Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Hey, just wondering where I can find the answers to these questions in wireshark? this is what i have done right now d Capturing from
Hey, just wondering where I can find the answers to these questions in wireshark?
this is what i have done right now
d Capturing from Wi-Fi File Edit Viow Go Capture Analyze Statistics Telephcy Wircless Tools Help Wirc Angelica Juyce Layola File Home Insert Design Layout References Mailings Review View Help FOT PDF Tell me Expen + Styles Editing Dictate ProtocolLnhh Into . 000000 20.028539 3.197236 4 a. 198170 5 .198B53 6 , 199633 7 .303578 B 0.343895 9. 911688 0.930453 192.168.1.5 52.84.64.147 Tp LinkT_1c: d8:11 Broadcast Tp-LinkT_1c:d8:11 Broadcast Tp-LinkT 1c:d3:11 Broadcast Ip-Linkl 1c:d8:1 Broadcast 11.16.59.37 192.168.1.5 192.16B.1.5 172.217,4.46 52.84,64.147 192.168.1.5 55 52013 443 [ACK] Segej 65 44352013 [ACK 12 Who has 192.168.1.240? 42 Wha has 192.168.1.12? 1 42 Who has 192.168.1.241 42 Who has 192.168.1. Styles 192.168.1.5 4.16.59.37 172.217.4.46 192.168.1.5 ARP TLSv1.2 1 Application Data TCP UDP UOP G.1 s the IP header encapsulated in all of the fragments? (10 pts) 54 49761 443 ACK (y] Why? a, 866 61392 443 Len-824 b. 63443 61392 Len-21 Is the ICMP header encapsulated in all fragments? (10 pts) Frame 1 : 55 bytes on wire (440 bits), 55 bytes captured (440 bits) an intertace a, vn b. Why? v Interface id: (Device NPFDB99F771-E245-4DA2-8863-43956A6F44EC)) Interface nane: DevicePE [0899F171-E245-40A2-8863-439S6A6FALEC] Fnrapsulation typr: Fthernrt (1) Arrival Tin: Feb 17, 2019 11:56: 52.28423180 Cenral SLandard Tine Time shift for this packet: e.ee0 seconds] Epoch Time: 1550426212.204231000 seconds [Time delta fron previous captured frame: ae00000000 seconds Time delta fron previous displayed frame: 8.9089688 secends] ire since reference or first frame: 0.000eeeeee seconds Frame Number 1 Frame Length: 55 bytes (448 hits) 8.] What is the size in bytes of an Ethernet header? 110 pts) 9. Using the above information, what is the largest total possible size af an Ethernet frame including all headers (even the Etherriet header?10 pts) 10.) What is the largcst amount of actual payload data (not counting any hcader information) that can he included in a fragment generated from an ICMP ping packet? (10 pts) 0010 29 69 42 49 69 &0 06 5afBc9 a8 01 e5 34 54-) Z-....41 0020 4 93 cb 2d ! bb 69 33 21 68 17 19 8f c8 5010 @.. ..13 Ih-...p 30 01 03 79 b9 00 00 03 What to Submit to Blackboard When finished, please upload this document to Wireshark-ICMP-Fragmentation Assignment in W-R 'itve capture n progress:- Packets: 417459 . Declared:417459( 100.0%) Profie: Default Page 2 2 461 words O Typc here to searc 1:06 PM 2/17/2019 d Capturing from Wi-Fi File Edit Viow Go Capture Analyze Statistics Telephcy Wircless Tools Help Wirc Angelica Joyce Loyola File Home Insert Design Layout References Mailings Review View Help FOT PDF Tell me Expen + Styles Editing Dictate ProtocolLnhh Into 0,800820 20.028539 3 .197236 4 a. 198170 5 .198B53 6 . 199633 7 . 303578 B 0.343895 9. 911688 0.930453 192.168.1.5 52.84.64.147 Tp LinkT_1c: d8:11 Broadcast Tp-LinkT_1c:d8:11 Broadcast Tp-LinkT 1c:d3:11 Broadcast Ip-Linkl 1c:d8:1 Broadcast 11.16.59.37 192.168.1.5 192.16B.1.5 172.217,4.46 52.84,64.147 192.168.1.5 55 52013443 [ACK] Sea-1 65 44352013 [ACK 12 Who has 192.168.1.240? 42 Wha has 192.168.1.12? 1 42 Who has 192.168.1.241 42 Who has 192.168.1. I Styles cive Part B Capture the packets for the following ping command using Wireshark ARP TLSv1.2 1 Application Data TCP UDP UOP ping -l 3000 defout gateway 192.168.1.5 4.16.59.37 172.217.4.46 192.168.1.5 54 49761 443 ACK 866 61392 443 Len-824 63443 61392 Len-21 Frane 1: 55 bytes on wire (448 bits), 55 bytes captured (448 bits) a intertace v Interface id: (Device NPFDB99F771-E245-4DA2-8863-43956A6F44EC)) Interface nane: DevicePE [0899F171-E245-40A2-8863-439S6A6FALEC] Fnrapsulation typr: Fthernrt (1) Arrival Tin: Feb 17, 2019 11:56: 52.28423180 Cenral SLandard Tine Time shift for this packet: e.ee0 seconds] Epoch Time: 1550426212.204231000 seconds [Time delta fron previous captured frame: ,e00000000 seconds Time delta fron previous displayed frame: 8.9089688 secends] Time since reference or first frame: . seconds1 Frame Number 1 Frame Length: 55 bytes (448 hits) S Document the values of the following fields for the first ICMP echo request and ICMP echo reply and all associated fragments lif applicable). (10 ptsi 000 73 d2 94 5 d6 44 0010 29 69 42 49 69 &0 06 5afBc9 a8 01 e5 3454-) Z-....41 0020 4 93 cb 2d ! bb 69 33 21 68 17 19 8f c8 5010 @.. ..13 Ih-...p 93 d0 at OB 00 45 00 x a. b. c. d. e. Fragment ID (IP IDI More fragments flap. Frogment Offset ICMP Sequence Number ICMP identifier 30 01 03 79 b9 00 00 03 G.1 s the IP header encapsulated in all of the fragments? (10 pts W-R 'itve capture n progress:- Fackets: 4H2798 Dlayed: 42798 (10D0) Profle: Defeulh Page lot2 461 words 1:08 PM O Typc here to searc 2/17/2019 d Capturing from Wi-Fi File Edit Viow Go Capture Analyze Statistics Telephcy Wircless Tools Help Wirc Angelica Juyce Layola File Home Insert Design Layout References Mailings Review View Help FOT PDF Tell me Expen + Styles Editing Dictate ProtocolLnhh Into . 000000 20.028539 3.197236 4 a. 198170 5 .198B53 6 , 199633 7 .303578 B 0.343895 9. 911688 0.930453 192.168.1.5 52.84.64.147 Tp LinkT_1c: d8:11 Broadcast Tp-LinkT_1c:d8:11 Broadcast Tp-LinkT 1c:d3:11 Broadcast Ip-Linkl 1c:d8:1 Broadcast 11.16.59.37 192.168.1.5 192.16B.1.5 172.217,4.46 52.84,64.147 192.168.1.5 55 52013 443 [ACK] Segej 65 44352013 [ACK 12 Who has 192.168.1.240? 42 Wha has 192.168.1.12? 1 42 Who has 192.168.1.241 42 Who has 192.168.1. Styles 192.168.1.5 4.16.59.37 172.217.4.46 192.168.1.5 ARP TLSv1.2 1 Application Data TCP UDP UOP G.1 s the IP header encapsulated in all of the fragments? (10 pts) 54 49761 443 ACK (y] Why? a, 866 61392 443 Len-824 b. 63443 61392 Len-21 Is the ICMP header encapsulated in all fragments? (10 pts) Frame 1 : 55 bytes on wire (440 bits), 55 bytes captured (440 bits) an intertace a, vn b. Why? v Interface id: (Device NPFDB99F771-E245-4DA2-8863-43956A6F44EC)) Interface nane: DevicePE [0899F171-E245-40A2-8863-439S6A6FALEC] Fnrapsulation typr: Fthernrt (1) Arrival Tin: Feb 17, 2019 11:56: 52.28423180 Cenral SLandard Tine Time shift for this packet: e.ee0 seconds] Epoch Time: 1550426212.204231000 seconds [Time delta fron previous captured frame: ae00000000 seconds Time delta fron previous displayed frame: 8.9089688 secends] ire since reference or first frame: 0.000eeeeee seconds Frame Number 1 Frame Length: 55 bytes (448 hits) 8.] What is the size in bytes of an Ethernet header? 110 pts) 9. Using the above information, what is the largest total possible size af an Ethernet frame including all headers (even the Etherriet header?10 pts) 10.) What is the largcst amount of actual payload data (not counting any hcader information) that can he included in a fragment generated from an ICMP ping packet? (10 pts) 0010 29 69 42 49 69 &0 06 5afBc9 a8 01 e5 34 54-) Z-....41 0020 4 93 cb 2d ! bb 69 33 21 68 17 19 8f c8 5010 @.. ..13 Ih-...p 30 01 03 79 b9 00 00 03 What to Submit to Blackboard When finished, please upload this document to Wireshark-ICMP-Fragmentation Assignment in W-R 'itve capture n progress:- Packets: 417459 . Declared:417459( 100.0%) Profie: Default Page 2 2 461 words O Typc here to searc 1:06 PM 2/17/2019 d Capturing from Wi-Fi File Edit Viow Go Capture Analyze Statistics Telephcy Wircless Tools Help Wirc Angelica Joyce Loyola File Home Insert Design Layout References Mailings Review View Help FOT PDF Tell me Expen + Styles Editing Dictate ProtocolLnhh Into 0,800820 20.028539 3 .197236 4 a. 198170 5 .198B53 6 . 199633 7 . 303578 B 0.343895 9. 911688 0.930453 192.168.1.5 52.84.64.147 Tp LinkT_1c: d8:11 Broadcast Tp-LinkT_1c:d8:11 Broadcast Tp-LinkT 1c:d3:11 Broadcast Ip-Linkl 1c:d8:1 Broadcast 11.16.59.37 192.168.1.5 192.16B.1.5 172.217,4.46 52.84,64.147 192.168.1.5 55 52013443 [ACK] Sea-1 65 44352013 [ACK 12 Who has 192.168.1.240? 42 Wha has 192.168.1.12? 1 42 Who has 192.168.1.241 42 Who has 192.168.1. I Styles cive Part B Capture the packets for the following ping command using Wireshark ARP TLSv1.2 1 Application Data TCP UDP UOP ping -l 3000 defout gateway 192.168.1.5 4.16.59.37 172.217.4.46 192.168.1.5 54 49761 443 ACK 866 61392 443 Len-824 63443 61392 Len-21 Frane 1: 55 bytes on wire (448 bits), 55 bytes captured (448 bits) a intertace v Interface id: (Device NPFDB99F771-E245-4DA2-8863-43956A6F44EC)) Interface nane: DevicePE [0899F171-E245-40A2-8863-439S6A6FALEC] Fnrapsulation typr: Fthernrt (1) Arrival Tin: Feb 17, 2019 11:56: 52.28423180 Cenral SLandard Tine Time shift for this packet: e.ee0 seconds] Epoch Time: 1550426212.204231000 seconds [Time delta fron previous captured frame: ,e00000000 seconds Time delta fron previous displayed frame: 8.9089688 secends] Time since reference or first frame: . seconds1 Frame Number 1 Frame Length: 55 bytes (448 hits) S Document the values of the following fields for the first ICMP echo request and ICMP echo reply and all associated fragments lif applicable). (10 ptsi 000 73 d2 94 5 d6 44 0010 29 69 42 49 69 &0 06 5afBc9 a8 01 e5 3454-) Z-....41 0020 4 93 cb 2d ! bb 69 33 21 68 17 19 8f c8 5010 @.. ..13 Ih-...p 93 d0 at OB 00 45 00 x a. b. c. d. e. Fragment ID (IP IDI More fragments flap. Frogment Offset ICMP Sequence Number ICMP identifier 30 01 03 79 b9 00 00 03 G.1 s the IP header encapsulated in all of the fragments? (10 pts W-R 'itve capture n progress:- Fackets: 4H2798 Dlayed: 42798 (10D0) Profle: Defeulh Page lot2 461 words 1:08 PM O Typc here to searc 2/17/2019Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started