Based on the given block data below, answer the following questions.Hint: First do Google search for ‘packet dump decode’. Then cut and paste the block of data below into the input data section. Then press decode. You will be able to find the answer from the decoding result.For the payload of the application layer, take the last few bytes in ASCII. It’s not in the packet dump, because it is not a part of header. You can use the ASCII character table to manually convert them. If you understanding the layer 4 destination port #, you understand what it is asking for. There is only one kind of information for the port #.Data block to be decoded: 00 11 bc b5 49 40 b8 8d  12 00 0d fa 08 00 45 0000 37 99 09 00 00 ff 11  ea 9f 0a 07 03 1a 42 aae8 41 c7 19 00 35 00 23  a3 9e 02 90 01 00 00 0100 00 00 00 00 00 05 6d  69 74 72 65 03 6f 72 6700 00 01 00 01           Please answer the following questions after decoded the above data block:Q1: (Layer 4) Protocol is:Q2: Source MAC address: Q3: Destination MAC address:Q4: Source IP address:Q5: Destination IP address: Q6: Source (Layer 4) Port #:Q7: Destination (Layer 4) Port # :Q8: (Application Layer) Payload description:

Question
Asked Nov 6, 2019
259 views

Based on the given block data below, answer the following questions.

Hint: First do Google search for ‘packet dump decode’. Then cut and paste the block of data below into the input data section. Then press decode. You will be able to find the answer from the decoding result.

For the payload of the application layer, take the last few bytes in ASCII. It’s not in the packet dump, because it is not a part of header. You can use the ASCII character table to manually convert them. If you understanding the layer 4 destination port #, you understand what it is asking for. There is only one kind of information for the port #.

Data block to be decoded:

 00 11 bc b5 49 40 b8 8d  12 00 0d fa 08 00 45 00

00 37 99 09 00 00 ff 11  ea 9f 0a 07 03 1a 42 aa

e8 41 c7 19 00 35 00 23  a3 9e 02 90 01 00 00 01

00 00 00 00 00 00 05 6d  69 74 72 65 03 6f 72 67

00 00 01 00 01           

Please answer the following questions after decoded the above data block:

Q1: (Layer 4) Protocol is:

Q2: Source MAC address: 

Q3: Destination MAC address:

Q4: Source IP address:

Q5: Destination IP address: 

Q6: Source (Layer 4) Port #:

Q7: Destination (Layer 4) Port # :

Q8: (Application Layer) Payload description:

check_circle

Expert Answer

star
star
star
star
star
1 Rating
Step 1

Q1. (Layer 4) Protocol is:

  • Based on the above input data block result, the Protocol used in layer 4 (which is responsible for end-to-end or is also known as host-to-host communication as well as data services) is UDP.
help_outline

Image Transcriptionclose

4 protocols in packet: Ethernet Pv4 UDP DNS ALL

fullscreen
Step 2

Q2. Source MAC address:

  • According to the above result shown in the diagram, Source MAC Address is b8:8d:12:00:0d:fa.
  • MAC address is combination of 12-digit Hexadecimal number and r...
help_outline

Image Transcriptionclose

6 7 11 8 10 B8 8D 12 00 FA

fullscreen

Want to see the full answer?

See Solution

Check out a sample Q&A here.

Want to see this answer and more?

Solutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour.*

See Solution
*Response times may vary by subject and question.
Tagged in

Engineering

Computer Science

Related Computer Science Q&A

Find answers to questions asked by student like you
Show more Q&A
add
question_answer

Q: While attempting to connect to the wireless network at your job, you notice that five different wire...

A: Wireless network:It is a network which is used to communicate among computer systems and other netwo...

question_answer

Q: Create a new file (in Dev C++)  In Lab 2, you created a menu for a simple calculator program. In Lab...

A: Program AlgorithmDeclare the required variables and write a welcome message before starting the menu...

question_answer

Q: This is my code for an MIPS assignment where im taking numbers into an array and reversing within th...

A: Note:For the given code and attached image, the following explanation is briefly described about the...

question_answer

Q: For any element in keysList with a value greater than 100, print the corresponding value in itemsLis...

A: The given elements of keysList is {42, 105, 101, 100}And the given elements of itemsList is {10, 20,...

question_answer

Q: Compare and contrast iOS and Android mobile operating systems. Which one is better?

A: Comparison of Android and iOS:

question_answer

Q: How would you modify the dynamic programming algorithm for the coin collecting problem if some cells...

A: Coin collecting problemIn a n-m board, several coins are placed in such a way no more than one coin ...

question_answer

Q: Python 3.7.4 Define a function called signOf that takes a parameter containing an integer value and ...

A: Function definition of "signOf()":

question_answer

Q: Create a project called Mileage. In it, create a class Car with the following properties. A car has ...

A: To Create a project called Mileage. In it, create a class Car with the following properties. A car h...

question_answer

Q: Are the following two clauses the same: constraint X primary key (Y, Z) and constraint X primarykey ...

A: Primary key:Primary key is a key which is used to uniquely identify a row in a table.A Primary key c...