Computer Communication and Networks Lab Experiment 6 MAC Address and Ethernet Packet

Similar documents
LANs and ARP. Networking. Sirindhorn International Institute of Technology Thammasat University. Networking. LANs and ARP.

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Lecture (05) Network Access layer fundamentals II LAN, & WAN

Introduction to LAN Protocols

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

Ethernet. ITS323: Introduction to Data Communications CSS331: Fundamentals of Data Communications

Ethernet. Contents. ITS323: Introduction to Data Communications CSS331: Fundamentals of Data Communications. IEEE 802 LANs.

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

TCP/IP Protocol Suite and IP Addressing

Full file at

IP Multicast Addressing

Chapter 9 Ethernet Part 1

Connecting to the Network

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

OSI Data Link & Network Layer

2. LAN Topologies Gilbert Ndjatou Page 1

Lecture (04) Network Layer (Physical/Data link) 2

Request for Comments: 2467 Obsoletes: 2019 December 1998 Category: Standards Track. Transmission of IPv6 Packets over FDDI Networks

Request for Comments: 2464 Obsoletes: 1972 December 1998 Category: Standards Track. Transmission of IPv6 Packets over Ethernet Networks

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

Request for Comments: 2470 Category: Standards Track IBM S. Thomas TransNexus December Transmission of IPv6 Packets over Token Ring Networks

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

Introduction to LAN Protocols

An IPv6 unicast address is an identifier for a single interface, on a single node. A packet that is sent to a unicast

2. What is a characteristic of a contention-based access method?

Mixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER

OSI Data Link & Network Layer

1: Review Of Semester Provide an overview of encapsulation.

Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID)

OSI Data Link & Network Layer

Request for Comments: 1972 Category: Standards Track August A Method for the Transmission of IPv6 Packets over Ethernet Networks

Imi :... Data:... Nazwisko:... Stron:...

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics

Module 9: TCP/IP Protocol Suite and IP Addressing

Lecture 4b. Local Area Networks and Bridges

Introduction to Computer Science (I1100) Networks. Chapter 6

Copyright 2011 Sakun Sharma

4th Slide Set Computer Networks

TCP/IP and the OSI Model

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

Address Resolution Protocol

Chapter 2 Network Models

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

LAN PROTOCOLS. Beulah A AP/CSE

IP Addressing and Subnetting

6 Chapter 6. Figure 1 Required Unique Addresses

Planning for Information Network

Catalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide

Defining Networks with the OSI Model. Module 2

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Cisco Systems, Inc. Norman Finn. July 9, /12. Class of Service in Class of Service in Norman Finn Cisco Systems

CN [Network Devices]

Question 7: What are Asynchronous links?

CHAPTER 2 - NETWORK DEVICES

Raj Jain. The Ohio State University Columbus, OH

Reminder: Datalink Functions Computer Networking. Datalink Architectures

MODUL 7 DATA LINK LAYER

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

LLC and Bridges. Raj Jain. Professor of CIS. The Ohio State University

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

OSI and TCP/IP Models

7th Slide Set Computer Networks

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

1. Data Link Layer (Layer 2)

Configuring IPv6. Information About IPv6. Send document comments to CHAPTER

IPv6 Technical Challenges

IP Multicast Routing Technology Overview

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Chapter 8 ARP(Address Resolution Protocol) Kyung Hee University

Interface The exit interface a packet will take when destined for a specific network.

NT1210 Introduction to Networking. Unit 5:

Internet Protocol Addressing and Routing. Redes TCP/IP

Bridges. November 21, 2006

EE-379 Embedded Systems and Applications Introduction to Ethernet

Introduction to Ethernet. Guy Hutchison 8/30/2006

LOCAL AREA NETWORKS Q&A Topic 4: VLAN

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Section 3 Understanding Ethernet and Switch Operations

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Lab Viewing Network Device MAC Addresses

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

C18: Network Fundamentals and Reliable Sockets

Principles behind data link layer services:

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

Zarządzanie sieciami telekomunikacyjnymi

IPv6 Protocol & Structure. npnog Dec, 2017 Chitwan, NEPAL

Chapter 6 Connecting Device

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

ก ก Information Technology II

IPv4 32 bits, 4 octets separated by. (period) IPv6 128 bits, 8 groupings of 16 bits separated by : (colon)

Transcription:

Computer Communication and Networks Lab Experiment 6 MAC Address and Ethernet Packet Introduction In computer networking a Media Access Control address (MAC address) is a quasi-unique identifier attached to most network adapters (NICs). It is a number that acts like a name for a particular network adapter, so, for example, the network cards (or builtin network adapters) in two different computers will have different names, or MAC addresses, as would an Ethernet adapter and a wireless adapter in the same computer, and as would multiple network cards in a router. However, it is possible to change the MAC address on most of today's hardware. MAC addresses, unlike IP addresses and IPX addresses, are not divided into "host" and "network" portions, so a host cannot determine, from the MAC address of another host, whether that host is on the same layer 2 network segment as the sending host or a network segment bridged to that network segment and, if it's not, cannot determine the MAC address of a router that is on the same network segment as the sending host or a segment bridged to that network segment and that can help route the packet to the destination host. ARP is commonly used to convert from addresses in a layer 3 protocol such as Internet Protocol (IP) to the layer 2 MAC address. On broadcast networks, such as Ethernet, the MAC address allows each host to be uniquely identified and allows frames to be marked for specific hosts. It thus forms the basis of most of the layer 2 networking upon which higher OSI Layer protocols are built to produce complex, functioning networks. The original IEEE 802 MAC address, comes from the original Xerox Ethernet addressing scheme. This 48-bit address space contains potentially 2 48 or 281,474,976,710,656 possible MAC addresses.

