SlideShare a Scribd company logo
1 of 6
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 1 of 6
INFSYS 3842/6836
Assignment 2 (Lab): Understanding layering and Ethernet MAC Frames Using Wireshark
Points Possible: 100
Due Date: Oct 8, 2016 by 11:59pm Central Time
IMPORTANT NOTE: THIS LAB MUST BE CARRIED OUT ON YOUR OWNCOMPUTER AND OWN
NETWORK. PLEASE DO NOT CAPTURE PACKETS ON A NETWORK THAT YOU DO NOT OWN.YOU’VE
BEEN WARNED!
Lab Overview:Itis importantwe are able to understandthe ideabehind“layersof functionality”
providedbydifferentprotocolsthatworktogetheratdifferentlevelsto accomplishdatanetworking.
Capturingsome networktrafficusingWiresharkandcarefullyanalyzingthe packetsisagreatway to
learnaboutlayeredfunctionalityaswellasthe syntax of some keyprotocolssuchas Transmission
Control Protocol (TCP),InternetProtocol (IP),andEthernet aswell assome commonapplicationlayer
protocolssuchas Hyper-TextTransferProtocol (HTTP)
Lab Purpose:
1) To downloadandinstall Wiresharkonstudents’personal computers
2) To learnthe basicsof howto use Wiresharkto capture networktraffic(fromstudentsown
computersandownnetworks)
3) To learnaboutbasic “Capture Filters”available inWireshark
4) Understandthe syntax of Layer 2 Frames.
Lab Tasks: There are twotasks forthislab.
TASK 1
Downloadandinstall WiresharkonOWNComputer.Visithttp://www.wireshark.org anddownloadthe
latestversion.Installationmayvarya bitdependingonyouroperatingsystem.The bestsource of helpis
the Wiresharkwiki (https://wiki.wireshark.org) butitcanbe a bitcryptic for beginners.There are plenty
of othertutorials/videos online incase youneedhelp.
TASK 2: (This task has five questions)
In thistaskyou will use Wiresharktocapture basicHTTP trafficand complete the activitiesand
questionsasdescribedbelow.
I recommendyouwatchsome videosonYouTube oncapturingHTTP trafficusingWireshark.The
processisfairlysimplyasdemonstratedinclassbutfeel freetolearnmore.
Alsofamiliarize yourselfwiththe basicinterfaceof Wireshark(the menus,options, filtersetc.).Again,
plentyof videosare availableonline andthe Wiresharkwikiis bestif youreallywanttolearn.
STEPS:
1) OpenWiresharkandidentifythe interface youwill capture trafficfrom(WirelessorEthernetLAN)
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 2 of 6
LAB Question1: How many interfacesdoesWiresharkrecognize yourcomputerhas?Whattypesof
interfacesare they(WiredEthernetLAN/Wireless/Virtual?)?
There are fourinterfaces.Those are:1) Wi-Fi 2) VirtualBox Host-OnlyNetwork3) NetworkConnection
and 4) USBPcap1
CONTINUE:
2) Close all browserwindows andotherapplications.Also,clearyourbrowser’s
cache/history/temporaryfiles.InInternetExplorerhit(Ctrl + Shift+ Delete).
3) Opena browserwindowandtype in http://www.umsl.edu/~khanshaj/3842/basic_http.html.DO
NOT Press Enter yet.
4) Go back to Wiresharkand Start a capture.
5) Go back to the browserwindowandnow hitenterto visitthe page.
6) Once the page loads, Close the BrowserWindow.
7) Returnto Wiresharkand Stop the capture. Save the capture on your computer. Call it
“BasicHTTPCapture”.
8) Examine the packetscapturedandscroll to find“greencoloredrows”thatdenote “TCP”based
traffic.Notice the Three-stephandshakeandthe HTTPrequestsanddata responsesfromthe server,
acknowledgements,andfourstepclosing.
9) FINDTHE PACKETthat belongstothe HTTP Getrequestaskingforthe basic_http.html file.See
picture below foranexample.Once located,rightclickonthatpacketand choose “Follow TCP
Stream”.Thisshouldremove all otherpacketsallowingyoutofocusonjust thisTCPsession.
Anotherwindowshowingthe HTTPrequestsandresponsesshouldalsoopen.Youcanminimize it.
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 3 of 6
10) Withthe above GET requestpacket selected(itshouldremainhighlighted),please complete the
rest of thislab
LAB Question2:
Usingthe packetassociatedwiththe GET requestasmentionedabove,please complete the following
fieldsinthe Frame Headerbelow(SEENEXTPAGEFOR FIGURE).
The ideahere is to learnabout the differentfieldsandwhat they accomplish.
NOTE: Althoughthe fieldvaluesare alwaysinbinary(asseeninthe bottommostsectionof your
capture) please feelfree toprovide the valuesastheyappearinthe MIDDLE part (i.e.eitherdecimal or
hex as the case maybe) of Wiresharkwindow.
Type in yourvaluesinthe “LightGray” shadedareasimmediatelybelow eachfield. Onlyfieldswithlight
gray areas belowthem are requiredto be completed.
[Hint:please visit https://en.wikipedia.org/wiki/Ethernet_frame tolearnmore aboutEthernetandits
Frame Structure and to betterunderstandwhateachof the fieldsbelow mean]
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 4 of 6
Layer1Ethernetpacket(theactualbitssentatthephysicallayer)
Preamble - 7 Octets(NotdisplayedinWireshark)
Start of Frame Delimiter(SFD) - 1 Octet(NotdisplayedinWireshark)
Layer2EthernetFrame
Layer2EthernetFrameHeader Destination MAC Address - 6 Octets
78-24-AF-C3-53-0A
Source MAC Address - 6 Octets
B4-AE-2B-27-8D-B5
802.1Q tag - 4 Octets (Optional. Present only in 802.1Q tagged frames. Can have more than one of these).
Tag Protocol ID (2 Octets)
Tag Control Information (2 Octets)
PCP
(3
bits)
DEI
(1
bit)
VLAN ID (12 bits)
Ethertype (present in Ethernet II frames) or length (present in ‘pure’ IEEE 802.3 frames) 2 Octets
IPv4
FrameData
Payload (Either 42 octets or 46 octets minimum to 1500 octets maximum)
Layer 3 Header
(IPDatagram/PacketHeader)
Layer 4 Header
(e.g., TCP Segment Header)
Application Data
(e.g., HTTP)
PADDING (if needed)
Frame
Trailer
Frame CheckSequence (a32-bitCyclicRedundancyChecknumber, 4Octets) (NotdisplayedinWireshark)
Inter-packet Gap (12 Octets)
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 5 of 6
LAB Question3: Using the https://en.wikipedia.org/wiki/Ethernet_frame linkorany other sources
you find,please brieflyexplainwhateach of the followingfieldsmean(i.e.theirpurpose).Please do
not simplycopy-paste but try to understand and explain.[Copy-paste answerswill not receive any
credit]
[Hint:A goodreadingof the above linkandunderstandingthe frame structure willhelpwiththistask.
The answersare givenonthe linkabove buttry to actuallyunderstandwhateachfielddoes]
1. Preamble - 7 Octets: Thisconsistsof a 56-bit(seven-byte)patternof alternating1and 0 bits,
allowingdevicesonthe networkeasilysynchronizethe receive clocks,whichisfollowedbySFD
to mark a newincomingframe.
2. Start of Frame Delimiter(SFD) - 1 Octet: Aneight-bit(one-byte)value thatmarksthe endof the
preamble,whichisthe firstfieldof anEthernetpacket,andindicatesthe beginningof the
Ethernetframe. Alsoconsideredasenvelopingthe frame.
3. DestinationMAC Address - 6 Octets: Unique identifier(address;IPv4orIPv6) to the location
whichyouare sendingpacketsto. Inotherwords,itis physical addressthe informationis
gettingreceivedby.
4. Source MAC Address - 6 Octets: The physical address (unique identifier) tothe machine in
whichyouare using.Canbe foundbyrunningipconfig/all inthe commandprompt.
5. Ethertype (presentin EthernetII frames) or length(presentin‘pure’ IEEE 802.3 frames) 2
Octets [explainbothpurposes clearly and clarify how is it known what purpose these 2 octets
are serving]:EthernetII framingdefinesthe two-octetEtherTypefieldinanEthernetframe,
precededbythe destinationandmacsource addresses,thatidentifiesanupperlayerprotocol
encapsulatingthe frame data. Soan EtherType value of 0x0800 signalsthat the frame contains
an IPv4 diagram. Likewise,tothat,an EhterType value of 0x0806 indicatesanARPframe,0x8100
indicatesanIEEE 802.1Q frame and 0x86DD indicatesanIPv6frame.
6. Frame CheckSequence - 4 Octets: (clearlyidentifywhat part offrame is this presentin,what
is the purpose, and how doesit work) The Frame CheckSequence isatthe endof the trailer
calledthe Frame Trailer.The purpose istocheck all the receivingfilesforcorruption;itiscalled
the cyclic redundancycheck.The Frame CheckSequence checkseachreceivingfile withan
algorithm,the resultwillalwaysbe zeroif the filesare error-free.
LAB Question4: In general,what is the minimumsize of the Layer 2 EthernetFrame in bytes?What
is/are the maximumsize(s)? The minimumsize of Layer2 EthernetFrame is64 bytes.Maximumsizes
are 1518 bytesand1522 bytes.
LAB Question5: Consideringthe payloadof the layer2 Ethernetframe:
1) What is the maximum payloadsizeof a regularEthernet frame? Maximumpayloadsize is1500
octets
2) Brieflybut fullydescribe the contents of the payload. The payloadconsistsof everythingabove
layer2. It encapsulatesthe layer3header,layer4 header,andapplicationdata(layer5). These
wouldinclude HTTP,TCPsegmentheader,andIPdatagram/packetheader.
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 6 of 6
LAB DELIVERABLES (to be uploadedto MyGateway):
1) Name Worddocument as “FirstName_LastName_Assignment2”.UploadcompletedWord
document
2) Uploadthe Wiresharkcapture file
GETTING HELP:
1) Call (314-489-9733) / email (shajikhan@umsl.edu)me anytime.Feelfree towalk-intomyoffice
if you see me there orsetupappointment
2) If you live oncampus(dorms) thenyoushouldnotuse wiresharkinyourdorms.Instead,email
me and I’ll sendyoua capture file youcoulduse foransweringthe questions.
3) Tutors will notbe able tohelpyoucapture packetsin Wireshark(capturingmustbe done at
home).Tutorswill be able tohelpwithlabanswersif youbringyourcapturedfile withyou.
4) Of course try to helpeachotherout.If some studentsare alreadyfamiliarwiththe taskslisted
above,Iencourage youto helpothers.“Teaching”andhelpingothersisbyfarthe bestway to
learn!But please,donotsubmitidentical work.

More Related Content

What's hot

DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2Drudndccn
 
DCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLANDCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLANrudndccn
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...VLSICS Design
 
Ecet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comEcet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comStephenson39
 
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystemDCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystemrudndccn
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUSTEngr. Md. Jamal Uddin Rayhan
 
Final training course
Final training courseFinal training course
Final training courseNoor Dhiya
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problemsRichard Ashworth
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetAfnic
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...RSIS International
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Engr. Md. Jamal Uddin Rayhan
 
Training course lect1
Training course lect1Training course lect1
Training course lect1Noor Dhiya
 
Scimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujoScimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujoRobson Araujo
 
Lexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam searchLexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam searchSatoru Katsumata
 
Java - Processing input and output
Java - Processing input and outputJava - Processing input and output
Java - Processing input and outputRiccardo Cardin
 

What's hot (17)

DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2D
 
DCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLANDCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
 
Ecet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comEcet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.com
 
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystemDCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
 
Final training course
Final training courseFinal training course
Final training course
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
 
Attackboard slides dac12-0605
Attackboard slides dac12-0605Attackboard slides dac12-0605
Attackboard slides dac12-0605
 
Training course lect1
Training course lect1Training course lect1
Training course lect1
 
Datagrams
DatagramsDatagrams
Datagrams
 
Scimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujoScimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujo
 
Lexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam searchLexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam search
 
Java - Processing input and output
Java - Processing input and outputJava - Processing input and output
Java - Processing input and output
 

Similar to Understanding Layering and Ethernet

Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docxWireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docxambersalomon88660
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++wissem hammouda
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Old Dominion University
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comsholingarjosh104
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.comHarrisGeorgz
 
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
HS1011 Data Communication and Networks  13 August 2015 HS101.docxHS1011 Data Communication and Networks  13 August 2015 HS101.docx
HS1011 Data Communication and Networks 13 August 2015 HS101.docxadampcarr67227
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.comWilliamsTaylorzo
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecturelawuah
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.comDavis117a
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docxambersalomon88660
 

Similar to Understanding Layering and Ethernet (20)

Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docxWireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
 
Networking answers
Networking answersNetworking answers
Networking answers
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Programming Assignment Help
Programming Assignment HelpProgramming Assignment Help
Programming Assignment Help
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.com
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.com
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
HS1011 Data Communication and Networks  13 August 2015 HS101.docxHS1011 Data Communication and Networks  13 August 2015 HS101.docx
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.com
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecture
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.com
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 

More from Nicole Gaehle, MSIST

Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareNicole Gaehle, MSIST
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardNicole Gaehle, MSIST
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperNicole Gaehle, MSIST
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityNicole Gaehle, MSIST
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentNicole Gaehle, MSIST
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismNicole Gaehle, MSIST
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Nicole Gaehle, MSIST
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentationNicole Gaehle, MSIST
 

More from Nicole Gaehle, MSIST (17)

Lab: Basic Reconnaissance
Lab: Basic ReconnaissanceLab: Basic Reconnaissance
Lab: Basic Reconnaissance
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS Standard
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services Paper
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak Entity
 
Database: PC and Employee
Database: PC and EmployeeDatabase: PC and Employee
Database: PC and Employee
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Virtualization and Linux
Virtualization and LinuxVirtualization and Linux
Virtualization and Linux
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
 
Cryptography
CryptographyCryptography
Cryptography
 
Networking Task
Networking Task Networking Task
Networking Task
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
 
Reverse Engineering Project
Reverse Engineering ProjectReverse Engineering Project
Reverse Engineering Project
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentation
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Understanding Layering and Ethernet

