CPSC Home
CPSC 341 - Wireshark ICMP Lab
Earl Rodd
Updated Sept. 15, 2018

Overview

We will examine how "ping" works and learn to find ICMP packet information in a trace. We will try "ping" to different hosts to see the differences in RTT. Many hosts do not return "ping". The lab will direct you to use certain sites. The sites chosen should allow the lab to be done either in CL-24 or on your own machine on or off campus.

A Wireshark display filter of "icmp" will be helpful.

ping options in Windows

The ping command has a number of options. We will be using two options. Thus the format of "ping" is:

ping -n count -l size host

ping options in LINUX

The ping command has a number of options. We will be using two options. Thus the format of "ping" is:

ping -c count -s size host

Saving screen output to print in Windows.

There are other ways to save command line screen output in Windows, but one way is to use "powershell" with the "tee" command like this:

powershell "ping -n 5 malone.edu | tee C:\Users\Me\filea"

The command output will show on the command window and also be saved in the file "C:\Users\Me\filea".

Saving screen output to print in LINUX.

In LINUX, you can pipe output to the "tee" command like this:

   ping -c5 earl.rodd.us | tee /tmp/a

The output will still show on the command line screen, but will also be sent to the file "/tmp/a".

Output Printing

The various lab steps show output to file with names "a" through "f". You may use a prefix to your file names but be sure they end with the "a" etc. as shown.

In this lab, you need to printout two things:

  1. The output of the "ping" command. The method of getting the output to a file was discussed above. You can print files by editing (e.g. notepad) and printing from the editor or your favorite ways to print.

  2. The Wireshark summary. Since we don't want to be "logged on" (with mnet) because this causes a lot of extra network traffic, we want to perform the traces while not logged on. But to print in the lab, you must be logged on with mnet. Therefore we first save output to a file, and later print the files.

    To do this, follow these steps:

The individual steps will tell you what to print. Please use the saved filenames suggested since these will be printed with the file and you (and I) can easily identify which trace is which.

Lab Steps

For each step, first start Wireshark, then perform the "ping", then stop the trace, then answer the questions, and finally print the trace if you are so directed. These instructions use the Windows versions of "ping" options using powershell and "tee" to save the output. You should be a directory in Windows (like your home) where you have write access.

  1. Be sure the browser is NOT running. This can also cause excess traffic.

  2. Start Wireshark

  3. Ping google: powershell "ping -n5 google.com | tee a"

  4. Stop Wireshark

  5. Save (Print) the summary to a file: a.w

  6. Ping yahoo.com powershell "ping -n5 yahoo.com | tee /tmp/b"

  7. Ping www.optuszoo.com.au powershell "ping -n5 www.optuszoo.com.au | tee c"

  8. Ping 4.2.2.2 powershell "ping -n5 4.2.2.2 | tee d"

  9. Start Wireshark

  10. Ping ibm.com powershell "ping -n5 ibm.com | tee e"

  11. After ping ends, stop Wireshark.

  12. Save (Print) the summary to a file: e.w

  13. Start Wireshark

  14. ping 4.2.2.2 with a large packet so we can see fragmentation. powershell "ping -n2 -l5000 4.2.2.2 | tee f"

  15. Save (Print) the summary to a file: f.w

  16. Print the files: a a.w b c d e e.w f f.w