What are the ssids of the two access points

Assignment Help Computer Networking
Reference no: EM13973074

Can you please help me with the LAB assignment. Please tutor must provide a lot of snapshots with explanations.

In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text . Since we'll be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications), https://www.sss-mag.com/pdf/802_11tut.pdf, and "Understanding 802.11 Frame Types,"

by Jim Geier, https://www.wi-fiplanet.com/tutorials/article.php/1447501. And, of course, there is the "bible" of 802.11 - the standard itself, "ANSI/IEEE Std 802.11, 1999 Edition (R2003)," https://gaia.cs.umass.edu/wireshark-labs/802.11-1999.pdf. In particular, you may find Table 1 on page 36 of the standard particularly useful when looking through the wireless trace.

In all of the Wireshark labs thus far, we've captured frames on a wired Ethernet connection. Here, since 802.11 is a wireless link-layer protocol, we'll be capturing frames "in the air." Unfortunately, many device drivers for wireless 802.11 NICs don't provide the hooks to capture/copy received 802.11 frames for use in Wireshark (see Figure 1 in Lab 1 for an overview of packet capture). Thus, in this lab, we'll provide a trace of captured 802.11 frames for you to analyze and assume in the questions below that you are using this trace. If you're able to capture 802.11 frames using your version of Wireshark, you're welcome to do so. Additionally, if you're really into frame capture, you can buy a small USB device, AirPcap, https://www.cacetech.com, that captures 802.11 frames and provides integrated support for Wireshark.

1. Getting Started

Download the zip file https://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the file Wireshark_802_11.pcap. This trace was collected using AirPcap and Wireshark running on a computer in the home network of one of the authors, consisting of a Linksys 802.11g combined access point/router, with two wired PCs and one wireless host PC attached to the access point/router. The author is fortunate to have other access points in neighboring houses available as well. In this trace file, we'll see frames captured on channel 6. Since the host and AP that we are interested in are not the only devices using channel 6, we'll see a lot of frames that we're not interested in for this lab, such as beacon frames advertised by a neighbor's AP also operating on channel 6. The wireless host activities taken in the trace file are:

• The host is already associated with the 30 Munroe St AP when the trace begins.

• At t = 24.82, the host makes an HTTP request to https://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address of gaia.cs.umass.edu is 128.119.245.12.

• At t=32.82, the host makes an HTTP request to https://www.cs.umass.edu, whose IP address is 128.119.240.19.

• At t = 49.58, the host disconnects from the 30 Munroe St AP and attempts to connect to the linksys_ses_24086. This is not an open access point, and so the host is eventually unable to connect to this AP.

• At t=63.0 the host gives up trying to associate with the linksys_ses_24086 AP, and associates again with the 30 Munroe St access point.

Once you have downloaded the trace, you can load it into Wireshark and view the trace using the File pull down menu, choosing Open, and then selecting the Wireshark_802_11.pcap trace file. The resulting display should look just like Figure 1.

1110_Wireshark window.png

Figure 1: Wireshark window, after opening the Wireshark_802_11.pcap file

2. Beacon Frames

Recall that beacon frames are used by an 802.11 AP to advertise its existence. To answer some of the questions below, you'll want to look at the details of the "IEEE 802.11" frame and subfields in the middle Wireshark window. Whenever possible, when answering a question below, you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. Annotate the printout to explain your answer. To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. What are the SSIDs of the two access points that are issuing most of the beacon frames in this trace?

2. What are the intervals of time between the transmissions of the beacon frames the linksys_ses_24086 access point? From the 30 Munroe St. access point? (Hint: this interval of time is contained in the beacon frame itself).

3. What (in hexadecimal notation) is the source MAC address on the beacon frame from 30 Munroe St? Recall from Figure 6.13 in the text that the source, destination, and BSS are three addresses used in an 802.11 frame. For a detailed discussion of the 802.11 frame structure, see section 7 in the IEEE 802.11 standards document (cited above).

4. What (in hexadecimal notation) is the destination MAC address on the beacon frame from 30 Munroe St??

5. What (in hexadecimal notation) is the MAC BSS id on the beacon frame from 30 Munroe St?

6. The beacon frames from the 30 Munroe St access point advertise that the access point can support four data rates and eight additional "extended supported rates." What are these rates?

3. Data Transfer

Since the trace starts with the host already associated with the AP, let first look at data transfer over an 802.11 association before looking at AP association/disassociation. Recall that in this trace, at t = 24.82, the host makes an HTTP request to https://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address of gaia.cs.umass.edu is 128.119.245.12. Then, at t=32.82, the host makes an HTTP request to https://www.cs.umass.edu.

7. Find the 802.11 frame containing the SYN TCP segment for this first TCP session (that downloads alice.txt). What are three MAC address fields in the 802.11 frame? Which MAC address in this frame corresponds to the wireless host (give the hexadecimal representation of the MAC address for the host)? To the access point? To the first-hop router? What is the IP address of the wireless host sending this TCP segment? What is the destination IP address? Does this destination IP address correspond to the host, access point, first-hop router, or some other network-attached device? Explain.

8. Find the 802.11 frame containing the SYNACK segment for this TCP session. What are three MAC address fields in the 802.11 frame? Which MAC address in this frame corresponds to the host? To the access point? To the first-hop router? Does the sender MAC address in the frame correspond to the IP address of the device that sent the TCP segment encapsulated within this datagram? (Hint: review Figure 5.19 in the text if you are unsure of how to answer this question, or the corresponding part of the previous question. It's particularly important that you understand this).

4. Association/Disassociation

Recall from Section 6.3.1 in the text that a host must first associate with an access point before sending data. Association in 802.11 is performed using the ASSOCIATE REQUEST frame (sent from host to AP, with a frame type 0 and subtype 0, see Figure 6.13 in the text) and the ASSOCIATE RESPONSE frame (sent by the AP to a host with a frame type 0 and subtype of 1, in response to a received ASSOCIATE REQUEST). For a detailed explanation of each field in the 802.11 frame, see page 34 (Section 7) of the 802.11 spec at https://gaia.cs.umass.edu/wireshark-labs/802.11-1999.pdf.

9. What two actions are taken (i.e., frames are sent) by the host in the trace just after t=49, to end the association with the 30 Munroe St AP that was initially in place when trace collection began? (Hint: one is an IP-layer action, and one is an 802.11-layer action). Looking at the 802.11 specification, is there another frame that you might have expected to see, but don't see here?

10. Examine the trace file and look for AUTHENICATION frames sent from the host to an AP and vice versa. How many AUTHENTICATION messages are sent from the wireless host to the linksys_ses_24086 AP (which has a MAC address of Cisco_Li_f5:ba:bb) starting at around t=49? .

11. Does the host want the authentication to require a key or be open?

12. Do you see a reply AUTHENTICATION from the linksys_ses_24086 AP in the trace?

13. Now let's consider what happens as the host gives up trying to associate with the linksys_ses_24086 AP and now tries to associate with the 30 Munroe St AP. Look for AUTHENICATION frames sent from the host to and AP and vice versa. At what times are there an AUTHENTICATION frame from the host to the 30 Munroe St. AP, and when is there a reply AUTHENTICATION sent from that AP to the host in reply? (Note that you can use the filter expression "wlan.fc.subtype == 11and wlan.fc.type == 0 and wlan.addr == IntelCor_d1:b6:4f" to display only the AUTHENTICATION frames in this trace for this wireless host.)

14. An ASSOCIATE REQUEST from host to AP, and a corresponding ASSOCIATE RESPONSE frame from AP to host are used for the host to associated with an AP. At what time is there an ASSOCIATE REQUEST from host to the 30 Munroe St AP? When is the corresponding ASSOCIATE REPLY sent? (Note that you can use the filter expression "wlan.fc.subtype < 2 and wlan.fc.type == 0 and wlan.addr == IntelCor_d1:b6:4f" to display only the ASSOCIATE REQUEST and ASSOCIATE RESPONSE frames for this trace.)