  • 1. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 1 of 6 INFSYS 3842/6836 Assignment 2 (Lab): Understanding layering and Ethernet MAC Frames Using Wireshark Points Possible: 100 Due Date: Oct 8, 2016 by 11:59pm Central Time IMPORTANT NOTE: THIS LAB MUST BE CARRIED OUT ON YOUR OWNCOMPUTER AND OWN NETWORK. PLEASE DO NOT CAPTURE PACKETS ON A NETWORK THAT YOU DO NOT OWN.YOU’VE BEEN WARNED! Lab Overview:Itis importantwe are able to understandthe ideabehind“layersof functionality” providedbydifferentprotocolsthatworktogetheratdifferentlevelsto accomplishdatanetworking. Capturingsome networktrafficusingWiresharkandcarefullyanalyzingthe packetsisagreatway to learnaboutlayeredfunctionalityaswellasthe syntax of some keyprotocolssuchas Transmission Control Protocol (TCP),InternetProtocol (IP),andEthernet aswell assome commonapplicationlayer protocolssuchas Hyper-TextTransferProtocol (HTTP) Lab Purpose: 1) To downloadandinstall Wiresharkonstudents’personal computers 2) To learnthe basicsof howto use Wiresharkto capture networktraffic(fromstudentsown computersandownnetworks) 3) To learnaboutbasic “Capture Filters”available inWireshark 4) Understandthe syntax of Layer 2 Frames. Lab Tasks: There are twotasks forthislab. TASK 1 Downloadandinstall WiresharkonOWNComputer.Visithttp://www.wireshark.org anddownloadthe latestversion.Installationmayvarya bitdependingonyouroperatingsystem.The bestsource of helpis the Wiresharkwiki (https://wiki.wireshark.org) butitcanbe a bitcryptic for beginners.There are plenty of othertutorials/videos online incase youneedhelp. TASK 2: (This task has five questions) In thistaskyou will use Wiresharktocapture basicHTTP trafficand complete the activitiesand questionsasdescribedbelow. I recommendyouwatchsome videosonYouTube oncapturingHTTP trafficusingWireshark.The processisfairlysimplyasdemonstratedinclassbutfeel freetolearnmore. Alsofamiliarize yourselfwiththe basicinterfaceof Wireshark(the menus,options, filtersetc.).Again, plentyof videosare availableonline andthe Wiresharkwikiis bestif youreallywanttolearn. STEPS: 1) OpenWiresharkandidentifythe interface youwill capture trafficfrom(WirelessorEthernetLAN)
  • 2. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 2 of 6 LAB Question1: How many interfacesdoesWiresharkrecognize yourcomputerhas?Whattypesof interfacesare they(WiredEthernetLAN/Wireless/Virtual?)? There are fourinterfaces.Those are:1) Wi-Fi 2) VirtualBox Host-OnlyNetwork3) NetworkConnection and 4) USBPcap1 CONTINUE: 2) Close all browserwindows andotherapplications.Also,clearyourbrowser’s cache/history/temporaryfiles.InInternetExplorerhit(Ctrl + Shift+ Delete). 3) Opena browserwindowandtype in http://www.umsl.edu/~khanshaj/3842/basic_http.html.DO NOT Press Enter yet. 4) Go back to Wiresharkand Start a capture. 5) Go back to the browserwindowandnow hitenterto visitthe page. 6) Once the page loads, Close the BrowserWindow. 7) Returnto Wiresharkand Stop the capture. Save the capture on your computer. Call it “BasicHTTPCapture”. 8) Examine the packetscapturedandscroll to find“greencoloredrows”thatdenote “TCP”based traffic.Notice the Three-stephandshakeandthe HTTPrequestsanddata responsesfromthe server, acknowledgements,andfourstepclosing. 9) FINDTHE PACKETthat belongstothe HTTP Getrequestaskingforthe basic_http.html file.See picture below foranexample.Once located,rightclickonthatpacketand choose “Follow TCP Stream”.Thisshouldremove all otherpacketsallowingyoutofocusonjust thisTCPsession. Anotherwindowshowingthe HTTPrequestsandresponsesshouldalsoopen.Youcanminimize it.
  • 3. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 3 of 6 10) Withthe above GET requestpacket selected(itshouldremainhighlighted),please complete the rest of thislab LAB Question2: Usingthe packetassociatedwiththe GET requestasmentionedabove,please complete the following fieldsinthe Frame Headerbelow(SEENEXTPAGEFOR FIGURE). The ideahere is to learnabout the differentfieldsandwhat they accomplish. NOTE: Althoughthe fieldvaluesare alwaysinbinary(asseeninthe bottommostsectionof your capture) please feelfree toprovide the valuesastheyappearinthe MIDDLE part (i.e.eitherdecimal or hex as the case maybe) of Wiresharkwindow. Type in yourvaluesinthe “LightGray” shadedareasimmediatelybelow eachfield. Onlyfieldswithlight gray areas belowthem are requiredto be completed. [Hint:please visit https://en.wikipedia.org/wiki/Ethernet_frame tolearnmore aboutEthernetandits Frame Structure and to betterunderstandwhateachof the fieldsbelow mean]
  • 4. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 4 of 6 Layer1Ethernetpacket(theactualbitssentatthephysicallayer) Preamble - 7 Octets(NotdisplayedinWireshark) Start of Frame Delimiter(SFD) - 1 Octet(NotdisplayedinWireshark) Layer2EthernetFrame Layer2EthernetFrameHeader Destination MAC Address - 6 Octets 78-24-AF-C3-53-0A Source MAC Address - 6 Octets B4-AE-2B-27-8D-B5 802.1Q tag - 4 Octets (Optional. Present only in 802.1Q tagged frames. Can have more than one of these). Tag Protocol ID (2 Octets) Tag Control Information (2 Octets) PCP (3 bits) DEI (1 bit) VLAN ID (12 bits) Ethertype (present in Ethernet II frames) or length (present in ‘pure’ IEEE 802.3 frames) 2 Octets IPv4 FrameData Payload (Either 42 octets or 46 octets minimum to 1500 octets maximum) Layer 3 Header (IPDatagram/PacketHeader) Layer 4 Header (e.g., TCP Segment Header) Application Data (e.g., HTTP) PADDING (if needed) Frame Trailer Frame CheckSequence (a32-bitCyclicRedundancyChecknumber, 4Octets) (NotdisplayedinWireshark) Inter-packet Gap (12 Octets)
  • 5. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 5 of 6 LAB Question3: Using the https://en.wikipedia.org/wiki/Ethernet_frame linkorany other sources you find,please brieflyexplainwhateach of the followingfieldsmean(i.e.theirpurpose).Please do not simplycopy-paste but try to understand and explain.[Copy-paste answerswill not receive any credit] [Hint:A goodreadingof the above linkandunderstandingthe frame structure willhelpwiththistask. The answersare givenonthe linkabove buttry to actuallyunderstandwhateachfielddoes] 1. Preamble - 7 Octets: Thisconsistsof a 56-bit(seven-byte)patternof alternating1and 0 bits, allowingdevicesonthe networkeasilysynchronizethe receive clocks,whichisfollowedbySFD to mark a newincomingframe. 2. Start of Frame Delimiter(SFD) - 1 Octet: Aneight-bit(one-byte)value thatmarksthe endof the preamble,whichisthe firstfieldof anEthernetpacket,andindicatesthe beginningof the Ethernetframe. Alsoconsideredasenvelopingthe frame. 3. DestinationMAC Address - 6 Octets: Unique identifier(address;IPv4orIPv6) to the location whichyouare sendingpacketsto. Inotherwords,itis physical addressthe informationis gettingreceivedby. 4. Source MAC Address - 6 Octets: The physical address (unique identifier) tothe machine in whichyouare using.Canbe foundbyrunningipconfig/all inthe commandprompt. 5. Ethertype (presentin EthernetII frames) or length(presentin‘pure’ IEEE 802.3 frames) 2 Octets [explainbothpurposes clearly and clarify how is it known what purpose these 2 octets are serving]:EthernetII framingdefinesthe two-octetEtherTypefieldinanEthernetframe, precededbythe destinationandmacsource addresses,thatidentifiesanupperlayerprotocol encapsulatingthe frame data. Soan EtherType value of 0x0800 signalsthat the frame contains an IPv4 diagram. Likewise,tothat,an EhterType value of 0x0806 indicatesanARPframe,0x8100 indicatesanIEEE 802.1Q frame and 0x86DD indicatesanIPv6frame. 6. Frame CheckSequence - 4 Octets: (clearlyidentifywhat part offrame is this presentin,what is the purpose, and how doesit work) The Frame CheckSequence isatthe endof the trailer calledthe Frame Trailer.The purpose istocheck all the receivingfilesforcorruption;itiscalled the cyclic redundancycheck.The Frame CheckSequence checkseachreceivingfile withan algorithm,the resultwillalwaysbe zeroif the filesare error-free. LAB Question4: In general,what is the minimumsize of the Layer 2 EthernetFrame in bytes?What is/are the maximumsize(s)? The minimumsize of Layer2 EthernetFrame is64 bytes.Maximumsizes are 1518 bytesand1522 bytes. LAB Question5: Consideringthe payloadof the layer2 Ethernetframe: 1) What is the maximum payloadsizeof a regularEthernet frame? Maximumpayloadsize is1500 octets 2) Brieflybut fullydescribe the contents of the payload. The payloadconsistsof everythingabove layer2. It encapsulatesthe layer3header,layer4 header,andapplicationdata(layer5). These wouldinclude HTTP,TCPsegmentheader,andIPdatagram/packetheader.
  • 6. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 6 of 6 LAB DELIVERABLES (to be uploadedto MyGateway): 1) Name Worddocument as “FirstName_LastName_Assignment2”.UploadcompletedWord document 2) Uploadthe Wiresharkcapture file GETTING HELP: 1) Call (314-489-9733) / email (shajikhan@umsl.edu)me anytime.Feelfree towalk-intomyoffice if you see me there orsetupappointment 2) If you live oncampus(dorms) thenyoushouldnotuse wiresharkinyourdorms.Instead,email me and I’ll sendyoua capture file youcoulduse foransweringthe questions. 3) Tutors will notbe able tohelpyoucapture packetsin Wireshark(capturingmustbe done at home).Tutorswill be able tohelpwithlabanswersif youbringyourcapturedfile withyou. 4) Of course try to helpeachotherout.If some studentsare alreadyfamiliarwiththe taskslisted above,Iencourage youto helpothers.“Teaching”andhelpingothersisbyfarthe bestway to learn!But please,donotsubmitidentical work.