SlideShare a Scribd company logo
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 1 of 6
INFSYS 3842/6836
Assignment 2 (Lab): Understanding layering and Ethernet MAC Frames Using Wireshark
Points Possible: 100
Due Date: Oct 8, 2016 by 11:59pm Central Time
IMPORTANT NOTE: THIS LAB MUST BE CARRIED OUT ON YOUR OWNCOMPUTER AND OWN
NETWORK. PLEASE DO NOT CAPTURE PACKETS ON A NETWORK THAT YOU DO NOT OWN.YOU’VE
BEEN WARNED!
Lab Overview:Itis importantwe are able to understandthe ideabehind“layersof functionality”
providedbydifferentprotocolsthatworktogetheratdifferentlevelsto accomplishdatanetworking.
Capturingsome networktrafficusingWiresharkandcarefullyanalyzingthe packetsisagreatway to
learnaboutlayeredfunctionalityaswellasthe syntax of some keyprotocolssuchas Transmission
Control Protocol (TCP),InternetProtocol (IP),andEthernet aswell assome commonapplicationlayer
protocolssuchas Hyper-TextTransferProtocol (HTTP)
Lab Purpose:
1) To downloadandinstall Wiresharkonstudents’personal computers
2) To learnthe basicsof howto use Wiresharkto capture networktraffic(fromstudentsown
computersandownnetworks)
3) To learnaboutbasic “Capture Filters”available inWireshark
4) Understandthe syntax of Layer 2 Frames.
Lab Tasks: There are twotasks forthislab.
TASK 1
Downloadandinstall WiresharkonOWNComputer.Visithttp://www.wireshark.org anddownloadthe
latestversion.Installationmayvarya bitdependingonyouroperatingsystem.The bestsource of helpis
the Wiresharkwiki (https://wiki.wireshark.org) butitcanbe a bitcryptic for beginners.There are plenty
of othertutorials/videos online incase youneedhelp.
TASK 2: (This task has five questions)
In thistaskyou will use Wiresharktocapture basicHTTP trafficand complete the activitiesand
questionsasdescribedbelow.
I recommendyouwatchsome videosonYouTube oncapturingHTTP trafficusingWireshark.The
processisfairlysimplyasdemonstratedinclassbutfeel freetolearnmore.
Alsofamiliarize yourselfwiththe basicinterfaceof Wireshark(the menus,options, filtersetc.).Again,
plentyof videosare availableonline andthe Wiresharkwikiis bestif youreallywanttolearn.
STEPS:
1) OpenWiresharkandidentifythe interface youwill capture trafficfrom(WirelessorEthernetLAN)
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 2 of 6
LAB Question1: How many interfacesdoesWiresharkrecognize yourcomputerhas?Whattypesof
interfacesare they(WiredEthernetLAN/Wireless/Virtual?)?
There are fourinterfaces.Those are:1) Wi-Fi 2) VirtualBox Host-OnlyNetwork3) NetworkConnection
and 4) USBPcap1
CONTINUE:
2) Close all browserwindows andotherapplications.Also,clearyourbrowser’s
cache/history/temporaryfiles.InInternetExplorerhit(Ctrl + Shift+ Delete).
3) Opena browserwindowandtype in http://www.umsl.edu/~khanshaj/3842/basic_http.html.DO
NOT Press Enter yet.
4) Go back to Wiresharkand Start a capture.
5) Go back to the browserwindowandnow hitenterto visitthe page.
6) Once the page loads, Close the BrowserWindow.
7) Returnto Wiresharkand Stop the capture. Save the capture on your computer. Call it
“BasicHTTPCapture”.
8) Examine the packetscapturedandscroll to find“greencoloredrows”thatdenote “TCP”based
traffic.Notice the Three-stephandshakeandthe HTTPrequestsanddata responsesfromthe server,
acknowledgements,andfourstepclosing.
9) FINDTHE PACKETthat belongstothe HTTP Getrequestaskingforthe basic_http.html file.See
picture below foranexample.Once located,rightclickonthatpacketand choose “Follow TCP
Stream”.Thisshouldremove all otherpacketsallowingyoutofocusonjust thisTCPsession.
Anotherwindowshowingthe HTTPrequestsandresponsesshouldalsoopen.Youcanminimize it.
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 3 of 6
10) Withthe above GET requestpacket selected(itshouldremainhighlighted),please complete the
rest of thislab
LAB Question2:
Usingthe packetassociatedwiththe GET requestasmentionedabove,please complete the following
fieldsinthe Frame Headerbelow(SEENEXTPAGEFOR FIGURE).
The ideahere is to learnabout the differentfieldsandwhat they accomplish.
NOTE: Althoughthe fieldvaluesare alwaysinbinary(asseeninthe bottommostsectionof your
capture) please feelfree toprovide the valuesastheyappearinthe MIDDLE part (i.e.eitherdecimal or
hex as the case maybe) of Wiresharkwindow.
Type in yourvaluesinthe “LightGray” shadedareasimmediatelybelow eachfield. Onlyfieldswithlight
gray areas belowthem are requiredto be completed.
[Hint:please visit https://en.wikipedia.org/wiki/Ethernet_frame tolearnmore aboutEthernetandits
Frame Structure and to betterunderstandwhateachof the fieldsbelow mean]
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 4 of 6
Layer1Ethernetpacket(theactualbitssentatthephysicallayer)
Preamble - 7 Octets(NotdisplayedinWireshark)
Start of Frame Delimiter(SFD) - 1 Octet(NotdisplayedinWireshark)
Layer2EthernetFrame
Layer2EthernetFrameHeader Destination MAC Address - 6 Octets
78-24-AF-C3-53-0A
Source MAC Address - 6 Octets
B4-AE-2B-27-8D-B5
802.1Q tag - 4 Octets (Optional. Present only in 802.1Q tagged frames. Can have more than one of these).
Tag Protocol ID (2 Octets)
Tag Control Information (2 Octets)
PCP
(3
bits)
DEI
(1
bit)
VLAN ID (12 bits)
Ethertype (present in Ethernet II frames) or length (present in ‘pure’ IEEE 802.3 frames) 2 Octets
IPv4
FrameData
Payload (Either 42 octets or 46 octets minimum to 1500 octets maximum)
Layer 3 Header
(IPDatagram/PacketHeader)
Layer 4 Header
(e.g., TCP Segment Header)
Application Data
(e.g., HTTP)
PADDING (if needed)
Frame
Trailer
Frame CheckSequence (a32-bitCyclicRedundancyChecknumber, 4Octets) (NotdisplayedinWireshark)
Inter-packet Gap (12 Octets)
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 5 of 6
LAB Question3: Using the https://en.wikipedia.org/wiki/Ethernet_frame linkorany other sources
you find,please brieflyexplainwhateach of the followingfieldsmean(i.e.theirpurpose).Please do
not simplycopy-paste but try to understand and explain.[Copy-paste answerswill not receive any
credit]
[Hint:A goodreadingof the above linkandunderstandingthe frame structure willhelpwiththistask.
The answersare givenonthe linkabove buttry to actuallyunderstandwhateachfielddoes]
1. Preamble - 7 Octets: Thisconsistsof a 56-bit(seven-byte)patternof alternating1and 0 bits,
allowingdevicesonthe networkeasilysynchronizethe receive clocks,whichisfollowedbySFD
to mark a newincomingframe.
2. Start of Frame Delimiter(SFD) - 1 Octet: Aneight-bit(one-byte)value thatmarksthe endof the
preamble,whichisthe firstfieldof anEthernetpacket,andindicatesthe beginningof the
Ethernetframe. Alsoconsideredasenvelopingthe frame.
3. DestinationMAC Address - 6 Octets: Unique identifier(address;IPv4orIPv6) to the location
whichyouare sendingpacketsto. Inotherwords,itis physical addressthe informationis
gettingreceivedby.
4. Source MAC Address - 6 Octets: The physical address (unique identifier) tothe machine in
whichyouare using.Canbe foundbyrunningipconfig/all inthe commandprompt.
5. Ethertype (presentin EthernetII frames) or length(presentin‘pure’ IEEE 802.3 frames) 2
Octets [explainbothpurposes clearly and clarify how is it known what purpose these 2 octets
are serving]:EthernetII framingdefinesthe two-octetEtherTypefieldinanEthernetframe,
precededbythe destinationandmacsource addresses,thatidentifiesanupperlayerprotocol
encapsulatingthe frame data. Soan EtherType value of 0x0800 signalsthat the frame contains
an IPv4 diagram. Likewise,tothat,an EhterType value of 0x0806 indicatesanARPframe,0x8100
indicatesanIEEE 802.1Q frame and 0x86DD indicatesanIPv6frame.
6. Frame CheckSequence - 4 Octets: (clearlyidentifywhat part offrame is this presentin,what
is the purpose, and how doesit work) The Frame CheckSequence isatthe endof the trailer
calledthe Frame Trailer.The purpose istocheck all the receivingfilesforcorruption;itiscalled
the cyclic redundancycheck.The Frame CheckSequence checkseachreceivingfile withan
algorithm,the resultwillalwaysbe zeroif the filesare error-free.
LAB Question4: In general,what is the minimumsize of the Layer 2 EthernetFrame in bytes?What
is/are the maximumsize(s)? The minimumsize of Layer2 EthernetFrame is64 bytes.Maximumsizes
are 1518 bytesand1522 bytes.
LAB Question5: Consideringthe payloadof the layer2 Ethernetframe:
1) What is the maximum payloadsizeof a regularEthernet frame? Maximumpayloadsize is1500
octets
2) Brieflybut fullydescribe the contents of the payload. The payloadconsistsof everythingabove
layer2. It encapsulatesthe layer3header,layer4 header,andapplicationdata(layer5). These
wouldinclude HTTP,TCPsegmentheader,andIPdatagram/packetheader.
Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733)
Page 6 of 6
LAB DELIVERABLES (to be uploadedto MyGateway):
1) Name Worddocument as “FirstName_LastName_Assignment2”.UploadcompletedWord
document
2) Uploadthe Wiresharkcapture file
GETTING HELP:
1) Call (314-489-9733) / email (shajikhan@umsl.edu)me anytime.Feelfree towalk-intomyoffice
if you see me there orsetupappointment
2) If you live oncampus(dorms) thenyoushouldnotuse wiresharkinyourdorms.Instead,email
me and I’ll sendyoua capture file youcoulduse foransweringthe questions.
3) Tutors will notbe able tohelpyoucapture packetsin Wireshark(capturingmustbe done at
home).Tutorswill be able tohelpwithlabanswersif youbringyourcapturedfile withyou.
4) Of course try to helpeachotherout.If some studentsare alreadyfamiliarwiththe taskslisted
above,Iencourage youto helpothers.“Teaching”andhelpingothersisbyfarthe bestway to
learn!But please,donotsubmitidentical work.

More Related Content

What's hot

DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2D
rudndccn
 
DCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLANDCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
rudndccn
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
VLSICS Design
 
Ecet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comEcet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.com
Stephenson39
 
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystemDCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
rudndccn
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Engr. Md. Jamal Uddin Rayhan
 
Final training course
Final training courseFinal training course
Final training course
Noor Dhiya
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
Richard Ashworth
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
Afnic
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
RSIS International
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Engr. Md. Jamal Uddin Rayhan
 
Attackboard slides dac12-0605
Attackboard slides dac12-0605Attackboard slides dac12-0605
Attackboard slides dac12-0605
Yoshi Shih-Chieh Huang
 
Training course lect1
Training course lect1Training course lect1
Training course lect1
Noor Dhiya
 
Datagrams
DatagramsDatagrams
Datagrams
rajshreemuthiah
 
Scimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujoScimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujo
Robson Araujo
 
Lexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam searchLexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam search
Satoru Katsumata
 
Java - Processing input and output
Java - Processing input and outputJava - Processing input and output
Java - Processing input and output
Riccardo Cardin
 

What's hot (17)

DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2D
 
DCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLANDCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
DCCN 2016 - Tutorial 1 - Communication with LAN/WLAN
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
 
Ecet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comEcet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.com
 
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystemDCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
DCCN 2016 - Tutorial 2 - 4G for SmartGrid ecosystem
 
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
Combined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUSTCombined 2 Bank Compiled Post: SO(IT)  Date: 25.09.2021  Taker: AUST
Combined 2 Bank Compiled Post: SO(IT) Date: 25.09.2021 Taker: AUST
 
Final training course
Final training courseFinal training course
Final training course
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
 
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
Combined Bank Question Solution(Updated) 25/10/2021 Assistant Hardware Engine...
 
Attackboard slides dac12-0605
Attackboard slides dac12-0605Attackboard slides dac12-0605
Attackboard slides dac12-0605
 
Training course lect1
Training course lect1Training course lect1
Training course lect1
 
Datagrams
DatagramsDatagrams
Datagrams
 
Scimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujoScimakelatex.83323.robson+medeiros+de+araujo
Scimakelatex.83323.robson+medeiros+de+araujo
 
Lexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam searchLexically constrained decoding for sequence generation using grid beam search
Lexically constrained decoding for sequence generation using grid beam search
 
Java - Processing input and output
Java - Processing input and outputJava - Processing input and output
Java - Processing input and output
 

Similar to Understanding Layering and Ethernet

Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docxWireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
ambersalomon88660
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
mayank's it solution pvt.ltd
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++
wissem hammouda
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
Sadia Shachi
 
Networking answers
Networking answersNetworking answers
Networking answers
Devendra Pani
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
satriyo aris
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
satriyo aris
 
Programming Assignment Help
Programming Assignment HelpProgramming Assignment Help
Programming Assignment Help
Programming Homework Help
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)
Old Dominion University
 
Wireshark
WiresharkWireshark
Wireshark
Deepika Ojha
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
Chaman Poorani
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.com
HarrisGeorgz
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.com
sholingarjosh104
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
TanveerAthar1
 
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
HS1011 Data Communication and Networks  13 August 2015 HS101.docxHS1011 Data Communication and Networks  13 August 2015 HS101.docx
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
adampcarr67227
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.com
WilliamsTaylorzo
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecture
lawuah
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.com
Davis117a
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
ambersalomon88660
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
Joshua Kathiravan
 

Similar to Understanding Layering and Ethernet (20)

Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docxWireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
 
Networking answers
Networking answersNetworking answers
Networking answers
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Programming Assignment Help
Programming Assignment HelpProgramming Assignment Help
Programming Assignment Help
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.com
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.com
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
HS1011 Data Communication and Networks  13 August 2015 HS101.docxHS1011 Data Communication and Networks  13 August 2015 HS101.docx
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.com
 
Multi-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router ArchitectureMulti-Stage Clos Networks in Router Architecture
Multi-Stage Clos Networks in Router Architecture
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.com
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 

More from Nicole Gaehle, MSIST

Lab: Basic Reconnaissance
Lab: Basic ReconnaissanceLab: Basic Reconnaissance
Lab: Basic Reconnaissance
Nicole Gaehle, MSIST
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
Nicole Gaehle, MSIST
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS Standard
Nicole Gaehle, MSIST
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services Paper
Nicole Gaehle, MSIST
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak Entity
Nicole Gaehle, MSIST
 
Database: PC and Employee
Database: PC and EmployeeDatabase: PC and Employee
Database: PC and Employee
Nicole Gaehle, MSIST
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
Nicole Gaehle, MSIST
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
Nicole Gaehle, MSIST
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
Nicole Gaehle, MSIST
 
Virtualization and Linux
Virtualization and LinuxVirtualization and Linux
Virtualization and Linux
Nicole Gaehle, MSIST
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Nicole Gaehle, MSIST
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Nicole Gaehle, MSIST
 
Cryptography
CryptographyCryptography
Cryptography
Nicole Gaehle, MSIST
 
Networking Task
Networking Task Networking Task
Networking Task
Nicole Gaehle, MSIST
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
Nicole Gaehle, MSIST
 
Reverse Engineering Project
Reverse Engineering ProjectReverse Engineering Project
Reverse Engineering Project
Nicole Gaehle, MSIST
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentation
Nicole Gaehle, MSIST
 

More from Nicole Gaehle, MSIST (17)

Lab: Basic Reconnaissance
Lab: Basic ReconnaissanceLab: Basic Reconnaissance
Lab: Basic Reconnaissance
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS Standard
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services Paper
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak Entity
 
Database: PC and Employee
Database: PC and EmployeeDatabase: PC and Employee
Database: PC and Employee
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Virtualization and Linux
Virtualization and LinuxVirtualization and Linux
Virtualization and Linux
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
 
Cryptography
CryptographyCryptography
Cryptography
 
Networking Task
Networking Task Networking Task
Networking Task
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
 
Reverse Engineering Project
Reverse Engineering ProjectReverse Engineering Project
Reverse Engineering Project
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentation
 

Recently uploaded

A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Understanding Layering and Ethernet

  • 1. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 1 of 6 INFSYS 3842/6836 Assignment 2 (Lab): Understanding layering and Ethernet MAC Frames Using Wireshark Points Possible: 100 Due Date: Oct 8, 2016 by 11:59pm Central Time IMPORTANT NOTE: THIS LAB MUST BE CARRIED OUT ON YOUR OWNCOMPUTER AND OWN NETWORK. PLEASE DO NOT CAPTURE PACKETS ON A NETWORK THAT YOU DO NOT OWN.YOU’VE BEEN WARNED! Lab Overview:Itis importantwe are able to understandthe ideabehind“layersof functionality” providedbydifferentprotocolsthatworktogetheratdifferentlevelsto accomplishdatanetworking. Capturingsome networktrafficusingWiresharkandcarefullyanalyzingthe packetsisagreatway to learnaboutlayeredfunctionalityaswellasthe syntax of some keyprotocolssuchas Transmission Control Protocol (TCP),InternetProtocol (IP),andEthernet aswell assome commonapplicationlayer protocolssuchas Hyper-TextTransferProtocol (HTTP) Lab Purpose: 1) To downloadandinstall Wiresharkonstudents’personal computers 2) To learnthe basicsof howto use Wiresharkto capture networktraffic(fromstudentsown computersandownnetworks) 3) To learnaboutbasic “Capture Filters”available inWireshark 4) Understandthe syntax of Layer 2 Frames. Lab Tasks: There are twotasks forthislab. TASK 1 Downloadandinstall WiresharkonOWNComputer.Visithttp://www.wireshark.org anddownloadthe latestversion.Installationmayvarya bitdependingonyouroperatingsystem.The bestsource of helpis the Wiresharkwiki (https://wiki.wireshark.org) butitcanbe a bitcryptic for beginners.There are plenty of othertutorials/videos online incase youneedhelp. TASK 2: (This task has five questions) In thistaskyou will use Wiresharktocapture basicHTTP trafficand complete the activitiesand questionsasdescribedbelow. I recommendyouwatchsome videosonYouTube oncapturingHTTP trafficusingWireshark.The processisfairlysimplyasdemonstratedinclassbutfeel freetolearnmore. Alsofamiliarize yourselfwiththe basicinterfaceof Wireshark(the menus,options, filtersetc.).Again, plentyof videosare availableonline andthe Wiresharkwikiis bestif youreallywanttolearn. STEPS: 1) OpenWiresharkandidentifythe interface youwill capture trafficfrom(WirelessorEthernetLAN)
  • 2. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 2 of 6 LAB Question1: How many interfacesdoesWiresharkrecognize yourcomputerhas?Whattypesof interfacesare they(WiredEthernetLAN/Wireless/Virtual?)? There are fourinterfaces.Those are:1) Wi-Fi 2) VirtualBox Host-OnlyNetwork3) NetworkConnection and 4) USBPcap1 CONTINUE: 2) Close all browserwindows andotherapplications.Also,clearyourbrowser’s cache/history/temporaryfiles.InInternetExplorerhit(Ctrl + Shift+ Delete). 3) Opena browserwindowandtype in http://www.umsl.edu/~khanshaj/3842/basic_http.html.DO NOT Press Enter yet. 4) Go back to Wiresharkand Start a capture. 5) Go back to the browserwindowandnow hitenterto visitthe page. 6) Once the page loads, Close the BrowserWindow. 7) Returnto Wiresharkand Stop the capture. Save the capture on your computer. Call it “BasicHTTPCapture”. 8) Examine the packetscapturedandscroll to find“greencoloredrows”thatdenote “TCP”based traffic.Notice the Three-stephandshakeandthe HTTPrequestsanddata responsesfromthe server, acknowledgements,andfourstepclosing. 9) FINDTHE PACKETthat belongstothe HTTP Getrequestaskingforthe basic_http.html file.See picture below foranexample.Once located,rightclickonthatpacketand choose “Follow TCP Stream”.Thisshouldremove all otherpacketsallowingyoutofocusonjust thisTCPsession. Anotherwindowshowingthe HTTPrequestsandresponsesshouldalsoopen.Youcanminimize it.
  • 3. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 3 of 6 10) Withthe above GET requestpacket selected(itshouldremainhighlighted),please complete the rest of thislab LAB Question2: Usingthe packetassociatedwiththe GET requestasmentionedabove,please complete the following fieldsinthe Frame Headerbelow(SEENEXTPAGEFOR FIGURE). The ideahere is to learnabout the differentfieldsandwhat they accomplish. NOTE: Althoughthe fieldvaluesare alwaysinbinary(asseeninthe bottommostsectionof your capture) please feelfree toprovide the valuesastheyappearinthe MIDDLE part (i.e.eitherdecimal or hex as the case maybe) of Wiresharkwindow. Type in yourvaluesinthe “LightGray” shadedareasimmediatelybelow eachfield. Onlyfieldswithlight gray areas belowthem are requiredto be completed. [Hint:please visit https://en.wikipedia.org/wiki/Ethernet_frame tolearnmore aboutEthernetandits Frame Structure and to betterunderstandwhateachof the fieldsbelow mean]
  • 4. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 4 of 6 Layer1Ethernetpacket(theactualbitssentatthephysicallayer) Preamble - 7 Octets(NotdisplayedinWireshark) Start of Frame Delimiter(SFD) - 1 Octet(NotdisplayedinWireshark) Layer2EthernetFrame Layer2EthernetFrameHeader Destination MAC Address - 6 Octets 78-24-AF-C3-53-0A Source MAC Address - 6 Octets B4-AE-2B-27-8D-B5 802.1Q tag - 4 Octets (Optional. Present only in 802.1Q tagged frames. Can have more than one of these). Tag Protocol ID (2 Octets) Tag Control Information (2 Octets) PCP (3 bits) DEI (1 bit) VLAN ID (12 bits) Ethertype (present in Ethernet II frames) or length (present in ‘pure’ IEEE 802.3 frames) 2 Octets IPv4 FrameData Payload (Either 42 octets or 46 octets minimum to 1500 octets maximum) Layer 3 Header (IPDatagram/PacketHeader) Layer 4 Header (e.g., TCP Segment Header) Application Data (e.g., HTTP) PADDING (if needed) Frame Trailer Frame CheckSequence (a32-bitCyclicRedundancyChecknumber, 4Octets) (NotdisplayedinWireshark) Inter-packet Gap (12 Octets)
  • 5. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 5 of 6 LAB Question3: Using the https://en.wikipedia.org/wiki/Ethernet_frame linkorany other sources you find,please brieflyexplainwhateach of the followingfieldsmean(i.e.theirpurpose).Please do not simplycopy-paste but try to understand and explain.[Copy-paste answerswill not receive any credit] [Hint:A goodreadingof the above linkandunderstandingthe frame structure willhelpwiththistask. The answersare givenonthe linkabove buttry to actuallyunderstandwhateachfielddoes] 1. Preamble - 7 Octets: Thisconsistsof a 56-bit(seven-byte)patternof alternating1and 0 bits, allowingdevicesonthe networkeasilysynchronizethe receive clocks,whichisfollowedbySFD to mark a newincomingframe. 2. Start of Frame Delimiter(SFD) - 1 Octet: Aneight-bit(one-byte)value thatmarksthe endof the preamble,whichisthe firstfieldof anEthernetpacket,andindicatesthe beginningof the Ethernetframe. Alsoconsideredasenvelopingthe frame. 3. DestinationMAC Address - 6 Octets: Unique identifier(address;IPv4orIPv6) to the location whichyouare sendingpacketsto. Inotherwords,itis physical addressthe informationis gettingreceivedby. 4. Source MAC Address - 6 Octets: The physical address (unique identifier) tothe machine in whichyouare using.Canbe foundbyrunningipconfig/all inthe commandprompt. 5. Ethertype (presentin EthernetII frames) or length(presentin‘pure’ IEEE 802.3 frames) 2 Octets [explainbothpurposes clearly and clarify how is it known what purpose these 2 octets are serving]:EthernetII framingdefinesthe two-octetEtherTypefieldinanEthernetframe, precededbythe destinationandmacsource addresses,thatidentifiesanupperlayerprotocol encapsulatingthe frame data. Soan EtherType value of 0x0800 signalsthat the frame contains an IPv4 diagram. Likewise,tothat,an EhterType value of 0x0806 indicatesanARPframe,0x8100 indicatesanIEEE 802.1Q frame and 0x86DD indicatesanIPv6frame. 6. Frame CheckSequence - 4 Octets: (clearlyidentifywhat part offrame is this presentin,what is the purpose, and how doesit work) The Frame CheckSequence isatthe endof the trailer calledthe Frame Trailer.The purpose istocheck all the receivingfilesforcorruption;itiscalled the cyclic redundancycheck.The Frame CheckSequence checkseachreceivingfile withan algorithm,the resultwillalwaysbe zeroif the filesare error-free. LAB Question4: In general,what is the minimumsize of the Layer 2 EthernetFrame in bytes?What is/are the maximumsize(s)? The minimumsize of Layer2 EthernetFrame is64 bytes.Maximumsizes are 1518 bytesand1522 bytes. LAB Question5: Consideringthe payloadof the layer2 Ethernetframe: 1) What is the maximum payloadsizeof a regularEthernet frame? Maximumpayloadsize is1500 octets 2) Brieflybut fullydescribe the contents of the payload. The payloadconsistsof everythingabove layer2. It encapsulatesthe layer3header,layer4 header,andapplicationdata(layer5). These wouldinclude HTTP,TCPsegmentheader,andIPdatagram/packetheader.
  • 6. Instructor:Dr. Shaji Khan(shajikhan@umsl.eduor314-489-9733) Page 6 of 6 LAB DELIVERABLES (to be uploadedto MyGateway): 1) Name Worddocument as “FirstName_LastName_Assignment2”.UploadcompletedWord document 2) Uploadthe Wiresharkcapture file GETTING HELP: 1) Call (314-489-9733) / email (shajikhan@umsl.edu)me anytime.Feelfree towalk-intomyoffice if you see me there orsetupappointment 2) If you live oncampus(dorms) thenyoushouldnotuse wiresharkinyourdorms.Instead,email me and I’ll sendyoua capture file youcoulduse foransweringthe questions. 3) Tutors will notbe able tohelpyoucapture packetsin Wireshark(capturingmustbe done at home).Tutorswill be able tohelpwithlabanswersif youbringyourcapturedfile withyou. 4) Of course try to helpeachotherout.If some studentsare alreadyfamiliarwiththe taskslisted above,Iencourage youto helpothers.“Teaching”andhelpingothersisbyfarthe bestway to learn!But please,donotsubmitidentical work.