Michael Ernstmeyer Computer Networks I 2/19/13 Lab 5: ARP 1 Objective Students will use wireshark and the arp command to explore the function of the ARP protocol and the arp cache on an Ethernet network station. 2 Observations 2.1 Executed from Windows 7 2.2.1 110 Destination from 0000, ff ff ff ff ff ff …… Source from 0000, 78 2b cb 90 b7 20 X+ … Type from 0000, 08 06 .. 2.2.2 119 Destination from 0000, 78 2b cb 90 ec 6f Source from 0000, 78 2b cb 90 ba 2f Type, 08 00 X+ …/ .. 2.2.3 6199 Destination, 00 14 1c 9b 6e 48 Source, 78 2b cb 90 ba 2f Type, 08 00 X+…O ….nH X+ …/ .. 3 Things to ponder When using more static ARP entries in a network, one advantage is it will be easier to make connections with a familiar user. The disadvantage is that the network is more vulnerable to the given IP address in the event the user has malicious intent, and it consumes more bandwidth. 4 Unanswered Question How do ARP entries work with banned addresses trying to manipulate their way back in?