This document describes a Wireshark lab to analyze the IP protocol by capturing packets from an execution of the traceroute program using different packet sizes. Key points:
1. The student is instructed to run traceroute with packet sizes of 56 bytes, 2000 bytes, and 3500 bytes to generate an IP packet trace with and without fragmentation.
2. Questions are provided to analyze fields in IP packet headers like the TTL, identification, and fragmentation flags to understand how the IP protocol functions.
3. Analyzing the traceroute replies reveals the routers between the source and destination while pattern in identification fields show unique datagram identification. Fragmentation is observed when packet size exceeds the MTU.