Questions
4510_COMP_SCI_X_0003 (Bonus/Make up missing marks) Wireshark NAT lab quiz [Limited to 3 Attempts]
Short answer
Wireshark Lab: NAT v7.0 Adapted from Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb © 2005-2012, J.F Kurose and K.W. Ross, All Rights Reserved In this lab, we’ll investigate the behavior of the NAT protocol. This lab will be different from our other Wireshark labs, where we’ve captured a trace file at a single Wireshark measurement point. Because we’re interested in capturing packets at both the input and output sides of the NAT device, we’ll need to capture packets at two locations. Also, because many students don’t have easy access to a NAT device or to two computers on which to take Wireshark measurements, this isn’t a lab that is easily done “live” by a student. Therefore in this lab, you will use Wireshark trace files that we’ve captured for you. Before beginning this lab, you’ll probably want to review the material on NAT section 4.3.4 in the text[1]. The basic idea behind NAT is that you can re-use private IP addresses behind the NAT router and these addresses will never be sent out onto the network, but are instead 'translated' by the NAT router to use a public IP address. Several private addresses can be mapped to a single public address and are differentiated by port number. The NAT router builds a table that allows the packets to be translated from their external to their internal addresses. NAT replaces private address/port with the public address/port as packets are sent onto the Internet and when responses are received, NAT looks up the address and port in the table and replaces the public address/port with the private address/port. NAT Measurement Scenario In this lab, we’ll capture packets from a simple web request from a client PC in a home network to a www.google.com server. Within the home network, the home network router provides a NAT service, as discussed in Chapter 4. Figure 1 shows our Wireshark trace-collection scenario. As in our other Wireshark labs, we collect a Wireshark trace on the client PC in our home network. This file is called NAT_home_side[2]. Because we are also interested in the packets being sent by the NAT router into the ISP, we’ll collect a second trace file at a PC (not shown) tapping into the link from the home router into the ISP network, as shown in Figure 1. (The hub device shown on the ISP side of the router is used to tap into the link between the NAT router and the first hop router in the ISP). Client-to-server packets captured by Wireshark at this point will have undergone NAT translation. The Wireshark trace file captured on the ISP side of the home router is called NAT_ISP_side. Open the NAT_home_side file and answer the following questions. You might find it useful to use a Wireshark filter so that only frames containing HTTP messages are displayed from the trace file. Looking at the NAT_Home_Side trace, what is the IP address of the client in the HTTP GET request? --------------------------------------------------------------------------------------------------------------------------------------------- [1] References to figures and sections are for the 7th edition of our text, Computer Networks, A Top-down Approach, 7th ed., J.F. Kurose and K.W. Ross, Addison-Wesley/Pearson, 2016. [2] Download the zip file http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the files need for this lab.

View Explanation
Verified Answer
Please login to view
Step-by-Step Analysis
The question asks: Looking at the NAT_Home_Side trace, what is the IP address of the client in the HTTP GET request?
Since there are no provided answer options in the data, I will reason through how you would determine the client IP in the HTTP GET within the NAT_home_side capture and why 192.168.1.100 is the expected value.
First, recall the lab scenario: the NAT_home_side trace is captured on the client side, inside the home network, before NAT translation occurs when the packet leaves toward the ISP. The client is using a private IP address from the ho......Login to view full explanationLog in for full answers
We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!
Similar Questions
NAT : Network Address Translation In the following home network, host 192.168.5.1 sends a HTTP request to a web server of IP address 129.112.40.6, and receives a HTTP response. Relating to this request, the NAT table at the home router has the following entry: WAN side addr WAN side port LAN side addr LAN side port 130.155.169.8 6123 192.168.5.1 3456 Complete the following table to show what you would observe at the home router's WAN interface point A and host 192.168.5.1's network interface point C. Datagram Observed at Source IP addr Source port Destination IP addr Destination port HTTP request point C [Fill in the blank] 3456 [Fill in the blank] 80 HTTP request point A [Fill in the blank] 6123 [Fill in the blank] 80 HTTP response point A [Fill in the blank] 80 [Fill in the blank] 6123 HTTP response point C [Fill in the blank] 80 [Fill in the blank] 3456
The primary purpose of Network Address Translation (NAT) is:
Question13 When an IP datagram containing a transport segment is going from a private network onto the public Internet through a Network Address Translation (NAT) router, which of the following network and transport layer header fields might the router change? You can select multiple options.Select one or more alternatives Destination port number IP checksum Destination IP address Source IP address None of the provided choices Protocol field in IP header Source port number Transport checksum ResetMaximum marks: 1
A private network uses a NAPT device at public IP address 197.196.100.80 The computers in the network use addresses of the form 10.0.0.x/22. Suppose that computer inside the NATed network sends a request with Source address: 10.0.1.10 Source port: 530 Destination address: 60.25.40.10 Destination port: 20 The next available port number on the NAPT device is 10123. PART 1: What source and destination information do the request packet headers contain when the request is sent out by the sending host? Source address: [ Select ] 10123 60.25.40.10 530 197.196.100.80 10.0.1.10 20 Source port : [ Select ] 10123 10.0.1.10 530 60.25.40.10 197.196.100.80 20 Destination address: 60.25.40.10 Destination port : [ Select ] 10.0.1.10 530 20 197.196.100.80 10123 60.25.40.10 PART 2: What source and destination information do the request packet headers contain when the request is sent out by the NAT box? Source address: [ Select ] 60.25.40.10 20 10.0.1.10 197.196.100.80 530 10123 Source port : [ Select ] 60.25.40.10 10123 10.0.1.10 197.196.100.80 20 530 Destination address: [ Select ] 197.196.100.80 530 60.25.40.10 10.0.1.10 10123 20 Destination port : [ Select ] 10.0.1.10 60.25.40.10 10123 20 530 197.196.100.80 PART 3: What source and destination information do the response packet headers contain when the response is received by the NAT box? Source address: [ Select ] 60.25.40.10 10.0.1.10 10123 197.196.100.80 20 530 Source port : [ Select ] 60.25.40.10 20 10123 530 10.0.1.10 197.196.100.80 Destination address: [ Select ] 60.25.40.10 197.196.100.80 530 20 10.0.1.10 10123 Destination port : [ Select ] 530 60.25.40.10 10123 20 10.0.1.10 197.196.100.80 PART 4: What source and destination information do the response packet headers contain when the response is received by the original sending host? Source address: [ Select ] 197.196.100.80 20 10.0.1.10 530 60.25.40.10 10123 Source port : [ Select ] 530 60.25.40.10 20 10123 197.196.100.80 10.0.1.10 Destination address: [ Select ] 197.196.100.80 60.25.40.10 10123 530 20 10.0.1.10 Destination port : 530
More Practical Tools for Students Powered by AI Study Helper
Making Your Study Simpler
Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!