ARP-Lab Manual
ARP-Lab Manual
(ARP)
1
© 2021 C-DAC, Hyderabad
Table of Contents
Objective 3
Prerequisites 3
Problem Statement 3
Summary 3
Fundamental Concepts 4
References 15
2
© 2021 C-DAC, Hyderabad
1. Objective
2. Prerequisites
Prerequisites Version
3. Problem Statement
By capturing the Ethernet packets, the Ethernet header information is obtained about
the packets’ source and destination address, packet length.
4. Summary
Steps Description
5. Fundamental Concepts
Introduction of Ethernet:
Ethernet is a Data Link Protocol, which controls the way data is transmitted over a
Local Area Network (LAN). It is specified in Standard, IEEE 802.3. Ethernet LAN
cards with speeds up to 100 Mbps while the fastest Ethernet speed is Gbps (1 Gbps =
1000 Mbps). Ethernet header is very simple to analyze.
Cyclic
Click on this option to capture the N packets. This screen is shown below.
4
© 2021 C-DAC, Hyderabad
2. Step-2: Apply ifconfig command to know the IP address of the machines
For Linux operating systems use the ifconfig command. Apply ifconfig command to
know the IP addresses of the machines. By applying the ifconfig we obtain the
following details that are related to Layer3 (i.e Network layer).
To open command prompt, go to the top left corner of your screen; click on the
command prompt
5
© 2021 C-DAC, Hyderabad
6
© 2021 C-DAC, Hyderabad
Then type ifconfig command in the terminal the following output will be obtained.
Apply ping command in the command prompt to check the communication between
source and destination address.
Source address:172.17.0.4
Destination address: 10.244.10.239
In the below command prompt it is shown that from the source address of 172.17.0.4
ping command is given to the destination address of 10.244.10.239.
7
© 2021 C-DAC, Hyderabad
4. Step-4: Stop the Wireshark and save the captured traffic
Go to the Wireshark application. Stop the Wireshark and save the captured traffic
In order to save the captured network packets, go to the top left corner and click on
“File” followed by “save” .
8
© 2021 C-DAC, Hyderabad
Give any name to your file . Here we have given Traffic1 which is shown below:
9
© 2021 C-DAC, Hyderabad
Now select the extension as pcap by clicking on the drop-down beside the “save as”.
Choose the “wireshark/tcpdump- pcap” option and click on the “save” button.
10
© 2021 C-DAC, Hyderabad
5. Step-5: Analyze the ARP Packets
Observe the traffic captured in the top Wireshark packet list pane. Look for traffic with
ARP listed as the protocol. To view only ARP traffic, type arp in the Filter box and press
Enter. Select the first ARP packet.
11
© 2021 C-DAC, Hyderabad
a. Analyze an ARP Request.
Let's observe and Analyze an ARP Request. Observe the packet details in the middle
Wireshark packet details pane. Notice that it is an Ethernet II/ Address Resolution
Protocol frame.
12
© 2021 C-DAC, Hyderabad
Expand Ethernet II to view Ethernet details.
Observe the Destination field. Notice that the destination field is the Ethernet broadcast
address (FF:FF:FF:FF:FF:FF). All devices on the network will receive the ARP request.
Observe the Source field. This should contain your MAC address. You can use ipconfig
/all, getmac, or ifconfig to confirm.
Observe the Type field. Notice that the type is 0x0806, indicating ARP.
13
© 2021 C-DAC, Hyderabad
● Observe the Target IP address. Notice that the target IP address is the IP address
of the default gateway.
14
© 2021 C-DAC, Hyderabad
Expand Address Resolution Protocol (reply) to view ARP details.
● Observe the Sender MAC address. Notice that the sender MAC address is the MAC
address of the default gateway.
● Observe the Sender IP address. Notice that the sender IP address is the IP
address of the default gateway.
● Observe the Target MAC address. Notice that the destination MAC address is your
MAC address.
● Observe the Target IP address. Notice that the destination IP address is your IP
address.
7. References
● https://www.wireshark.org/
15
© 2021 C-DAC, Hyderabad