What is the source and destination physical addresses

Assignment Help Computer Networking
Reference no: EM131349725

Assignment

Given:

13:05:20.988706 0e:8d:60:2a:47:21 > 00:04:e2:fc:ee:1f, ethertype IPv4 (0x0800), length 186: (tos 0x10, ttl 64, id 30815, offset 0, flags [DF], proto TCP (6), length 172)
   199.17.59.191.ssh > 64.83.217.120.14743: Flags [P.], cksum 0x1d3b (incorrect -> 0x81b2), seq 2553156370:2553156502, ack 2136047233, win 18760, length 132
       0x0000: 4510 00ac 785f 4000 4006 a540 c711 3bbf E...x_@.@..@..;.
       0x0010: 4053 d978 0016 3997 982e 1312 7f51 7e81 @S.x..9......Q~.
       0x0020: 5018 4948 1d3b 0000 3699 123e 395d 549e P.IH.;..6..>9]T.
       0x0030: 2b05 dd16 bc53 c589 fc37 f84d 8399 d19b +....S...7.M....
       0x0040: 2c3f 2819 fb1c 4776 f8d4 15b8 190d a4f8 ,?(...Gv........
       0x0050: 1fe3 1345 1827 4744 caea 9718 f168 05ea ...E.'GD.....h..
       0x0060: be76 12ef 5f9d 5015 aefb 1361 e0e4 57d2 .v.._.P....a..W.
       0x0070: 384f 7ad4 90a0 f0cf 4e3d 0334 b234 f69b 8Oz.....N=.4.4..
       0x0080: 123a 14ad 23a4 c363 3243 3095 d5fe e8e0 .:..#..c2C0.....
       0x0090: f381 dcef e7b1 0c57 f22e ee42 8f8b 65ac .......W...B..e.
       0x00a0: 883e 0f47 a96f 054b 7078 bf79           .>.G.o.Kpx.y

1. What is the source and destination physical addresses?

2. What is the source IP adress? What version of IP is being used

3. What service is being used (hint what runs on port 22?) ____

4. How many routers could this packet pass through?

5. What is the length of the payload (assuming the layer 2 header is 14 bytes)

6. In looking at the interpretation of the payload (red above), why can't we read the contents? If so which ones?

8. Is any flag set related to fragmentation?

9. What class is the destination IP address?

10. Is there anything above that would indicate that the integrity of this packet may have been compromised?

Given:    

[dguster@mermes ~]$ sudo tcpdump port 53 -e -n -vvv -X -c5

tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes

13:21:09.655454 0e:8d:60:2a:47:21 > c2:2f:1c:0e:e0:40, ethertype IPv4 (0x0800), length 86: (tos 0x0, ttl 48, id 33912, offset 0, flags [DF], proto UDP (17), length 72)
   199.17.59.191.56056 > 199.17.59.4.domain: [bad udp cksum 1afb!] 13733+ PTR? 120.217.83.64.in-addr.arpa. (44)
       0x0000: 4500 0048 8478 4000 3011 b146 c711 3bbf E..H.x@[email protected]..;.
       0x0010: c711 3b04 daf8 0035 0034 052c 35a5 0100 ..;....5.4.,5...
       0x0020: 0001 0000 0000 0000 0331 3230 0332 3137 .........120.217
       0x0030: 0238 3302 3634 0769 6e2d 6164 6472 0461 .83.64.in-addr.a
       0x0040: 7270 6100 000c 0001                     rpa.....

1.What is the destination physical addresses?

2. What is the destination IP adress? What version of IP is being used?

3. What service is being used (hint what runs on port 53?)

4. How many routers could this packet pass through?

5. What is the length of the payload (assuming the layer 2 header is 14 bytes) of the contents?

6. In looking at the interpretation of the payload (red above), why can we read some

7. Are any udP flags set? (careful this is a trick question!)

9. What class is the destination IP address?

10. Is there anything above that would indicate that the integrity of this packet may have been compromised?

If so what?

11. For you advanced types: What does the contents of the payload above indicate is taking place in regard to IP address resolution?

Given:

13:30:22.298873 bc:ae:c5:c2:57:2f > Broadcast, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Request who-has 10.5.2.52 tell 10.0.35.10, length 46
       0x0000: 0001 0800 0604 0001 bcae c5c2 572f 0a00 ............W/..
       0x0010: 230a 0000 0000 0000 0a05 0234 0000 0000 #..........4....
       0x0020: 0000 0000 0000 0000 0000 0000 0000       ..............

