Question

Wireshark Lab #2: Ethernet In this lab, well investigate the Ethernet protocol and the ARP protocol. Before beginning this lAnswer the following questions, based on the contents of the Ethernet frame containing the HTTP GET message. Whenever possiblI had tried to work with the wireshark interface and cannot navigate it due to network problems and cannot find the question solutions, if any one can help with detailed steps it would be a great help.

Wireshark Lab #2: Ethernet In this lab, we'll investigate the Ethernet protocol and the ARP protocol. Before beginning this lab, you'l1 probably want to review sections 6.4.1 (Link-layer addressing and ARP) and 6.4.2 (Ethernet) in the text. RFC 826 (ftp://ftp.rfc-editor.org/in- notes/std/std37.txt) contains the gory details of the ARP protocol, which is used by an IP device to determine the IP address of a remote interface whose Ethernet address is known. 1. Capturing and analyzing Ethernet frames Let's begin by capturing a set of Ethernet frames to study. Do the following First, make sure your browser's cache is empty. To do this under Mozilla Firefox V3 select Tools->Clear Recent History and check the box for Cache. For Internet Explorer select Tools->Internet Options->Delete Files. Start up the Wireshark packet sniffer Enter the following URL into your browser http://gaia.cs.umass.edu/wireshark labs/HTTP-ethereal-lab-file3.html Your browser should display the rather lengthy US Bill of Rights . Stop Wireshark packet capture. First, find the packet numbers (the leftmost column in the upper Wireshark window) of the HTTP GET message that was sent from your computer to gaia.cs.umass.edu, as well as the beginning of the HTTP response message sent to your computer by gaia.cs.umass.edu. You should see a screen that looks something like this (where packet 4 in the screen shot below contains the HTTP GET message)
Answer the following questions, based on the contents of the Ethernet frame containing the HTTP GET message. Whenever possible, when answering a question you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout' to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question. 1. 2. What is the 48-bit Ethernet address of your computer? What is the 48-bit destination address in the Ethernet frame? Is this the Ethernet address of gaia.cs.umass.edu? (Hint: the answer is no). What device has this as its Ethernet address? [Note: this is an important question, and one that students sometimes get wrong. Re-read pages 468-469 in the text and make sure you understand the answer here 3. Give the hexadecimal value for the two-byte Frame type field. What upper layer protocol 4. How many bytes from the very start of the Ethernet frame does the ASCII "G in "GET" Next, answer the following questions, based on the contents of the Ethernet frame containing the does this correspond to? appear in the Ethernet frame? first byte of the HTTP response message. 5. What is the value of the Ethernet source address? Is this the address of your computer, or of gaia.cs.umass.edu (Hint: the answer is no). What device has this as its Ethernet address? 6. What is the destination address in the Ethernet frame? Is this the Ethernet address of your 7. Give the hexadecimal value for the two-byte Frame type field. What upper layer protocol 8. How many bytes from the very start of the Ethenet frame does the ASCII "O" in "OK" computer? does this correspond to? (i.e., the HTTP response code) appear in the Ethernet frame?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. What is the 48-bit Ethernet address of your computer? Answer Local Area Connection [Wireshark 1.10.6 (v1.10.6 from master

  According to Figure 1, the destination address is a0:f3:c1:f8:6d:f9. This address is not the etherrnet address of gaia.cs.uma

6. What is the destination address in the Ethernet frame? ls this the Ethernet address of your computer? Answer According to

If you like my work then plz give a like it will really appreciate.

Add a comment
Know the answer?
Add Answer to:
I had tried to work with the wireshark interface and cannot navigate it due to network problems a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The goal of this first lab was primarily to introduce you to Wireshark. The following questions...

    The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you’ve been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation: 1. List up to 10 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7 Step 7: After your browser has displayed the INTRO-wireshark-file1.html page, stop Wireshark packet capture by...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the...

    I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the Link layer in TCP/IP model. Figure 1-11 shows four steps, in the first step Larry encapsulates the IP packet between an Ethernet header and Ethernet trailer, creating an Ethernet frame. Larry encapsulates the IP packet, what does this mean? Is it like compressing a file into a zip and compressing the IP packet into a frame? I've read the previous pages about the upper...

  • . each of the following, write ONE of the letters AB to indicate your answer If...

    . each of the following, write ONE of the letters AB to indicate your answer If the receiver R of an ARP packet p sent by S does not have S's binding in its cache, which is a true? A. Only I B. Only II C. Only III D.Only I and II E. Only I and III F. Only II and GIII and I IR caches S's binding if p is a broadcast and R is the target II. R...

  • In the Wireshark Capture. In frame 126, follow the TCP stream. What is the request that...

    In the Wireshark Capture. In frame 126, follow the TCP stream. What is the request that is made to the server? What response does the server give back? Based on these messages and others you can see in the packet capture, what would you say is going on? Is this an attack? If so, what type of attack might it be? No. Time source Destination Protocol Length Info 74 52148 80 SYN] Seq-0 win 29200 Len-0 Mss 1460 SACK PERM...

  • In the last module you learned a formula for calculating bit rate, R = b/t, that...

    In the last module you learned a formula for calculating bit rate, R = b/t, that is the number of bits divided by the time. This formula expresses the number of bits that are transmitted over a circuit in a given period of time. In practice, however, we are not only concerned with the number bits transmitted, but also with the number of data bits transmitted over a circuit. The data bits are those that the sender decides to send...

  • This assessment aims to develop and gauge student understanding of the key topics covered so far...

    This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding of the next assessment items as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the textbook and any additional material you...

  • on calculations can i see how did the expect come to the solution ,all the workout...

    on calculations can i see how did the expect come to the solution ,all the workout should be included QUESTION 1 A file of size F = 8 Gbits needs to be distributed to10 peers. Suppose the server has an upload rate of u = 68 Mbps, and that the 10 peers have upload rates of: u1 = 20 Mbps, u2 = 22 Mbps, u3 = 12 Mbps, u4 = 19 Mbps, u5 = 25 Mbps, u6 = 24 Mbps,...

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • Plz answer 27 to 40 flooding the network with 27. Which of the following is a...

    Plz answer 27 to 40 flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT