Documente Academic
Documente Profesional
Documente Cultură
Is there a procedure you must follow to register others and yourself so that
you can form a communications account? Why do you think that a
procedure is needed?
Answer :
In each of these services, you are bringing the person you want to
communicate with directly into your network. You are doing this in order
to have a direct contact with your correspondents and be able to
communicate together directly, without requiring any intermediary person
to relay messages between you and your friends in your network. In essence,
by registering yourself and your correspondents into your contact list, you
are building your own (social) communication network.
In IP networks, this would be a process of associating the peers IP
address in the same network with its Layer 2 data-link layer address. On
Ethernet and WiFi, the two most widely used network technologies, IP uses
a supporting protocol called Address Resolution Protocol, or ARP, to
perform this translation.
How do you initiate contact with the person or people with whom you wish
to communicate?
Answer :
The exact sequence of steps would depend on the service you are
using to communicate with your peer. However, there will always be
common steps: First, you decide what network is your peer reachable in.
Second, you look up the persons contact in your contact list, and then use
this contact to send your peer a message. Depending on the service, the
message will be received only by this person (like in e-mail or instant
messaging services), or it may actually be visible by other people in the
recipients network (like in LinkedIn or Facebook message boards). There
is never doubt, though, who is the intended recipient.
In IP networks, a node sending a message to another node decides
on which directly network is the peer located, and then performs destination
IP or next-hop IP into Layer2 address translation to know how to address
that nodes NIC. The message may then be delivered only to the recipient
NIC (if there are, say, switches on the path between the sender and receiver),
or it may actually be seen by other stations (like in WiFi where stations can
hear each other).
How do you ensure that your conversations are received only by those with
whom you wish to communicate?
Answer :
The primary prerequisite is that the message is unambiguously
addressed to a single intended recipient only. This is exactly the purpose of
using a contact list that associates individual persons with their unique user
identifiers. Otherwise, if we did not know the user identifier of the recipient,
we would either have to send the message to everyone, effectively
broadcasting it, or we would not be able to send the message at all. In IP
networks, this goal is performed by the resolution of the recipient (or next-
hop) IP address into its unique Layer2 address, using ARP or a similar
mechanism. It is then up to the network technology to make sure that the
message arrives to, and only to, the intended recipient.
Some technologies do not allow sending messages in a way that
prevents third parties from seeing the message. For example, in Ethernet
deployments using hubs or WiFi, the transmission is always visible to all
nodes in the network. While only the intended recipient will actually process
the message, others can nonetheless see it. This is similar to message boards
on LinkedIn or Facebook where, although intended for a single recipient
only, many or all other users can see the messages.
CLASS ACTIVITY 5.4.1.1
MAC AND CHOOSE
How has Ethernet stayed the same over the past 25 years or so? What
changes are being made to make it more useful/applicable to todays data
transmission methods ?
Answer :
Ethernet still uses copper cabling and wireless transmission, while
the speed and distance of the transmissions are being developed to meet
current and future data transmission methods..
How have Ethernet physical media and intermediary devices have stayed
the same ?
Answer :
Switches still handle most Ethernet transmissions, whether Layer 2
and/or Layer 3, but the framing is basically the same with minor
modifications to the frames introductory sections indicating what type of
frame is being transmitted, etc.
How do you think the Ethernet will change in the future? What factors could
influence these changes ?
Answer :
Device connections and speed/distance developments will change
how networks will access other networks, but the underlying technology of
Ethernet and the framing of Ethernet transmissions will probably stay the
same. Wireless is an example of this. It is legacy and current/futuristic.
LAB 5.1.1.7
USING WIRESHARK TO EXAMINE ETHERNET FRAMES
Why does the PC send out a broadcast ARP prior to sending the first ping
request?
Answer :
Before the PC can send a ping request to a host, it needs to determine
the destination MAC address before it can build the frame header for that
ping request. The ARP broadcast is used to request the MAC address of the
host with the IP address contained in the ARP.
Step 2.
What are the source and destination IP addresses contained in the data field
of the frame?
Answer :
Source : 192.168.43.132
Destination : 23.50.251.42
Compare these addresses to the addresses you received in Step 6. The only
address that changed is the destination IP address. Why has the destination
IP address changed, while the destination MAC address remained the same?
Answer :
Layer 2 frames never leave the LAN. When a ping is issued to a
remote host, the source will use the Default Gateways MAC address for the
frame destination. The Default Gateway receives the packet, strips the Layer
2 frame information from the packet and then creates a new frame header
with the next hops MAC address. This process continues from router to
router until the packet reaches its destination IP address.
Reflection.
Wireshark does not display the preamble field of a frame header. What does the
preamble contain?
Answer :
The preamble field contains seven octets of alternating 1010 sequences, and
one octet that signals the beginning of the frame, 10101011.
LAB 5.1.2.8
VIEWING NETWORK DEVICE MAC ADDRESSES
What is the serial number portion of the MAC address for this device?
Answer : 2B : E8 : 72
Why does the output show the same MAC address twice?
Answer : The MAC address can be changed via a software command. The
actual address (bia) will still be there which is shown in the parenthesis.
Using Show arp command in the CLI to display MAC Address information.
Using show mac-address-table in the PC-A terminal to view MAC address on the
switch
Did the switch display the MAC address of PC-A? If you answered yes,
what port was it on?
Answer : Yes, Fa0/1 port with MAC address 00 : 0C : 85 : 2B : E8 : 72.
Reflection.
Can you have broadcasts at the Layer 2 level? If so, what would the MAC
address be?
Answer : You can and often do have broadcasts at Layer 2. ARP will use
broadcasts to find MAC address information. The broadcast address is
FF.FF.FF.FF.FF.FF.
Switch 2.
Part 2 : Examine the Switch MAC Address Table
Step 1. Record network device MAC addresses.
S2 Interface F0/1
Are there any MAC addresses recorded in the MAC address table?
Answer : Yes there are.
What MAC addresses are recorded in the table? To which switch ports are
they mapped and to which devices do they belong? Ignore MAC addresses
that are mapped to the CPU.
Answer : 00 : D0 : BA : C0 : 13 : 01, port Fast Ethernet 0/1 in VLAN 1
Wait 10 seconds, type the show mac address-table command, and press
Enter. Are there new addresses in the MAC address table?
Answer : Yes. After 10 secs, the MAC address is show up again.
Step 4. From PC-B, ping the devices on the network and observe the switch MAC
address table.
The switch has added additional MAC address to the table, which :
0003.e454.4233 Port Fa 0/18
00d0.ff14.a06d Port Fa 0/1
00e0.b0e0.4c49 Port Fa 0/1
The PC-B ARP have additional entries for all network device that were sent pings.
PACKET TRACER 5.3.1.3
IDENTIFY MAC AND IP ADDRESSES
2. Did the wires change the handling of the PDU in any way?
Answer : No, it is just a media for PDU through the way.
7. What was the highest OSI layer that the Hub and Access Point used?
Answer : Layer 1
8. Did the Hub or Access Point ever replicate a PDU that was rejected with a red
X?
Answer : Yes
9. When examining the PDU Details tab, which MAC address appeared first, the
source or the destination?
Answer : Destination
12. Did the switches ever replicate a PDU that was rejected with a red X?
Answer : No
13. Every time that the PDU was sent between the 10 network and the 172 network,
there was a point where the MAC addresses suddenly changed. Where did that
occur?
Answer : It occurred at the Router
14. Which device uses MAC addresses starting with 00D0?
Answer : The Router
15. To what devices did the other MAC addresses belong?
Answer : To the sender and receiver
16. Did the sending and receiving IPv4 addresses switch in any of the PDUs?
Answer : No
17. If you follow the reply to a ping, sometimes called a pong, do the sending and
receiving IPv4 addresses switch?
Answer : Yes
20. If this simulation was configured with IPv6 instead of IPv4, what would be
different?
Answer : The IPv4 addresses would be replaced with IPv6 addresses, but
everything else would be the same.
PACKET TRACER 5.3.2.8
EXAMINE THE ARP TABLE
How many copies of the PDU did the switch make during the ARP reply?
Answer : Just one copy, it is 172.16.31.2.
Click the PDU that is now at Switch1. What is the target destination IP
destination address of the ARP request?
Answer : 172.16.31.1
What happens to the first ping in a situation where the router responds to
the ARP request?
Answer : It times out.