Lab 9‐1 TCP ‐ Handshake and Connection Termination - Isaiah-River/NET-215-Network-Protocols GitHub Wiki

Main Lab

Overview

For this lab we familiarized ourselves with the TCP handshake and connection termination process by analyzing packets with Wireshark.

Part 01 - Capturing the handshake

To begin the lab I had to capture the a packet with Wireshark. In order to do this I started a capture on the ethernet, and then inside and incognito window I attempted to connect to 95.216.26.30. After this I stopped my capture and used the filter ip.addr==95.216.26.30 to filter for the captured packets relating to this connection.

image

Part 02 - Analyzing the TCP handshake

After this we first analyzed the SYN packet noting the source and destination ports.

image

After this we analyzed the sequence number for the SYN packet. In order to do this I had to turn off relative sequence number by right clicking my packet > Protocol Preference > Transmission Control Protocol > Uncheck Relative Sequence Numbers.

image

image

After this we looked at the SYN, ACK packet noting the Sequence and Acknowledgement numbers.

image

Finally we looked at the ACK packet.

image

Part 03 - Analyzing the TCP Connection Termination

To analyze the TCP connection termination process I had to repeat similar steps to before, with the difference of making sure I capture packets after closing my connection to 95.216.26.30. After capturing my packet I took a screenshot of the 3 or four packets showing the termination process.

image

I then reenabled relative sequence numbers.

image

I then analyzed the bytes sent between the server and the browser.

image