Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Exp02. Internet Protocol (ARP) Purpose 1. Learn the message format of IP datagrams 2. Learn IP checksum calculation method 3. Learn subnet mask and route

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
Exp02. Internet Protocol (ARP) Purpose 1. Learn the message format of IP datagrams 2. Learn IP checksum calculation method 3. Learn subnet mask and route forwarding 4. Understand the meaning of a special IP address 5. Understand the IP fragmentation process 6. Understand how the protocol stack handles the IP protocol 7. Understand the role of the IP routing table and the management of the IP routing table Experiment Steps This experiment uses Network Structure II as experiment 2 does. Before each host starts the protocol editor to verify the network structure, you have to change the IP ad host within your group. How to change your IP: oti Sac Orel Vare d rex Este tradit e Fil! FE REF2,447 cises Tacitet Internet Explorer 30 Microsoft Vi TEEPRO 2015.16 LOX T) 0 0) | ET ) (4) ) ) 0.jp , BIRU A | ||||| T) E)) (4) I) (0) ) ,y) f ) LAN 22 Internet VirtualBox Most-Only twork Nindows | elte | GBE Realtek PCIe GBE... 1 Not the VirtualBox one And not the crossed one Yes, choose the one that's left. (For some hosts, the one's left might be S", So be careful. ) DOX ) 2) vo A) ) (2) CHO , , ) ALAN RR Internet Findows VirtualBox Host-Only Network our body "Network 37 Realtek PCIe GBE F) U) ) ) 0 ) ) W) RRER) | Right click the one you choose and then click (R) 4 LAN 75 Internet Realtek PCIe GBE Family Controller #4 IF :169.254.1379 r sal " sim a ch Fastles -OX 11 11 1 all - 4 | | : " Real ask PCIe GUE Tamily Centart | (C) W indows Realtek II. GIT ) Link NetBIOS Y ink IPI/SPE/ X TOS Compatible Transpor Internet (TCP/IP) Internet Explorer Ca ] TFITF , n es JE ,) 992) | 114 LANK Tnternet Restek PCIe GBE Ymily Controller | IP 100 ,137 | | 15 19 -OX )L) ) ) L4 2 x ) Internet til (TCP/IP) EU , IT ,, IF : 4 Redtek PCIe GBE... 8 Windows : mel | Q IF @) IP ): IF ) : D): 116 | S $ 5 ,0 172 .16 ( DS E- DNS ) DE PT: (A) Change your IP address accordingly, referring to network structure II as shown down below [ CO.1 [ ] 4 LAN RAE Internet Realtek PCIe GBE F ily Controller 14 | IP 169 54 1 Network Structure II B() (172.16.1.1 A172.16.0.1 Notice that for host B, you have to change the IP of both4 &5 D C E F 172.16.1.2 172.16.1.3 172.16.1.4 | | 172.16.0.2 172.16.0.3 Subnet 1 Subnet 2 | Description: The default gateway of host A, C, D is 172.16.1.1; and for host E. Fis 172.16.0.1 Dual NIC host, the physical interface on the left is physical interface 1, on the right is physical interface 2 Exercise 2 Special IP address This exercise takes host A, B, C, D, E, F as a group to perform the experiment. 1. Direct broadcast address (1) Host A edits IP datagram 1, among them: Destination MAC address: FFFFFF-FFFFFF. Source MAC address: MAC address of A. Source IP address: The IP address of A. Destination IP address: 172.16.1.255. Custom field data: Fill in user data larger than 1 byte. Checksum: Calculated and populated after other fields have been filled. (2) Host A then edits IP datagram 2, where: Destination MAC address: The MAC address of Host B (corresponding to the MAC of the 172.16.1.1 interface). Source MAC address: MAC address of A. Source IP address: The IP address of A. Destination IP address: 172.16.0.255. Custom field data: Fill in user data larger than 1 byte. Checksum: Calculated and populated after other fields have been filled. (3) The host B, C, D, E, and F start the protocol analyzer and set the filtering conditions (extract the IP protocol, capture all the IP packets received and sent by 172.16.1.2, and set the address filtering conditions as follows: 172.16.1.2Any). (4) Hosts B, C, D, E, and F start to capture data. (5) Host A sends these two datagrams at the same time. (6) Hosts B, C, D, E, and F stop capturing data. Record the results of the experiment Table 3-4 Experimental results Host number Received IP datagram 1 Received IP datagram 2 Refer to the experiment results, try to briefly describe the role of direct broadcast addresses. Limited broadcast address (1) Host A edits an IP datagram, where: Destination MAC address: FFFFFF-FFFFFF. Source MAC address: MAC address of A. Source IP address: The IP address of A. Destination IP address: 255.255.255.255. Custom field data: Fill in user data larger than 1 byte. Checksum: Calculated and populated after other fields have been filled. 2. (2) Hosts B, C, D, E, and F restart the protocol analyzer and set the filtering conditions (extract the IP protocol, capture all IP packets received and sent by 172.16.1.2, and set the address filtering conditions as follows: 172.16.1.2Any). (3) Hosts B, C, D, E, and F restart data acquisition. (4) Host A sends this datagram. (5) Hosts B, C, D, E, and F stop capturing data. Hosts B, E, and F run the "arp-d" command on the command line to clear the ARP cache. Host E sends the edited ARP packet. Record the results of the experiment Table 3-5 Experimental results Host number Received the IP datagram sent by host A Received the IP datagram sent by host B Refer to the experiment results, try to briefly describe the role of restricted broadcast addresses. 3. Loopback address (1) The host F restarts the protocol analyzer to start capturing data and setting the filtering conditions (extracting the IP protocol). (2) Host E pings 127.0.0.1. (3) Host F stops capturing data. Has Host F received an IP datagram with the destination address of 127.0.0.1 sent by host E? why? Exp02. Internet Protocol (ARP) Purpose 1. Learn the message format of IP datagrams 2. Learn IP checksum calculation method 3. Learn subnet mask and route forwarding 4. Understand the meaning of a special IP address 5. Understand the IP fragmentation process 6. Understand how the protocol stack handles the IP protocol 7. Understand the role of the IP routing table and the management of the IP routing table Experiment Steps This experiment uses Network Structure II as experiment 2 does. Before each host starts the protocol editor to verify the network structure, you have to change the IP ad host within your group. How to change your IP: oti Sac Orel Vare d rex Este tradit e Fil! FE REF2,447 cises Tacitet Internet Explorer 30 Microsoft Vi TEEPRO 2015.16 LOX T) 0 0) | ET ) (4) ) ) 0.jp , BIRU A | ||||| T) E)) (4) I) (0) ) ,y) f ) LAN 22 Internet VirtualBox Most-Only twork Nindows | elte | GBE Realtek PCIe GBE... 1 Not the VirtualBox one And not the crossed one Yes, choose the one that's left. (For some hosts, the one's left might be S", So be careful. ) DOX ) 2) vo A) ) (2) CHO , , ) ALAN RR Internet Findows VirtualBox Host-Only Network our body "Network 37 Realtek PCIe GBE F) U) ) ) 0 ) ) W) RRER) | Right click the one you choose and then click (R) 4 LAN 75 Internet Realtek PCIe GBE Family Controller #4 IF :169.254.1379 r sal " sim a ch Fastles -OX 11 11 1 all - 4 | | : " Real ask PCIe GUE Tamily Centart | (C) W indows Realtek II. GIT ) Link NetBIOS Y ink IPI/SPE/ X TOS Compatible Transpor Internet (TCP/IP) Internet Explorer Ca ] TFITF , n es JE ,) 992) | 114 LANK Tnternet Restek PCIe GBE Ymily Controller | IP 100 ,137 | | 15 19 -OX )L) ) ) L4 2 x ) Internet til (TCP/IP) EU , IT ,, IF : 4 Redtek PCIe GBE... 8 Windows : mel | Q IF @) IP ): IF ) : D): 116 | S $ 5 ,0 172 .16 ( DS E- DNS ) DE PT: (A) Change your IP address accordingly, referring to network structure II as shown down below [ CO.1 [ ] 4 LAN RAE Internet Realtek PCIe GBE F ily Controller 14 | IP 169 54 1 Network Structure II B() (172.16.1.1 A172.16.0.1 Notice that for host B, you have to change the IP of both4 &5 D C E F 172.16.1.2 172.16.1.3 172.16.1.4 | | 172.16.0.2 172.16.0.3 Subnet 1 Subnet 2 | Description: The default gateway of host A, C, D is 172.16.1.1; and for host E. Fis 172.16.0.1 Dual NIC host, the physical interface on the left is physical interface 1, on the right is physical interface 2 Exercise 2 Special IP address This exercise takes host A, B, C, D, E, F as a group to perform the experiment. 1. Direct broadcast address (1) Host A edits IP datagram 1, among them: Destination MAC address: FFFFFF-FFFFFF. Source MAC address: MAC address of A. Source IP address: The IP address of A. Destination IP address: 172.16.1.255. Custom field data: Fill in user data larger than 1 byte. Checksum: Calculated and populated after other fields have been filled. (2) Host A then edits IP datagram 2, where: Destination MAC address: The MAC address of Host B (corresponding to the MAC of the 172.16.1.1 interface). Source MAC address: MAC address of A. Source IP address: The IP address of A. Destination IP address: 172.16.0.255. Custom field data: Fill in user data larger than 1 byte. Checksum: Calculated and populated after other fields have been filled. (3) The host B, C, D, E, and F start the protocol analyzer and set the filtering conditions (extract the IP protocol, capture all the IP packets received and sent by 172.16.1.2, and set the address filtering conditions as follows: 172.16.1.2Any). (4) Hosts B, C, D, E, and F start to capture data. (5) Host A sends these two datagrams at the same time. (6) Hosts B, C, D, E, and F stop capturing data. Record the results of the experiment Table 3-4 Experimental results Host number Received IP datagram 1 Received IP datagram 2 Refer to the experiment results, try to briefly describe the role of direct broadcast addresses. Limited broadcast address (1) Host A edits an IP datagram, where: Destination MAC address: FFFFFF-FFFFFF. Source MAC address: MAC address of A. Source IP address: The IP address of A. Destination IP address: 255.255.255.255. Custom field data: Fill in user data larger than 1 byte. Checksum: Calculated and populated after other fields have been filled. 2. (2) Hosts B, C, D, E, and F restart the protocol analyzer and set the filtering conditions (extract the IP protocol, capture all IP packets received and sent by 172.16.1.2, and set the address filtering conditions as follows: 172.16.1.2Any). (3) Hosts B, C, D, E, and F restart data acquisition. (4) Host A sends this datagram. (5) Hosts B, C, D, E, and F stop capturing data. Hosts B, E, and F run the "arp-d" command on the command line to clear the ARP cache. Host E sends the edited ARP packet. Record the results of the experiment Table 3-5 Experimental results Host number Received the IP datagram sent by host A Received the IP datagram sent by host B Refer to the experiment results, try to briefly describe the role of restricted broadcast addresses. 3. Loopback address (1) The host F restarts the protocol analyzer to start capturing data and setting the filtering conditions (extracting the IP protocol). (2) Host E pings 127.0.0.1. (3) Host F stops capturing data. Has Host F received an IP datagram with the destination address of 127.0.0.1 sent by host E? why

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Horse Betting The Road To Absolute Horse Racing 2

Authors: NAKAGAWA,YUKIO

1st Edition

B0CFZN219G, 979-8856410593

More Books

Students also viewed these Databases questions

Question

i need 4 0 7 .

Answered: 1 week ago