15. What transmission rates is the host willing to use? The AP? To answer this question, you will need to look into the parameters fields of the 802.11 wireless LAN management frame.

5. Other Frame types

Our trace contains a number of PROBE REQUEST and PROBE RESPONSE frames.

16. What are the sender, receiver and BSS ID MAC addresses in these frames? What is the purpose of these two types of frames? (To answer this last question, you'll need to dig into the online references cited earlier in this lab).

Attachment:- wireshark-traces.zip

Verified Expert

The solution of 6-7 pages in MS Word consist Answered all 16 questions based on 802.11. Worked in wireshark and attached all captured packets scree shots.Solution contains both screen shots and answers.

Reference no: EM13973074

Questions Cloud

Determine the energy of the emitted photon : An electron jumps from the third level to the first level in hydrogen atom. What is the energy of the emitted photon?
Explain synthesise legal and ethical issues : It should be free from spelling and grammatical errors. You must also include Reference List (APA style) of all of the reference sources that you used. Your assignment MUST be...
Give examples of bacteria that we humans need to survive : Give 3 examples of bacteria that we humans need to survive and how they help us. Also, note what type of symbiotic relationship is illustrated with each example.
What distance would car have skidded under same conditions : You slam on the brakes of your car in a panic and skid a distance on a straight and level road. If you had been traveling at half the speed, what distance would the car have skidded under the same conditions?
What are the ssids of the two access points : What are the SSIDs of the two access points that are issuing most of the beacon frames in this trace - What are the intervals of time between the transmissions of the beacon frames.
Developing an elevator speech : Then, rank the following factors in order of importance when developing an elevator speech, and provide a rationale for your response
Search the text data file for the final project : See sample data file below. You are encouraged to add entries and share them with the rest of the class. Implement a program to read and search the text data file. The project will be graded according the criteria for the final project - see below..
Find the magnitude of the magnetic field : Find the magnitude of the magnetic field that results in a force per unit length on the wire of 0.12N/m in the -z -direction. Express your answer to two significant figures and include the appropriate units.
Appropriate journal entry to record income taxes : The unearned portion of the rent collected in 2013 was $50 million and $40 million at the end of 2014. Taxable income is $200 million. No temporary differences existed at the beginning of the year, and the tax rate is 40%. Prepare the appropriate ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Advantages of the three main topologies- ring bus and star

Write a paper detailing the advantages and disadvantages of the three main topologies: Ring, Bus, and Star

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

  Neural network show from sources like , my md''s office, dm

What kind of patterns might the neural network show from sources like , my MD's office, the DMV?

  Explain transit systems for both avl and tsp

Outcome of this process must then be incorporated into ITS regional architecture. Are there plans to give ems vehicles with signal priority/pre-emption?

  Intrusion detection systems

You are a senior network engineer in your company. Your company has a network of 200 terminals and 20 wireless access devices.

  Professional nursing organizations in networking

Explain the value that professional nursing organizations in networking and in the legislative process.

  How to set up the internet at their homes

You have been tasked with organizing the telecommuters in your office. Part of your job consists of ensuring they understand how to set up the Internet at their homes.

  Difference between symmetric key and public key system

What is the most important difference between a symmetric key system and a public key system and In what way does a hash function provide a better message integrity check than a checksum (such as Internet Checksum)?

  Why is there a need for different wireless technologies

Explain the application and features of one of the following: Wi-Fi®, WiMax, ZigBee?, or Bluetooth®

  Differentiate data-voice and video signals

Describe the differences between data, voice, and video signals in 200 to 300 words. Write a explanation comparing differences between PBX and VoIP.

  The company leased a building across the street

The company leased a building across the street

  The digital representation of information often involves a

the digital representation of information often involves a tradeoff between the amount of storage required and the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd