Lab 3 Wireshark Ethernet_ARP Submitted by Amir Sohel
.docx
keyboard_arrow_up
School
St. Francis College *
*We aren’t endorsed by this school
Course
6001
Subject
Computer Science
Date
Jun 8, 2024
Type
docx
Pages
12
Uploaded by ElderSeaUrchin2763
Lab 3: Wireshark: Ethernet_ARP
Amir Sohel
IT Management, St Francis College
IT-6003: Computer Networks and Security
Professor Jones
April 9, 2024
1
1.
What is the 48-bit Ethernet address of your computer?
Ans: The Ethernet address of my computer is (9c:fc:e8:0e:d5:a3)
2.
What is the 48-bit destination address in the Ethernet frame? Is this the Ethernet address of gaia.cs.umass.edu? (Hint: the answer is no). What device has this as its Ethernet address? [Note: this is an important question, and one that students sometimes get wrong. Re-read pages 468-469 in the text and make sure you understand the answer here.]
Ans: The destination address (1c:57:3e:44:db:7f)is not the Ethernet address of gaia.cs.umass.edu. It is the address of my AlticeLabs router, which is the link used to get 2
off the subnet.
3.
Give the hexadecimal value for the two-byte Frame type field. What upper layer protocol does this correspond to?
Ans: The hex value for the Frame type field is 0x0800. This corresponds to the IP protocol (the frame type filed indicates that the nest layer above IP – the layer to which 3
the payload of ths Ethernet frame will be passed – is IP.
4.
How many bytes from the very start of the Ethernet frame does the ASCII “G” in “GET” appear in the Ethernet frame?
Ans: After 432 bits or 54 bytes the G in get appears.
14 bytes Ethernet frame 20 bytes IP header 20 bytes TCP header
4
5.
What is the value of the Ethernet source address? Is this the address of your computer, or of gaia.cs.umass.edu (Hint: the answer is no). What device has this as its
Ethernet address?
Ans: There is no hexadecimal value for crc in the Ethernet frame. The source address (9c:fc:e8:0e:d5:a3) is neither the Ethernet address of gaia.cs.umass.edu nor the address of
my computer. It is the address of my AlticeLabs router, which is the link used to get onto my subnet.
6.
What is the destination address in the Ethernet frame? Is this the Ethernet address of your computer?
Ans: The destination address (1c:57:3e:44:db:7f) is the address of my computer.
7.
Give the hexadecimal value for the two-byte Frame type field. What upper layer protocol does this correspond to?
Ans: The hex value for the Frame type field is 0x0800. This value corresponds to the IP protocol (see also answer to 3. above).
8.
How many bytes from the very start of the Ethernet frame does the ASCII “O” in “OK” (i.e., the HTTP response code) appear in the Ethernet frame?
Ans: The “O” in the “OK” starts after 104 bits or 13 bytes.
5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
What is "Ethernet" in the context of networking?
arrow_forward
Q4:- Answer only five.
1. The most common architectures for LANs are the
2. The information in an Ethernet network is exchanged in a packet format. The packet
provides grouping of the information for transmission that includes
3. In a bus topology, all LAN data traffic is carried over a common--
4. The maximum Ethernet frame length is--
5. In the command prompt, enter the
information to be displayed.
6. At Bob's mail server, the server side of
server then places the message in Bob's mailbox.
--command to enables the MAC addresses
--receives the message. Bob's mail
arrow_forward
What is Ethernet?
arrow_forward
How would you describe the word "Ethernet" in relation to computer networking?
arrow_forward
(a)
Why Frame Relay was originally designed for use across Integrated Services Digital Network (ISDN) interfaces?
(b)
A connectionless protocol, such as Ethernet, defines the route of a packet through source and destination addresses. However, a connection-oriented protocol, such as ATM, defines the route of a cell through virtual connection identifiers (VPIs and VCIs). Could you explain this statement?
(c)
Transferring files from one system to another seems simple and straightforward, some problems must be dealt with first. For example, two systems may use different file name conventions. Two systems may have different ways to represent text and data. Two systems may have different directory structures. How to solve these issues in case of transferring of files from one system to another.
arrow_forward
Select the CORRECT statements about WLAN Layer 2 and Layer 3 networking modes.
I. The Layer 2 networking is applicable to large-sized networks.
II. The Layer 2 networking is easy to deploy.
III. The Layer 3 networking is applicable to small to medium size network.
IV. The Layer 3 networking is complex to deploy
arrow_forward
If you were to define "Ethernet" in terms of networking, what would you say?
arrow_forward
With the help of appropriate diagrams, discuss any two limitations of Computer Networks based on shared medium.
What is the value of slot time and maximum network diameter in the (i) Half duplex Traditional Ethernet (ii) Half Duplex Fast Ethernet and (iii) Half Duplex Gigabit Ethernet Networks? Explain!
