TCP Networks
-
Upload
nicholas-ingram -
Category
Documents
-
view
5 -
download
0
description
Transcript of TCP Networks
-
Computer Communications Experiment 1 Report
Jos Mendes de Melo Junior
#104323597
1) The IP address of my host is 192.168.1.11
2) The routing table provides information of how my computer routes packets. For example, in the
first line it can be seen that when a packet is sent to a generic destination (0.0.0.0.), the packet
is first sent to the gateway. The field Metric in the routing table indicates the cost of using this
route to reach the destination.
3)
a) www.uwindsor.ca
Name: www.uwindsor.ca
IP Adress: (137.207.71.197)
b) www.sympatico.ca
Name: bsympatico.vo.llnwd.net
IP Adresses: 69.164.35.224
69.164.34.128
c) www.yahoo.com
Name: fd-fp3.wg1.b.yahoo.com
IP Adresses: 2001:4998:58:c02::a9
98.139.183.24
98.139.180.149
d) www.mit.edu
Name: e9566.b.akamaiedge.net
IP Adress: 184.86.32.128
e) 137.207.10.1
Name: gate.esx2f.uwindsor.ca
IP Adress: 137.207.10.1
4) The addresses www.uwindsor.ca and 137.207.10.1 did not respond to the ping command, even
when I tried to increase the maximum time. These two addresses are from the University of
Windsor. Using the command tracert with www.uwindsor.ca, I found that after the address
-
firewall.uwindsor.ca the trace of routers stopped to be shown. So, I think that is maybe some
mechanism of defense against cyber attacks.
The addresses www.sympatico.ca and www.mit.edu had the same minimum delay (15 ms), and the
address www.yahoo.com had the maximum delay (59 ms).
5) The addresses www.sympatico.ca and www.mit.edu have the same number of routers until they
are reached (6). The address www.yahoo.com has 20 routers until it is reached.
6)
- Yes, the IP addresses of the hosts can be read in the boxes Source or Destination.
- The command ping and the command tracert uses the protocol ICMP and the command
nslookup uses the protocol DNS.
- Yes, the IP address of my host can be viewed in the box Source or Destination.
- In the protocol headers it can be viewed information such as the IP version, the addresses of the
source and of the destination, how many bytes were captured.