Question

i have assignment if you can help me to get the answer A frame is the...

i have assignment if you can help me to get the answer

A frame is the protocol data unit (PDU) at the data link layer. Use Wireshark to analyze data transfer in a network (use 3 data transfer cases), evaluate your answer under the following:

1-Frame Length

2-Frame Number

3-Bytes on wire

4-Bytes captured on the interface

. Submit your Wireshark lab and the comparative analysis of the Frames analysed

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Explanation:

1- frame length is 55 bytes(440 bits).

2-frame number is 1

3-bytes on Wire is 55bytes (440 bits).

4- bytes captured on the interface is 55 bytes(440 bits).

Screenshots of analyzed frames:

Captured frames:

10.10.80.12 55 2195 3128 [ACKI Seqs1 Acks] Wins]6085 Lens] 167 M-SEARCH HTTP/1.1 208 M-SEARCH HTTP/1.1 179 M-SEARCH HTTP/1.1

Details of Frame 1:

4 Frame 1: 55 bytes on wire (440 bits), 55 bytes captured (440 bits) on interface D Interface id: 0 (\Device\NPF 95A1C50c-0A2Data of Frame -1:

0000 e0 1a ea 17 c5 d7 24 fd 52 de 27 18 08 00 45 00 0010 00 29 0c f4 40 00 80 06 48 09 0a 0a 41 b2 0a 0a .)..@ н А°.. 020 50

Note:

  • The protocol used for frame 1 is TCP.
  • The source address of the frame is 10.10.65.178
  • the destination address of the frame is 10.10.80.12
Add a comment
Know the answer?
Add Answer to:
i have assignment if you can help me to get the answer A frame is the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Pleaaase this is really urgent : A frame is the protocol data unit (PDU) at the...

    Pleaaase this is really urgent : A frame is the protocol data unit (PDU) at the data link layer. Use Wireshark to analyze data transfer in a network (use 3 data transfer cases), evaluate your answer under the following: 1) Frame Length 2) Frame Number 3) Bytes on wire 4) Bytes captured on the interface. Submit your Wireshark lab and the comparative analysis of the Frames analysed

  • I had tried to work with the wireshark interface and cannot navigate it due to network problems a...

    I had tried to work with the wireshark interface and cannot navigate it due to network problems and cannot find the question solutions, if any one can help with detailed steps it would be a great help. Wireshark Lab #2: Ethernet In this lab, we'll investigate the Ethernet protocol and the ARP protocol. Before beginning this lab, you'l1 probably want to review sections 6.4.1 (Link-layer addressing and ARP) and 6.4.2 (Ethernet) in the text. RFC 826 (ftp://ftp.rfc-editor.org/in- notes/std/std37.txt) contains the...

  • Question 13 5 pts Based on the provided Wireshark Capture File and information contained in Frame...

    Question 13 5 pts Based on the provided Wireshark Capture File and information contained in Frame # 12: What is the IPv4 address for the destination of the Layer 3 datagram (based on the particular Layer 3 datagram mentioned in instructions of this quiz)? 10.129.61.67 216.58.216.238 134.124.1.234 107.23.244.231 Question 14 5 pts Based on the provided Wireshark Capture File and information contained in Frame # 12: What is the IPv4 address of the source of the Layer 3 datagram (based...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • Answer? The MTU on 1 GbE can be set as high as 9000 bytes using so-called...

    Answer? The MTU on 1 GbE can be set as high as 9000 bytes using so-called "jumbo frames" at the data link layer. However, many 1 GbE interfaces still use MTUS of 1500. Let f be the number of bytes that need to be sent at the data link layer in a UDP transfer of a very large file with N bytes using an MTU of 1500 bytes, and left F be the number of bytes that would need to...

  • Question 1871 pts What is the length of the typical frame? Group of answer choices 150...

    Question 1871 pts What is the length of the typical frame? Group of answer choices 150 bytes of data 1500 bytes of data 1024 bytes of data 48 bytes of data Question 1881 pts The decimal value 151 converts to what binary value? Group of answer choices 10010111 10010110 11010001 10010101 Question 1891 pts Which of the following is true when describing a unicast address? Group of answer choices Packets addressed to a unicast address are delivered to a single...

  • Using C Programming Assignment: Implementing a Reliable Transport Protocol Overview In this laboratory programming assignment, you...

    Using C Programming Assignment: Implementing a Reliable Transport Protocol Overview In this laboratory programming assignment, you will be writing the sending and receiving transport-level code for implementing a simple reliable data transfer protocol. There are two versions of this lab, the Alternating-Bit-Protocol version and the Go- Back-N version. This lab should be fun since your implementation will differ very little from what would be required in a real-world situation. Since you probably don't have standalone machines (with an OS that...

  • Plz answer 27 to 40 flooding the network with 27. Which of the following is a...

    Plz answer 27 to 40 flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as...

  • *****Can someone please HELP me with this assignment please, I am struggling with this assignment and...

    *****Can someone please HELP me with this assignment please, I am struggling with this assignment and would appreciate some help, needs to be done in c/c++ ******* (100 marks) In this problem, you will write a file transfer program for transferring files between two computers connected by a network. The protocol that you will implement is called the Simple File Transfer Protocol (SFTP). The complete description for SFTP is given below. PART 1 SFTP is a simple protocol for transferring...

  • At this stage, you should be a Wireshark expert. Thus, we are not going to spell...

    At this stage, you should be a Wireshark expert. Thus, we are not going to spell out the steps as explicitly as in earlier labs. In particular, we are not going to provide example screenshots for all the steps. 1.   Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets (Note that DNS is using UDP for communications. You can use nslookup commands in Lab 4 to generate DNS...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT