Lab 2

In this lab we will be introduced to the virtual networks we will use for the next 3 labs. We will also be introduced to the tcpdump and wireshark tools used for analyzing network traffic.

Virtual machines and networks

For this and the following to labs we will be using data collected from virtual machines and networks.

Here is a combined physical and logical diagram for the networks.
Network diagram in JPG format
Network diagram in PDF format

About Wireshark

When you open a .pcap file with Wireshark you will see 3 main display areas. You can adjust the size of each area with the mouse. The top area shows you each packet/frame that is in the pcap file on a separate line. Each line has the sequence number, time stamp, source, destination, protocol and other information. You can click on a packet/frame in the top area and more details will be shown in the middle and bottom display areas. The middle display area will show you a breakdown of the frame/packet at each layer of the protocol stack. The top line is details about the frame. The second line is Layer 2 (MAC/Ethernet) information. The third line is Layer 3 (Network/IP) information. You can click on the + signs to see even more details about each "layer". The bottom display area of wireshark is a hexadecimal dump of the entire packet/frame. As you click on details in the middle display area, the corresponding bytes in the frame are highlighted.

To save details of a packet/frame or set of packets you will use the Edit->Mark menu and the File->Export Packet Dissictions menu option of wireshark. First select the frame you wish to "mark". Then Use edit->mark menu option (or 'ctrl-m' keyboard shortcut) to mark the frame. Repeat for all frames you wish to print details on. Then go to file->Export Packet Dissictions menu and choose "As Plain Text". For packet range choose "Marked Packets". For packet format make sure packet details is checked and "all expanded" is selected.

The command

	man wireshark 
on the JCCL linux workstation or the web page
	http://www.wireshark.org/docs
will give you much more information about the capabilities of the Wireshark program. There are also man pages available for the 'scp' and 'tcpdump' commands.

Wireshark is available on the JCCL linux and windows workstations. You can also download it and run it on your home machines.


Lab 2 procedures

The interfaces of the machines in this lab are


Interface
machine and name 	Ethernet Address	IPv4 Address

monitor eth0		52:54:00:88:8A:01       64.64.64.108/24
monitor eth1		52:54:00:E9:55:CA       10.100.1.254/24
monitor eth2		52:54:00:49:E1:21       10.100.2.254/24

Win10 (ws1) ethernet	52:54:00:A4:43:29       10.100.1.5/24
Linux (ws2) eth0	52:54:00:A5:73:04       10.100.2.5/24

The command ping 10.100.2.5 was run in a command window on the Windows worksation (ws1) This caused 4 ICMP echo request packets to be sent from ws1 to the linux workstaton (ws2). Each of these caused a ICMP echo reply to be sent from ws2 to ws1. A tcpdump processes captured all packets seen on the Monther eth1 interface and that data is the pcap you will download.

You will download this pcap file lab2.pcap

You will open this pcap file in wireshark.

Questions to answer in the Lab report

Question 1 (2 points)

Identify a frame with a destination broadcast address in the lab2.pcap file. What is the source ethernet address of this packet?

Question 2 (2 points)

Identify a frame with a destination broadcast address in the lab2.pcap file. Use table above to identify the interface that transmitted this packet that was captured.

Question 3 (2 points)

In the frame following the frame from question 2, what were the source and destination ethernet addresses.

Question 4 (3 points)

Identify a frame with a destination broadcast address in the lab2.pcap file. What is the ethernet TYPE or LENGTH code? How do you know it is a TYPE or LENGTH? Yes, wireshark will tell you, but how does wireshark know? What is the implication of it it being type or length?

Question 5 (4 points)

Identify a frame with a source IP address of 10.100.2.5 in the lab2.pcap file. What is the source and destination Ethernet address of this frame? Which system and interface (from table above) sent this frame when it was captured? Was this system/interface the same as the system/interface that made the ping reply (Linux eth0)?

Question 6 (3 points)

Identify a frame with a destination ethernet address of 01:80:c2:00:00:00. (The top frame summary might identify this as "Spanning Tree for Bridges". What type of destination address is this? How do you know what type it is?

Question 7 (3 points)

Identify a frame with a destination ethernet address of 01:80:c2:00:00:00. What is the ethernet TYPE or LENGTH code. How do you know it is a TYPE or LENGTH? Yes, wireshark will tell you, but how does wireshark know? What is the implication of it it being type or length?

Question 8 (2 points)

Include in your report the ascii export all expanded output of the frame from Question 1.

Question 9 (2 points)

Include in your report the ascii export all expanded output of the frame from Question 5.

Question 10 (2 points)

Include in your report the ascii export all expanded output of the frame from Question 6.