Lab 5

advertisement
Michael Ernstmeyer
Computer Networks I
2/19/13
Lab 5: ARP
1 Objective
Students will use wireshark and the arp command to explore the function
of the ARP protocol and the arp cache on an Ethernet network station.
2 Observations
2.1 Executed from Windows 7
2.2.1 110 Destination from 0000, ff ff ff ff ff ff
……
Source from 0000, 78 2b cb 90 b7 20
X+ …
Type from 0000, 08 06
..
2.2.2 119 Destination from 0000, 78 2b cb 90 ec 6f
Source from 0000, 78 2b cb 90 ba 2f
Type, 08 00
X+ …/
..
2.2.3 6199 Destination, 00 14 1c 9b 6e 48
Source, 78 2b cb 90 ba 2f
Type, 08 00
X+…O
….nH
X+ …/
..
3 Things to ponder
When using more static ARP entries in a network, one advantage is it will be easier to make
connections with a familiar user. The disadvantage is that the network is more vulnerable to the
given IP address in the event the user has malicious intent, and it consumes more bandwidth.
4 Unanswered Question
How do ARP entries work with banned addresses trying to manipulate their way back in?
Download