241_Lab1_Instructions_Netlab

docx

School

Rochester Institute of Technology *

*We aren’t endorsed by this school

Course

241

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

7

Uploaded by JusticeEagleMaster178

Report
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab Hints and Useful information: Be sure to review the questions in the frame below each activity. This will help you to be sure you have all the data needed before moving onto the next activity (or leaving for the day). Two students will work on one bench which has three PCs, unless otherwise directed. Throughout the lab, P = pod number and M = machine number. A pod consists of two benches for a total of six PCs. On one bench the PCs are numbered 1, 2, and 3. On the other bench the PCs are numbered 4, 5, and 6. In the instructions, when you see a PC indicated with 1/4 or 2/5 or 3/6 use the PCs as numbered on your side of the pod. For example, considering the IP address, 10.140.100.PM, P is the Pod number and M is the machine number with M=1 for PC1, M=2 for PC2, M=3 for PC3, M=4 for PC4, M=5 for PC5 or M=6 for PC6. Lab Objectives: Introduction to the Networking Lab Application of basic IP addressing principles PC-PC connectivity using a Cisco 3750 Switch and Ethernet patch cables Use of Packet Sniffer and filter capability Activity 0 - Setup Before beginning any lab, reboot Windows 10 on all PCs. Click on the Windows icon , then click on the power icon that appears and select the Restart. o You will notice that rebooting the machines resets anything that might have been changed before you came into the lab. This is important in starting with a clean slate as the settings will impact your experiments. 2205 Netlab – SPH/SPM Page 1
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab Activity 1 – Testing Network Adapter Cards and Protocol Stack For Windows 10 on PC1/4 and PC2/5 on your bench: 1. Open an MS-DOS command window on all bench PCs. Search for CMD using the search icon in the lower left-hand corner of your screen and hit enter. 2. Check the current network configuration for all three PCs using the command ipconfig /all in the DOS command window of each device. For this lab, we will be focusing on the Ethernet 2 adapter. Record the MAC and IP addresses for each NIC. 3. Carry out the following six pings at the command prompt in the MS-DOS command window. All the pings should all be successful. Remember P = pod number and M = machine number. ping 10.140.100.PM or ping <ip address> a. PC1/4 pings its own IP b. PC2/5 pings its own IP c. PC1/4 pings loopback, 127.0.0.1 d. PC2/5 pings loopback, 127.0.0.1 e. PC1/4 pings PC2/5 f. PC2/5 pings PC1/4 4. Test a continuous ping. Google how to start one and how to stop one. Examine the results. 2205 Netlab – SPH/SPM Page 2 Pod Name _________ Pod # _________ NIC Type(Description)___________________________________ Device Name Hardware (AKA Physical or MAC) Address Protocol (IPv4) Address PC1/4 PC2/5 PC3/6
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab Activity 1: Questions Use the website https://www.adminsub.net/?sc0=3 to help you answer the following questions. 1. What does the OUI website do? 2. Who is the manufacturer of the Ethernet adapters in the Networking Lab PCs ? 3. What organization manages the OUIs? 4. Identify two other Ethernet network card manufacturers from other Ethernet adapters other than the ones identified in the Networking lab. List each manufacturer with their corresponding 24 bit OUI in hexadecimal notation. 5. Explain how and where you found/identified the MAC address, the manufacturer and their OUI. 6. What are the IP addresses for the PCs on the bench where you are working? 7. What is the subnet mask for each PC? 8. What class of address is this? 9. Are these IP addresses dynamically or statically (manually) assigned? How did you determine this? 10. Explain the difference between dynamic and statically (manually) assigned IP addresses. 11. What is the purpose of pinging loopback address (127.0.0.1)? 12. What is the purpose of pinging your own IP address? 13. Explain the difference between a regular ping and a continuous ping. 14. Explain what is displayed after each ping is executed. You may need to do some Internet research. Be sure to explain each field. For example, what does bytes = 32 mean? What does time<1ms mean? What does TTL mean? Do more than spell out the acronym. Explain what this is reporting to someone who is testing the network using the ping utility. Activity 2 – Manually Configure Network Adapter Cards and Protocol Stack Configure the TCP/IP protocol stack on PC1/4, PC2/5 and PC3/6: 1. Find the network protocol settings. Click Windows Search, then search for network, select check network status . This will show that you are connected via the Ethernet 2 adapter. This is your primary NIC. At the bottom of this screen, select view network properties. You will see a lot of information about your network card here. Take a minute to read through this and think about what you are seeing. 2. Next, select the arrow to go back to the previous status screen. On the left, select Ethernet. Then select change adapter options. You will see one adapter labeled Ethernet 2 and two other virtual (VMware) adapters. Make note of the virtual adapters as this will be important when you are capturing traffic via Wireshark throughout the semester. 3. Select the Ethernet 2 adapter, then Properties -> Internet protocol 4. 2205 Netlab – SPH/SPM Page 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab 4. Manually configure the protocol stack, for the bench three PCs, using 192.168.100.PM as the IP address and 255.255.255.0 as the subnet mask. The dialogue box(es)must be closed for the new addresses to take effect. Do not reboot the workstation. 5. Record the MAC and IP addresses for the NICs by issuing the command ipconfig /all in the DOS command window. Observe which addresses have changed. 6. Retest the connectivity between your PCs using the same pings as earlier, but with the new IP addresses. a. PC1/4 pings its own IP b. PC2/5 pings its own IP c. PC1/4 pings loopback, 127.0.0.1 d. PC2/5 pings loopback, 127.0.0.1 e. PC1/4 pings PC2/5 f. PC2/5 pings PC1/4 Activity 2 Questions 15. Explain why the MAC addresses did not change. 16. What are the IP addresses and subnet mask for the PCs on the bench where you are working? 17. Are these IP addresses dynamically or statically (manually) assigned? How did you determine this? 18. Explain the difference between dynamic and statically (manually) assigned IP addresses. 19. Where did you find this information? (Provide the source used.) 20. How many bits are in an IP address? 21. What part of the addresses are the network portion of the address? 22. What part of the addresses are the host portion of the address? 23. What is a RFC? 24. What is the RFC number for the IPv4 Address Space Registry? Cite the resource for your answer. Activity 3 – Intra-bench connectivity using a switch with Ethernet patch cables In order to build Ethernet networks of more than 2 PCs a switch, which is a layer 2 internetworking device, is used for connectivity. 1. Connect all three PCs on your bench to one of the Cisco 3750 Switches on the rack via the patch panel on the rack. Use a straight-through patch cables (yellow or green) to make that connection. Connect one end of the cable to the PC NIC port on the rack and the other end of the cable to any of the Ethernet ports on the switch. 2. Perform a series of ping tests from each PC to each of the other PCs. They should all be successful. 2205 Netlab – SPH/SPM Page 4 Pod Name _________ Pod # _________ NIC Type(Description)____________________________________ Device Name Hardware (AKA Physical or MAC) Address Protocol (IPv4) Address PC1/4 PC2/5 PC3/6
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab Activity 4 – Examine Network Traffic via Wireshark, a Packet Sniffer We will use a network monitoring tool to examine the flow of traffic on our network. This tool will allow us to look at the traffic as per the encapsulation layers that we discussed in class. In particular, we will be looking at the layer 2 and layer 3 data. Consider the layer 2 MAC addresses and the layer 3 IP address that you already observed when you are examining the Wireshark output. The location of the network monitoring tool within the network topology is important because all traffic does not flow on all segments of the network. This activity will introduce WireShark which is installed on all three bench PCs. Click on the Wireshark icon to open the application. 1. Search for and start Wireshark on all three PCs. 2. Use Wireshark to monitor traffic via a NIC. When Wireshark is launched, an interface must be selected. Select Capture from the text toolbar and then Options. Deselect ‘Promiscuous Mode’ for the two VMWare adapters (we do not want to capture traffic on these interfaces). Notice that Ethernet 2 is still enabled for Enable Promiscuous Mode.’ This allows the NIC to capture all the network traffic and display it. Click the Start button. The capture window will open and you should see network traffic in the window. 3. We will generate pings again and look for them in the monitoring window. On the icon toolbar, the red square will stop a capture, the leftmost icon will start a new capture, and the icon to the right of the stop button will restart a current capture. Take some time to mouse over the other icons and see what they do. Start and stop a capture to test the application and see the responses. 4. While monitoring network traffic via Wireshark, have each PC ping the other two PCs on the bench. All pings should be successful. Stop the captures and look for the echo request and echo reply frames in the Wireshark capture window. The capture window is divided into three sections. The top section contains one summary line for each frame captured. Compare the source and destination addresses of the frames captured on each PC. You should not be able to see all pings from every monitoring station. Be sure to consider why. 5. Let’s take a closer look at details of the echo requests and replies. Select the summary line of one of the frames. The details of that frame will be displayed in the center section in a text format and in hexadecimal in the bottom section. You can expand and reduce each section by selecting and dragging the line between the sections. Reduce the hexadecimal section and 2205 Netlab – SPH/SPM Page 5
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab increase the frame detail section in the middle. Expand each section of the selected frame by using the caret symbols on the left side. The image below shows an expanded frame. You can save the network traffic as a Wireshark specific file, which will allow you to open and analyze the captures later from your own computer (if you download Wireshark). You can take also screenshots, but they will be static. 6. Save the capture file of an Echo Request and Echo Reply exchange between two bench PCs. If screen captures are used, be sure they include: a. the summary lines in the top part of the window b. the expansion of one echo request in the middle window c. the expansion one echo reply in the middle window 7. Expand each section before you do the screen capture so all of the data is visible to you for writing up your lab report later. 2205 Netlab – SPH/SPM Page 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab Activity 4: Questions Examining the encapsulation layers: Select and expand the first Ping; an Echo Request and Echo Reply exchange (2 frames). For each one explain what data is presented at each layer. To identify the message, look at the fields - the Protocol is ICMP, the Length is 74 and the Info is Echo (ping) request or reply (you will be looking at both messages). 25. Expand the frame layer of one Echo Request and one Echo Reply. Explain each of the following (you will need to Google for each of these): a. Encapsulation type b. Arrival time c. Frame number d. Frame length 26. Expand the Ethernet II level of one Echo Request and one Echo Reply. Explain each of the following (Google again): e. Destination f. Source g. Type: 27. Expand the Internet Protocol Version 4 level of one Echo Request and one Echo Reply. Explain: h. Src i. Dst j. Fragment offset 28. Expand the Internet Control Message Protocol level of one Echo Request and one Echo Reply. Explain: k. type 29. You should not be able to see all 6 pings in every PC capture. Consider where the monitoring station is located and how that impacts the network traffic that is visible. Explain why all traffic is not visible to each monitoring station. 2205 Netlab – SPH/SPM Page 7