

Each address is 48 bits long, or 6 octets, expressed as 12 hexadecimal digits, 0-9,A-F.Ī common format is 12:34:56:78:9A:BC.The first six hex numbers indicate the manufacturer of the network interface card (NIC), the last six hex numbers are the serial number of the NIC.The destination address may be a broadcast, which contains all ones, or a unicast. This field contains synchronizing bits, processed by the NIC hardware. The following table takes the first frame in the Wireshark capture and displays the data in the Ethernet II header fields.


Step 4: Examine the Ethernet II header contents of an ARP request. The session begins with an ARP query for the MAC address of the gateway router, followed by four ping requests and replies. A filter has been applied to Wireshark to view the ARP and ICMP protocols only. The Wireshark capture below shows the packets generated by a ping being issued from a PC host to its default gateway. Step 3: Examine Ethernet frames in a Wireshark capture. This PC host IP address is 192.168.1.147 and the default gateway has an IP address of 192.168.1.1. Step 2: Examine the network configuration of the PC. Step 1: Review the Ethernet II header field descriptions and lengths. A Wireshark capture will be used to examine the contents in those fields. In Part 1, you will examine the header fields and content in an Ethernet II frame.

Last Updated on Januby Admin 5.1.1.7 Lab – Using Wireshark to Examine Ethernet Frames Answers Lab – Using Wireshark to Examine Ethernet Frames ( Answers Version – Optional Lab)Īnswers Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