An organization with a Fast Ethernet LAN based on a single hub, segments its network to create a Fast Ethernet LAN based on three Fast Ethernet hubs interconnected via one Fast Ethernet switch. What are the performance advantages of the segmented network over the original network? Explain with the help of an appropriate diagram.
arrow_forward
Discuss the various types of connectors used in Ethernet cables (e.g., RJ45, RJ11) and their specific applications in networking.
arrow_forward
Describe the various types of Ethernet cables (e.g., Cat 5e, Cat 6, Cat 7) and their typical use cases in networking.
arrow_forward
33. IEEE 802 protocol in context as which order? *
O Application layer, TCP, IP, LLC, MAC
O Application layer, TCP, LLC, IP, MAC
O Application layer, DCP, IP, HLC, MAC
O Application layer, TCP, ID, LLC, Phisical
arrow_forward
62.
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.
a.
Token-Ring, because it uses a MAU
b.
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
c.
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
d.
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
arrow_forward
Please verify if my answers are correct. This is networking 1
arrow_forward
In a few phrases, describe the needs for Gigabit Ethernet or Fast Ethernet in terms of topology, speed, and media access control.
arrow_forward
Contrast the data transmission speeds of Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and Ten-Gigabit Ethernet.
arrow_forward
Computer Networks - Internet Architecture & Application Layer
Please answer the question
Someone suggested to use a local file called hosts.txt on each machine instead of DNS. Discuss the advantages (at least 2) and disadvantages (at least 2) of such suggestion. What is ‘saw-tooth’ behavior in TCP, and what is causing it?
arrow_forward
How would you define the word "Ethernet" in terms of networking?
arrow_forward
The data speeds of Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and Ten-Gigabit Ethernet must be compared.
arrow_forward
What is Hop to Hop connection in computer networking?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Related Questions
- What is "Ethernet" in the context of networking?arrow_forwardQ4:- Answer only five. 1. The most common architectures for LANs are the 2. The information in an Ethernet network is exchanged in a packet format. The packet provides grouping of the information for transmission that includes 3. In a bus topology, all LAN data traffic is carried over a common-- 4. The maximum Ethernet frame length is-- 5. In the command prompt, enter the information to be displayed. 6. At Bob's mail server, the server side of server then places the message in Bob's mailbox. --command to enables the MAC addresses --receives the message. Bob's mailarrow_forwardWhat is Ethernet?arrow_forward
- How would you describe the word "Ethernet" in relation to computer networking?arrow_forward(a) Why Frame Relay was originally designed for use across Integrated Services Digital Network (ISDN) interfaces? (b) A connectionless protocol, such as Ethernet, defines the route of a packet through source and destination addresses. However, a connection-oriented protocol, such as ATM, defines the route of a cell through virtual connection identifiers (VPIs and VCIs). Could you explain this statement? (c) Transferring files from one system to another seems simple and straightforward, some problems must be dealt with first. For example, two systems may use different file name conventions. Two systems may have different ways to represent text and data. Two systems may have different directory structures. How to solve these issues in case of transferring of files from one system to another.arrow_forwardSelect the CORRECT statements about WLAN Layer 2 and Layer 3 networking modes. I. The Layer 2 networking is applicable to large-sized networks. II. The Layer 2 networking is easy to deploy. III. The Layer 3 networking is applicable to small to medium size network. IV. The Layer 3 networking is complex to deployarrow_forward
- If you were to define "Ethernet" in terms of networking, what would you say?arrow_forwardWith the help of appropriate diagrams, discuss any two limitations of Computer Networks based on shared medium. What is the value of slot time and maximum network diameter in the (i) Half duplex Traditional Ethernet (ii) Half Duplex Fast Ethernet and (iii) Half Duplex Gigabit Ethernet Networks? Explain! An organization with a Fast Ethernet LAN based on a single hub, segments its network to create a Fast Ethernet LAN based on three Fast Ethernet hubs interconnected via one Fast Ethernet switch. What are the performance advantages of the segmented network over the original network? Explain with the help of an appropriate diagram.arrow_forwardDiscuss the various types of connectors used in Ethernet cables (e.g., RJ45, RJ11) and their specific applications in networking.arrow_forward
- Describe the various types of Ethernet cables (e.g., Cat 5e, Cat 6, Cat 7) and their typical use cases in networking.arrow_forward33. IEEE 802 protocol in context as which order? * O Application layer, TCP, IP, LLC, MAC O Application layer, TCP, LLC, IP, MAC O Application layer, DCP, IP, HLC, MAC O Application layer, TCP, ID, LLC, Phisicalarrow_forward62. Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. a. Token-Ring, because it uses a MAU b. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds c. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies d. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topologyarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning