From the saved ethereal data, select one IP datagram that is fragmented. Include the complete datagram before fragmentation and include all fragments after fragmentation. For each fragment of this datagram, determine the values of the fields in the IP header that are used for fragmentation (Identification, Fragment Offset, Don’t Fragment Bit, More Fragments Bit).
What will be an ideal response?
Before fragmentation
```
(1514 bytes on wire, 1514 bytes captured)
Arrival Time: Aug 23, 2003 03:15:52.540367000
Time delta from previous packet: 0.000264000 seconds
Time relative to first packet: 0.000264000 seconds
Frame Number: 2
Packet Length: 1514 bytes
Capture Length: 1514 bytes
Ethernet II, Src: 00:50:bf:90:7d:33, Dst: 00:50:bf:90:67:74
Destination: 00:50:bf:90:67:74 (10.0.1.33)
Source: 00:50:bf:90:7d:33 (10.0.1.11)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.11 (10.0.1.11), Dst Addr: 10.0.2.22 (10.0.2.22)
Version: 4 Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 1500
Identification: 0x0000 (0)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x1df1 (correct)
Source: 10.0.1.11 (10.0.1.11)
Destination: 10.0.2.22 (10.0.2.22)
User Datagram Protocol, Src Port: 1044 (1044), Dst Port: 4444 (4444)
Source port: 1044 (1044)
Destination port: 4444 (4444)
Length: 1480
Checksum: 0xee0b (correct)
Data (1472 bytes)
0000 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f !"#$%&'()*+,-./
0010 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 0123456789:;<=>?
0020 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f @ABCDEFGHIJKLMNO
. . . . . . . . . . . . .
0590 7e 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e ~ !"#$%&'()*+,-.
05a0 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e /0123456789:;<=>
05b0 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e ?@ABCDEFGHIJKLMN
```
After fragmentation
```
(1514 bytes on wire, 1514 bytes captured)
Arrival Time: Aug 23, 2003 03:16:15.434904000
Time delta from previous packet: 22.894537000 seconds
Time relative to first packet: 22.894801000 seconds
Frame Number: 23
Packet Length: 1514 bytes
Capture Length: 1514 bytes
Ethernet II, Src: 00:50:bf:90:7d:33, Dst: 00:50:bf:90:67:74
Destination: 00:50:bf:90:67:74 (10.0.1.33)
Source: 00:50:bf:90:7d:33 (10.0.1.11)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.11 (10.0.1.11), Dst Addr: 10.0.2.22 (10.0.2.22)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 1500
```
Identification: 0xa464
```
(42084)
Flags: 0x06
.1.. = Don't fragment: Set
..1. = More fragments: Set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x598c (correct)
Source: 10.0.1.11 (10.0.1.11)
Destination: 10.0.2.22 (10.0.2.22)
User Datagram Protocol, Src Port: 1044 (1044), Dst Port: 4444 (4444)
Source port: 1044 (1044)
Destination port: 4444 (4444)
Length: 1481
Checksum: 0x9f09
Data (1472 bytes)
0000 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f !"#$%&'()*+,-./
0010 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 0123456789:;<=>?
0020 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f @ABCDEFGHIJKLMNO
. . . . . . . . . . . . .
0590 7e 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e ~ !"#$%&'()*+,-.
05a0 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e /0123456789:;<=>
05b0 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e ?@ABCDEFGHIJKLMN
```
Frame 24
```
(35 bytes on wire, 35 bytes captured)
Arrival Time: Aug 23, 2003 03:16:15.434937000
Time delta from previous packet: 0.000033000 seconds
Time relative to first packet: 22.894834000 seconds
Frame Number: 24
Packet Length: 35 bytes
Capture Length: 35 bytes
Ethernet II, Src: 00:50:bf:90:7d:33, Dst: 00:50:bf:90:67:74
Destination: 00:50:bf:90:67:74 (10.0.1.33)
Source: 00:50:bf:90:7d:33 (10.0.1.11)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.11 (10.0.1.11), Dst Addr: 10.0.2.22 (10.0.2.22)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 21
Identification: 0xa465 (42085)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 1480
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x7e99 (correct)
Source: 10.0.1.11 (10.0.1.11)
Destination: 10.0.2.22 (10.0.2.22)
Data (1 byte) 0000 4f
```
Frame 25
```
(1514 bytes on wire, 1514 bytes captured)
Arrival Time: Aug 23, 2003 03:16:15.434950000
Time delta from previous packet: 22.894847000 seconds
Time relative to first packet: 22.894847000 seconds
Frame Number: 25
Packet Length: 1514 bytes
Capture Length: 1514 bytes
Ethernet II, Src: 00:50:bf:90:7d:33, Dst: 00:50:bf:90:67:74
Destination: 00:50:bf:90:67:74 (10.0.1.33)
Source: 00:50:bf:90:7d:33 (10.0.1.11)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.11 (10.0.1.11), Dst Addr: 10.0.2.22 (10.0.2.22)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 1500
Identification: 0xa465 (42085)
Flags: 0x06
.1.. = Don't fragment: Set
..1. = More fragments: Set
Fragment offset: 0
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x598b (correct)
Source: 10.0.1.11 (10.0.1.11)
Destination: 10.0.2.22 (10.0.2.22)
User Datagram Protocol, Src Port: 1044 (1044), Dst Port: 4444 (4444)
Source port: 1044 (1044)
Destination port: 4444 (4444)
Length: 1481
Checksum: 0x9f09
Data (1472 bytes)
0000 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f !"#$%&'()*+,-./
0010 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 0123456789:;<=>?
0020 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f @ABCDEFGHIJKLMNO
. . . . . . . . . . .
0590 7e 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e ~ !"#$%&'()*+,-.
05a0 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e /0123456789:;<=>
05b0 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e ?@ABCDEFGHIJKLMN
```
Frame 26
```
(35 bytes on wire, 35 bytes captured)
Arrival Time: Aug 23, 2003 03:16:15.434984000
Time delta from previous packet: 0.000034000 seconds
Time relative to first packet: 22.894881000 seconds
Frame Number: 26
Packet Length: 35 bytes
Capture Length: 35 bytes
Ethernet II, Src: 00:50:bf:90:7d:33, Dst: 00:50:bf:90:67:74
Destination: 00:50:bf:90:67:74 (10.0.1.33)
Source: 00:50:bf:90:7d:33 (10.0.1.11)
Type: IP (0x0800)
Internet Protocol, Src Addr: 10.0.1.11 (10.0.1.11), Dst Addr: 10.0.2.22 (10.0.2.22)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 21
```
Identification: 0xa466
```
(42086)
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 1480
Time to live: 64
Protocol: UDP (0x11)
Header checksum: 0x7e98 (correct)
Source: 10.0.1.11 (10.0.1.11)
Destination: 10.0.2.22 (10.0.2.22)
Data (1 byte)
0000 4f
```
You might also like to view...
If you will be importing Excel data on a reoccurring basis, it is a good practice to save the import steps in Access
Indicate whether the statement is true or false
Use of the Justify text alignment option has the negative result of adding too much space between words
Indicate whether the statement is true or false