Use the data saved in Step 7 to document for a single packet, that the packet is forwarded in a loop.

What will be an ideal response?


```
Frame 1 (98 bytes on wire, 98 bytes captured)
Arrival Time: Aug 25, 2003 04:18:35.385665000
Time delta from previous packet: 0.000000000 seconds
Time relative to first packet: 0.000000000 seconds
Frame Number: 1
Packet Length: 98 bytes
Capture Length: 98 bytes
Ethernet II, Src: 00:50:bf:90:7d:33, Dst: 00:04:75:ad:04:b8
Destination: 00:04:75:ad:04:b8 (00:04:75:ad:04:b8)
Source: 00:50:bf:90:7d:33 (00:50:bf:90:7d:33)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.11 (10.0.1.11), Dst Addr: 10.0.1.41

(10.0.1.41)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 84
Identification: 0x0000
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: ICMP (0x01)
Header checksum: 0x2476 (correct)
Source: 10.0.1.11 (10.0.1.11)
Destination: 10.0.1.41 (10.0.1.41)
Internet Control Message Protocol
Type: 8 (Echo (ping) request)
Code: 0
Checksum: 0xebed (correct)
Identifier: 0x435d
Sequence number: 00:01
Data (56 bytes)
0000 6e f0 49 3f 22 81 03 00 08 09 0a 0b 0c 0d 0e 0f n.I?"...........
0010 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................
0020 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f !"#$%&'()*+,-./
0030 30 31 32 33 34 35 36 37 01234567
Frame 2 (98 bytes on wire, 98 bytes captured)
Arrival Time: Aug 25, 2003 04:18:35.385741000
Time delta from previous packet: 0.000076000 seconds
Time relative to first packet: 0.000076000 seconds
Frame Number: 2
Packet Length: 98 bytes
Capture Length: 98 bytes
Ethernet II, Src: 00:04:75:ad:04:b8, Dst: 00:50:bf:90:7d:33
Destination: 00:50:bf:90:7d:33 (00:50:bf:90:7d:33)
Source: 00:04:75:ad:04:b8 (00:04:75:ad:04:b8)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.41 (10.0.1.41), Dst Addr: 10.0.1.11

(10.0.1.11)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 84
Identification: 0x85b0
Flags: 0x00
.0.. = Don't fragment: Not set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: ICMP (0x01)
Header checksum: 0xdec5 (correct)
Source: 10.0.1.41 (10.0.1.41)
Destination: 10.0.1.11 (10.0.1.11)
Internet Control Message Protocol
0030 30 31 32 33 34 35 36 37 01234567
Frame 4 (98 bytes on wire, 98 bytes captured)
Arrival Time: Aug 25, 2003 04:18:35.385988000
Time delta from previous packet: 0.000013000 seconds
Time relative to first packet: 0.000323000 seconds
Frame Number: 4
Packet Length: 98 bytes
Capture Length: 98 bytes
Ethernet II, Src: 00:04:75:ad:04:b8, Dst: 00:50:bf:90:7d:33
Destination: 00:50:bf:90:7d:33 (00:50:bf:90:7d:33)
Source: 00:04:75:ad:04:b8 (00:04:75:ad:04:b8)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.41 (10.0.1.41), Dst Addr: 10.0.1.11

(10.0.1.11)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 84
Identification: 0x85b1
Flags: 0x00
.0.. = Don't fragment: Not set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: ICMP (0x01)
Header checksum: 0xdec4 (correct)
Source: 10.0.1.41 (10.0.1.41)
Destination: 10.0.1.11 (10.0.1.11)
Internet Control Message Protocol
Type: 0 (Echo (ping) reply)
Code: 0
Checksum: 0xf3ed (correct)
Identifier: 0x435d
Sequence number: 00:01
Data (56 bytes)
0000 6e f0 49 3f 22 81 03 00 08 09 0a 0b 0c 0d 0e 0f n.I?"...........
0010 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................
0020 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f !"#$%&'()*+,-./
0030 30 31 32 33 34 35 36 37 01234567
```

Computer Science & Information Technology

You might also like to view...

________ is the tighter integration between the developers of applications and the IT department that tests and deploys them.

A) Develops B) Waterfall development C) Application lifestyle management D) Network functions virtualization

Computer Science & Information Technology

Which of the following is not one of the main components of UML?

A) things B) relationships C) entities D) diagrams

Computer Science & Information Technology

How many bytes of memory are used in MS Visual C++ for the datatype double ?

A. 1 B. 4 C. 8 D. 2

Computer Science & Information Technology

Describe a mounted drive and why you would use one.

What will be an ideal response?

Computer Science & Information Technology