All three numbering systems use the same format and differ only in the length of the identifier. Addresses can either be "universally administered addresses" or "locally administered addresses." A universally administered address is uniquely assigned to a device by its manufacturer; these are sometimes called "burned-in addresses." The first three octets (in transmission order) identify the organization that issued the identifier and are known as the Organizationally Unique Identifier (OUI). The following three (MAC-48 and EUI-48) or five (EUI-64) octets are assigned by that organization in nearly any manner they please, subject to the constraint of uniqueness. The IEEE expects the MAC-48 space to be exhausted no sooner than the year 2100; EUI-64s are not expected to run out in the foreseeable future. A locally administered address is assigned to a device by a network administrator, overriding the burned-in address. Locally administered addresses do not contain OUIs. Universally administered and locally administered addresses are distinguished by setting the second least significant bit of the most significant byte of the address. If the bit is 0, the address is universally administered. If it is 1, the address is locally administered. The bit is 0 in all OUIs. For example, 02-00-00-00-00-01. The most significant byte is 02h. The binary is 00000010 and the second least significant bit is 1. Therefore, it is a locally administered address. If the least significant bit of the most significant byte is set to a 0, the packet is meant to reach only one receiving NIC. This is called unicast. If the least significant bit of the most significant byte is set to a 1, the packet is meant to be sent only once but still reach several NICs. This is called multicast.

MAC-48 and EUI-48 addresses are usually shown in hexadecimal format, with each octet separated by a dash or colon. An example of a MAC-48 address would be "00-08-74-4C-7F-1D". If you cross-reference the first three octets with IEEE's OUI assignments, you can see that this MAC address came from Dell Computer Corp. The last three octets represent the serial number assigned to the adapter by the manufacturer. The following technologies use the MAC-48 identifier format: Ethernet 802.11 wireless networks Bluetooth IEEE 802.5 token ring most other IEEE 802 networks FDDI ATM (switched virtual connections only, as part of an NSAP address) Fibre Channel and Serial Attached SCSI (as part of a World Wide Name) The distinction between EUI-48 and MAC-48 identifiers is purely semantic: MAC-48 is used for network hardware; EUI-48 is used to identify other devices and software. (Thus, by definition, an EUI-48 is not in fact a "MAC address", although it is syntactically indistinguishable from one and assigned from the same numbering space.) Note: The IEEE now considers the label MAC-48 to be an obsolete term which was previously used to refer to a specific type of EUI-48 identifier used to address hardware interfaces within existing 802-based networking applications and should not be used in the future. Instead, the term EUI-48 should be used for this purpose. EUI-64 identifiers are used in: FireWire IPv6 (as the low-order 64 bits of a unicast network address when temporary addresses are not being used) ZigBee / 802.15.4 wireless personal-area networks

The IEEE has built in several special address types to allow more than one Network Interface Card to be addressed at one time: Packets sent to the broadcast address, all one bits, are received by all stations on a local area network. In hexadecimal the broadcast address would be "FF:FF:FF:FF:FF:FF". Packets sent to a multicast address are received by all stations on a LAN that have been configured to receive packets sent to that address. Functional addresses identify one of more Token Ring NICs that provide a particular service, defined in IEEE 802.5. These are "group addresses", as opposed to "individual addresses"; the least significant bit of the first octet of a MAC address distinguishes individual addresses from group addresses. That bit is set to 0 in individual addresses and 1 in group addresses. Group addresses, like individual addresses, can be universally administered or locally administered. In addition, the EUI-64 numbering system encompasses both MAC-48 and EUI-48 identifiers by a simple translation mechanism. To convert a MAC-48 into an EUI-64, copy the OUI, append the two octets "FF-FF", and then copy the organization-specified part. To convert an EUI-48 into an EUI-64, the same process is used, but the sequence inserted is "FF-FE". In both cases, the process can be trivially reversed when necessary. Organizations issuing EUI-64s are cautioned against issuing identifiers that could be confused with these forms. The IEEE policy is to discourage new uses of 48-bit identifiers in favor of the EUI-64 system. IPv6 one of the most prominent standards that uses EUI-64 applies these rules inconsistently. Due to an error in the appendix to the specification of IPv6 addressing, it is standard practice to extend MAC-48 addresses (such as IEEE 802 MAC address) to EUI-64 using "FF-FE" rather than "FF-FF."

Figure 1 Objective The objectives of this experiment are to: Understand physical connection between two nodes with the help of a hub. Transfer packets from one node to another using MAC address. Capture and analyze the contents of a transmitted packet. Network Diagram Figure 2: Network Diagram.

Procedure Part1: 1. Open xclient on both the nodes. 2. Click tools -> network configuration and enter the IP Address for Interface 1 and 2. 3. Set always listening on. 4. Click M Br. 5. Click SendE. 6. Set destination address to FF:FF:FF:FF:FF:FF. 7. Either ITS 1 or ITS 2 click send. Part 2: 1. Set the destination address to the receiver's MAC address. 2. Click Send. Part3: 1. On ITS 2, click Mddl. 2. Click load to load the AutoResponser.mddl. 3. Click Upld to upload the mddl file. 4. On ITS 1, in the packet send window, set the packet type to AA:AA, message to 01, and destination to the MAC address of ITS 2. 5. Send Ethernet packet from ITS 1 to ITS 2.

Report 1. Explain the concept of MAC address. 2. Capture all the output of the packet sent/received window by using Prt Sc button on the keyboard and attach them as results. 3. Comment on the results and its parameters. 4. Conclude you learning outcome. Questions 1. In the part one and two of the experiment, what happens if the destination address is set to a non existent address? 2. Why can t a straight cable be used to connect two computers back-to-back? 3. How does a HUB differ from a switch?