Lab3 Wireshark Ethernet ARP v6.01
Lab3 Wireshark Ethernet ARP v6.01
Lab3 Wireshark Ethernet ARP v6.01
The lab is adapted from the labs provided by J.F Kurose and K.W. Ross.
In this lab, well investigate the Ethernet protocol and the ARP protocol.
RFC 826 (ftp://ftp.rfc-editor.org/in-notes/std/std37.txt) contains the gory details of the
ARP protocol, which is used by an IP device to determine the IP address of a remote
interface whose Ethernet address is known.
First, make sure your browsers cache is empty. To do this under Mozilla Firefox
V3, select Tools->Clear Recent History and check the box for Cache. For Internet
Explorer, select Tools->Internet Options->Delete Files. Start up the Wireshark
packet sniffer
Enter the following URL into your browser
http://gaia.cs.umass.edu/wireshark-labs/HTTP-ethereal-lab-file3.html
Your browser should display the rather lengthy US Bill of Rights.
If you are unable to run Wireshark live on a computer, you can download the zip file
http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the file ethernet--ethereal-trace-1.
The traces in this zip file were collected by Wireshark running on one of the authors computers, while
performing the steps indicated in the Wireshark lab. Once you have downloaded the trace, you can load it
into Wireshark and view the trace using the File pull down menu, choosing Open, and then selecting the
ethernet-ethereal-trace-1 trace file. You can then use this trace file to answer the questions below.
Stop Wireshark packet capture. First, find the packet numbers (the leftmost
column in the upper Wireshark window) of the HTTP GET message that was sent
from your computer to gaia.cs.umass.edu, as well as the beginning of the HTTP
response message sent to your computer by gaia.cs.umass.edu. You should see a
screen that looks something like this (where packet 4 in the screen shot below
contains the HTTP GET message)
Since this lab is about Ethernet and ARP, were not interested in IP or higherlayer protocols. So lets change Wiresharks listing of captured packets window
so that it shows information only about protocols below IP. To have Wireshark do
this, select Analyze->Enabled Protocols. Then uncheck the IP box and select OK.
You should now see an Wireshark window that looks like:
In order to answer the following questions, youll need to look into the packet details and
packet contents windows (the middle and lower display windows in Wireshark).
Select the Ethernet frame containing the HTTP GET message. (Recall that the HTTP
GET message is carried inside of a TCP segment, which is carried inside of an IP
datagram, which is carried inside of an Ethernet frame; reread section 1.5.2 in the text if
you find this encapsulation a bit confusing). Expand the Ethernet II information in the
packet details window. Note that the contents of the Ethernet frame (header as well as
payload) are displayed in the packet contents window.
Answer the following questions, based on the contents of the Ethernet frame containing
the HTTP GET message.
1. What is the 48-bit Ethernet address of your computer?
2. What is the 48-bit destination address in the Ethernet frame? Is this the Ethernet
address of gaia.cs.umass.edu? (Hint: the answer is no). What device has this as its
Ethernet address.
3. Give the hexadecimal value for the two-byte Frame type field. What upper layer
protocol does this correspond to?
4. How many bytes from the very start of the Ethernet frame does the ASCII G in
GET appear in the Ethernet frame?
Next, answer the following questions, based on the contents of the Ethernet frame
containing the first byte of the HTTP response message.
5. What is the value of the Ethernet source address? Is this the address of your
computer, or of gaia.cs.umass.edu (Hint: the answer is no). What device has this
as its Ethernet address?
6. What is the destination address in the Ethernet frame? Is this the Ethernet address
of your computer?
7. Give the hexadecimal value for the two-byte Frame type field. What upper layer
protocol does this correspond to?
8. How many bytes from the very start of the Ethernet frame does the ASCII O in
OK (i.e., the HTTP response code) appear in the Ethernet frame?
The Windows arp command with no arguments will display the contents of the ARP
cache on your computer. Run the arp command.
9. Write down the contents of your computers ARP cache. What is the meaning of
each column value?
In order to observe your computer sending and receiving ARP messages, well need to
clear the ARP cache, since otherwise your computer is likely to find a needed IP-Ethernet
address translation pair in its cache and consequently not need to send out an ARP
message.
MS-DOS. The MS-DOS arp d * command will clear your ARP cache. The d
flag indicates a deletion operation, and the * is the wildcard that says to delete all
table entries.
Linux/Unix/MacOS. The arp d * will clear your ARP cache. In order to run
this command youll need root privileges. If you dont have root privileges and
cant run Wireshark on a Windows machine, you can skip the trace collection part
of this lab and just use the trace discussed in the earlier footnote.
In the example above, the first two frames in the trace contain ARP messages (as does the
6th message). The screen shot above corresponds to the trace referenced in footnote 1.
Answer the following questions:
10. What are the hexadecimal values for the source and destination addresses in the
Ethernet frame containing the ARP request message?
11. Give the hexadecimal value for the two-byte Ethernet Frame type field. What
upper layer protocol does this correspond to?
12. Now find the ARP reply that was sent in response to the ARP request.
a) How many bytes from the very beginning of the Ethernet frame does the
ARP opcode field begin?
b) What is the value of the opcode field within the ARP-payload part of the
Ethernet frame in which an ARP response is made?
c) Where in the ARP message does the answer to the earlier ARP request
appear the IP address of the machine having the Ethernet address whose
corresponding IP address is being queried?
13. What are the hexadecimal values for the source and destination addresses in the
Ethernet frame containing the ARP reply message?
Extra Credit
EX-1. The arp command:
arp -s InetAddr EtherAddr
allows you to manually add an entry to the ARP cache that resolves the IP address
InetAddr to the physical address EtherAddr. What would happen if, when you
manually added an entry, you entered the correct IP address, but the wrong
Ethernet address for that remote interface?
EX-2. What is the default amount of time that an entry remains in your ARP cache
before being removed. You can determine this empirically (by monitoring the
cache contents) or by looking this up in your operation system documentation.
Indicate how/where you determined this value.