Nt1310 Lab 4.3

Improved Essays
5.1.4.3 Lab — Using Wireshark to Examine Ethernet Frames

Part 1: Examine the Header Fields in an Ethernet II Frame

Part 2: Use Wireshark to Capture and Analyze Ethernet Frames

Part 1: Examine the Header Fields in an Ethernet II Frame

What is significant about the contents of the destination address field?
It starts with the broadcast ARP protocol from the router asking who has 192.168.2.22. Then it starts showing the source ip address then destination addresses then rebroadcasting from your router. ____________________________________________________________________________________
____________________________________________________________________________________

Why does the PC send out a broadcast ARP prior to sending the first
…show more content…
Notice that the plus sign changes to a minus (-) sign.

What type of frame is displayed? _159 bytes 1272 bits_ 0x806______________________________.

e. The last two lines displayed in the middle section provide information about the data field of the frame.
Notice that the data contains the source and destination IPv4 address information.

What is the source IP address? 192.168.2.32_________________________________

What is the destination IP address? 239.255.255.250______________________________
You can click any line in the middle section to highlight that part of the frame (hex and ASCII) in the
Packet Bytes pane (bottom section).

Click the Internet Control Message Protocol line in the middle section and examine what is highlighted in the Packet Bytes pane.

What do the last two highlighted octets spell? ______

Click the next frame in the top section and examine an Echo reply frame. Notice that the source and destination MAC addresses have reversed, because this frame was sent from the default gateway router as a reply to the first ping.

What device and MAC address is displayed as the destination address?
_ff-ff-ff-ff-ff-ff
…show more content…
In the first echo (ping) request frame, what are the source and destination MAC addresses?

Source: 1c-65-9d-eb-c4-57_________________________________

Destination: 6d-e6-40-00-38-06______________________________

What are the source and destination IP addresses contained in the data field of the frame?

Source: 192.168.2.32 _________________________________.

Destination: 72.21.91.8______________________________

Compare these addresses to the addresses you received in Step 7. The only address that changed is the destination IP address. Why has the destination IP address changed, while the destination MAC address remained the same?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

Reflection
Wireshark does not display the preamble field of a frame header. What does the preamble

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Lab 3.07

    • 103 Words
    • 1 Pages

    1 Specialized mats and wrist straps help protect electronic components from __________. ESD or static electricity 2 What device is used to monitor temperature in the fuser assembly in a laser printer? Thermistor 3 __________ bundle wires to help keep them organized inside electronic devices.…

    • 103 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 6 Lab

    • 1594 Words
    • 7 Pages

    My group had been given a specific task to investigate according to the lab manual1. We were employed by the Environmental Protection Agency as chemists. Our task is to identify an unknown compound that was found in a nearby landfill. In this laboratory, the unknown compound was given to us by our TA. The main goal of this experiment was to correctly identify the unknown compound.…

    • 1594 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    It is composed of software controllers that communicate with the forwarding network fundamentals through standard interfaces, referred also as the South Bound Interface. The last layer is called Application Layer which takes care of…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    1. Ethernet Ethernet is a combination of computer networking technologies most commonly used in local, metropolitan, and wide area networks. 2. Server A computer or computer program that manages access and distributes information through a centralized service in a network.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In this model every subject and object are classified and assigned with a security label. Packet filtering firewall…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1210 Chapter 7 Summary

    • 1348 Words
    • 6 Pages

    9.6 Packages are moved to several community segments simply by hubs located in different factors through the net. Routers are normally specific computers in which forwards boxes throughout the ideal paths, because based on this routing recursive rule being used for the system, towards areas shown by destination IP deals with from the box headers. Throughout transport in one sponsor completely to another, boxes might be routed from ordering in addition to all over a choice of paths to get at the desired…

    • 1348 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 4

    • 1763 Words
    • 8 Pages

    Planning The unit 5 and 6 mastery negotiation 3 required my team, the Concerned Community Coalition (CCC), to take part in a planning session prior to the actual negotiation with the other team, hospital board & administrator, and the meditators. During the planning session our goals were to determine our BANTA, consider the possible response from our opponent, and try to determine what their mindset and emotional state might be when we begin negotiating. Assembling the Issues, ranking their importance and defining the bargaining mix began with a review of the case.…

    • 1763 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    This round is called flood min, used to allow the smaller node ids to reclaim a number of their territory. Then every node evaluates the logged entries following the rules listed…

    • 930 Words
    • 4 Pages
    Improved Essays