with a TTL of 1 (sent by the host executing traceroute) will cause the router one hop away from the sender to send an ICMP TTL-exceeded message back to the sender; the datagram sent with a TTL of 2 will cause the router two hops away to send an ICMP message back to the sender; the datagram sent with a TTL of 3 will cause the router three hops away to send an ICMP
• ftp://ftp.rfc-editor.org/in-notes/rfc2151.txt
• ftp://ftp.rfc-editor.org/in-notes/rfc791.txt
8
message back to the sender; and so on. In this manner, the host executing traceroute can learn the identities of the routers between itself and destination X by looking at the source IP addresses in the datagrams containing the ICMP TTL-exceeded messages.
We’ll want to run traceroute and have it send datagrams of various lengths.
Windows. The tracert program (used for our ICMP Wireshark lab) provided with Windows does not allow one to change the size of the ICMP echo request (ping) message sent by the tracert program5.
Linux/Unix/MacOS. With the Unix/MacOS traceroute command, the size of the UDP datagram sent towards the destination can be explicitly set by indicating the number of bytes in the datagram; this value is entered in the traceroute command line immediately after the name or address of the destination. For example, to send traceroute datagrams of 2000
bytes towards gaia.cs.umass.edu, the command would be:
traceroute gaia.cs.umass.edu 2000
Do the following:
{ Start up Wireshark and begin packet capture (Capture > Start) and then press OK on the Wireshark Packet Capture Options screen (we won’t need to select any options here), if you did not continue with the TCP capture after all.
{ If you are using a Windows platform, use the command prompt6. If you are using a Unix or Mac platform, enter three traceroute commands, one with a length of 56 bytes, one with a length of 2000 bytes, and one with a length of 3500 bytes. You can do the same with pingplotter, but not with tracert.
{ Next, send a set of datagrams with a longer length, by selecting Edit > Advanced Options
• Packet Options and enter a value of 2000 in the Packet Size eld and then press OK.
Then press the Resume button.
{ Stop Wireshark tracing when it has completed the trace. Save the trace as 'iptrace.pcap'.
2.2.2 A look at the captured trace
In your trace, you should be able to see the series of ICMP Echo Request (in the case of Windows machine) or the UDP segment (in the case of Unix) sent by your computer and the ICMP TTL-exceeded messages returned to your computer by the intermediate routers. In the questions below, we’ll assume you are using a Windows machine; the corresponding questions for the case of a Unix machine should be clear. When answering a question below you should hand in a softcopy of the packet(s) within the trace that you used to answer the question asked. When you hand in your assignment, annotate the output so that it’s clear where in the output you’re getting the information for your answer to the manually marked questions.
Exercises
10. Select the rst ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the packet details window (see also Fig. 7). What is the IP address of your computer? [AM]
11. Within the IP packet header, what is the value in the upper layer protocol eld? [AM]
5A nicer Windows traceroute program is pingplotter, available both in free version and shareware versions at http://www.pingplotter.com. Download and install pingplotter, and test it out by performing a few traceroutes to your favorite sites. The size of the ICMP echo request message can be explicitly set in pingplotter by selecting the menu item Edit > Options > Packet Options and then lling in the Packet Size eld. The default packet size is 56 bytes. Once pingplotter has sent a series of packets with the increasing TTL values, it restarts the sending process again with a TTL of 1, after waiting Trace Interval amount of time. The value of Trace Interval and the number of intervals can be explicitly set in pingplotter.
• If you use pingplotter, then: start up pingplotter and enter the name of a target destination in the \Address to Trace Window." Enter 3 in the \# of times to Trace" eld, so you don’t gather too much data. Select the menu item
Edit > Advanced Options > Packet Options and enter a value of 56 in the Packet Size eld and then press OK.
Then press the Trace button.
9
12. Has this IP datagram been fragmented? [AM]
13. Explain how you determined whether or not the datagram has been fragmented.
14. How many bytes are in the IP header? How many bytes are in the payload of the IP datagram?
Figure 5: Screenshot related to question 10.
Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the rst ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the \details of selected packet header" window. In the \listing of captured packets" window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this rst ICMP. Use the down arrow to move through the ICMP messages sent by your computer.
15. Which elds in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer?
16. Which elds stay constant? Which of the elds must stay constant? Which elds must change? Why?
17. Describe the pattern you see in the values in the Identi cation eld of the IP datagram
Next (with the packets still sorted by source address) nd the series of ICMP TTL-exceeded replies sent to your computer by the nearest router.
17. Describe how you found it. What is the value in the Identi cation eld and the TTL eld?
18. Do these values remain unchanged for all of the ICMP TTL-exceeded replies sent to your computer by the nearest ( rst hop) router? Why?
10
Credits: these Wireshark exercises are heavily based on Kurose and Ross’ material for the Wireshark labs accompanying the book, but note that some strategic modi cations have been made to prevent you from copying the answers from those online available (well, you could, but then the answers would be wrong). That said, if you’re unsure what to do, you could nd that lab assignment and answers and practice with that rst.
11
• Appendix: Automarker format
The questions that will be automatically marked have to be typed up in a txt le in the following format:
Figure 6: Format of the answer le for the questions that will be marked by the automatic marker.
On the next page you can see an example of how your le may look like; this is sample data, so your answers will be di erent.
12
Figure 7: Sample le with hypothetical answers (that will be marked by the automatic marker).
13