计网实验报告(IP)

实验:Wireshark Lab: IP

一、 实验目的

1、 会用wireshark分析IP协议,对IP协议有个全面的学习与了解 2、 学习ip报文段的各领域。

二、 实验器材

1、 接入internet的计算机主机。

2、 抓包工具wreshark 和截图工具

三、 实验内容实验操作实践与步骤

Capturing packets from an execution of traceroute

1、 打开wireshark开始抓包.

2、 启动pingpiotter,在“address to trace window”中输入“gaia.cs.umass.edu”,

在“# of time to trace”中输入3,选中”edit”选项,接着选中“advance options”—packet option输入56,按OK键,在按Trace键。

3、 接着在packet option中输入2000,按OK键,在按Resume键。 4、 再在packet option中输入3500,按OK键,在按Resume键。 5、 停止抓包。 截图如下:

A look at the captured trace

1. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the packet details window. What is the IP address of your computer?

答:第一条ICMP回显请求报文如下:

由上图可知,我的电脑的IP地址是10.135.87.190

2. Within the IP packet header, what is the value in the upper layer protocol field? 答:由

可知,上层协议的值为1.

3. How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the number of payload bytes. 答:

由上图可知IP数据报首部长度为20比特,有效载荷量为56-20=36比特。

4. Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented.

由上图知flag和offset都为0,所以没有分片。

5. Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer?

联系客服:779662525#qq.com(#替换为@) 苏ICP备20003344号-4