1. What kind of packet is this and what is its purpose?

2. What is special about the destination physical address?

3. What does 10.0.35.10 want to know about 10.5.2.52?

4. Why is there no IP header?

5. What is the length of the entire packet?

ANSWER ONLY TWO OF THE FOLLOWING:

We now know that the network address is an OSI layer 3 address. Currently the IPv4 addressing scheme is still the most widely used and the one used on forum where our packet sniffer resides. Our goal is to use our unix system to increase our understanding of how two types of address resolution take place. First, network to physical. We know this is necessary because you can not deliver a packet to a device without knowing the physical address. However, that address does not need to be resolved until the last hop.

In other words someone can send me a packet from Finland and the physical address doesn't need to be determined until it reaches my home LAN (each router along the way forwards it according to its network address). Second, English to numeric IP (or the reverse). Endusers do not like to remember the numeric IP, rather they perfer the English because it is easier to remember.

How many entries in the original arp table?

How many entries are there after node 7 is pinged?

PLEASE COMPLETE ALL OF THE FOLLOWING QUESTIONS:

Question 1. How can TCP/IP be broken in to a 4 layer model?

Question 2. What are some options in regard to providing physical connectivity? What media can they use? What are some common transmission speeds? What inroads has Ethernet made on WANs?

Question 3. Given the below, what are the source and destination physical address? The source and destination net.node.port address? What is the size of the packet?

Question 4. In the above. Which set of addresses are used in the network layer? Which set are used in the internet layer?

What is the difference between a protocol and a service?

Question 6. Classify the following as either a protocol or a service: ftp, telnet, ip, tcp, ggp, udp, rip, chargen. Pick one service and describe it purpose in detail. Given: 132.44.77.35.22 which service is being referenced?

Reference no: EM131349725

Questions Cloud

Standardization of html : Explain what is meant by effective HTML code. Decide if all HTML code should be the same (standardized) or at the discretion of the designer. Explain your decision.
Describe a topic that you found particularly interesting : The first paragraph will describe a topic that you found particularly interesting during that week and what made it interesting, and the second paragraph will describe something that you have observed occurring in the real world that exemplified t..
Calculate the temperature and heat fluxes : Calculate the temperature and heat fluxes in the x and y directions at a location
What are three possible cause and effect relationships : You observe that classmates who get good grades tend to sit toward the front of the classroom, and those who receive poorer grades tend to sit toward the back.- What are three possible cause-and-effect relationships for this non experimental observ..
What is the source and destination physical addresses : What is the source and destination physical addresses? What is the source IP adress? What version of IP is being used What service is being used (hint what runs on port 22?). How many routers could this packet pass through?
Identify the independent variable and the dependent variable : What type of relationship is proposed?- Graph the proposed relationship.- Identify the independent variable and the dependent variable in the statement of the hypothesis.
Write a response about the given post : Observational learning, or modeling, is "learning by an individual that occurs by watching others perform the behavior, with the individual neither performing the behavior nor being directly rewarded or punished for the behavior." (Friedman 236) ..
Identify the independent and dependent variables : Identify the independent and dependent variables in the given descriptions of experiments:- Students watched a cartoon either alone or with others and then rated how funny they found the cartoon to be.
Determine the heat flow and interfacial temperatures : Consider a composite wall, which has one linearly varying cross-sectional area as shown in Figure 4.17. Determine the heat flow and interfacial temperatures. Thickness = 10 cm, kA = 200 W/m °C, kB = 20 W/m °C and kC = 40 W/m °C.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Fiction corporation a large national retail chain of 10000

fiction corporation a large national retail chain of 10000 employees and 500 retail outlets is migrating its one

  Compare to the minimum recommendations for windows

Identify the professor type, processor speed, RAM, and hard disk space - How do these results compare to the minimum recommendations for Windows?

  How the architecture of neural networks plays a vital role

How The architecture of neural networks plays a vital role in classifying handwritten digits?

  What features of windows server 2003 provide remote server

Which Windows Server 2003 tools and third party utilities might IT use to monitor server performance?

  Show how to logon to the new domain

Show how you take a computer and would join it to a domain, Show how to logon to the new domain, show how to map network drives to the server

  Write a 3- to 5-page paper that includes the following

write a 3- to 5-page paper that includes the following based on your chosen virtual organizationbullexplain the

  Which of the following best describes https

Name one acceptable form of 802.11 wireless LAN security/encryption AND name one unacceptable form.

  Describe the characteristics of the worst reports

Describe the characteristics of the worst reports. Consider different aspects of the report that could go wrong such as format, layout and content, and describe what could go wrong with them under different categories

  Design a network and recommend security features

Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client

  Technology related to client-dominant local area network

What technology and cost-of-use issues are related with a client- dominant local area network? Think about what happens as the network grows in size and users are storing and retrieving vast amounts of data.

  Design and provide the ip scheme for the network

Design a Secure Network using either Visio, Paint, Word, etc showing the All locations. Design and provide the IP Scheme for the network. Establish a VPN between the All offices and allow the ability to work from home.

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd