Lab#7 Seidygali Daryn
Lab#7 Seidygali Daryn
Group: IT1-2107
IP address
192.168.1.4
MAC address
10:b5:88:74:96:d5
Default gateway IP address
192.168.1.1
DNS server IP address
192.168.1.1
Part 2: Use Wireshark to Capture DNS Queries and Responses
In Part 2, you will set up Wireshark to capture DNS query and response packets
to demonstrate the use of the UDP transport protocol while communicating with
a DNS server.
a) Click the Windows Start button and navigate to the Wireshark program.
b) Select an interface for Wireshark to capture packets. Select (highlight) the
active capturing interface.
c) After selecting the desired interface, click Start to capture the packets.
d) Open a web browser and type www.google.com. Press Enter to continue.
e) Click Stop to stop the Wireshark capture when you see the Google home
page.
a) In the Wireshark main window, type dns in the entry area of the Filter
toolbar and press Enter.
Note: If you do not see any results after the DNS filter was applied, close the web
browser. In the command prompt window, type ipconfig /flushdns to remove all
previous DNS results. Restart the Wireshark capture and repeat the instructions
in Part 2b –2e. If this does not resolve the issue, type nslookup www.google.com
in the command prompt window as an alternative to the web browser.
b) In the packet list pane (top section) of the main window, locate the packet
that includes Standard query and A www.google.com. See frame 15 as
an example.
a) In the first line in the packet details pane, frame 2043 had 74 bytes of data
on the wire. This is the number of bytes to send a DNS query to a name
server requesting the IP addresses of www.google.com.
b) The Ethernet II line displays the source and destination MAC addresses.
The source MAC address is from your local PC because your local PC
originated the DNS query. The destination MAC address is from the default
gateway because this is the last stop before this query exits the local
network.
a)
b)
Is the source MAC address the same as the one recorded from Part 1 for the local
PC?
Can you identify the IP and MAC addresses for the source and destination
devices?
The IP packet and header encapsulates the UDP segment. The UDP segment
contains the DNS query as the data.
d) A UDP header only has four fields: source port, destination port, length,
and checksum. Each field in a UDP header is only 16 bits as depicted
below.
Expand the User Datagram Protocol in the packet details pane by clicking the
plus (+) sign. Notice that there are only four fields. The source port number in
this example is 62887. The source port was randomly generated by the local PC
using port numbers that are not reserved. The destination port is 53. Port 53 is a
well-known port reserved for use with DNS. DNS servers listen on port 53 for
DNS queries from clients.
Record your Wireshark results in the table below:
Destination port 53
Is the source IP address the same as the local PC IP address you recorded in Part
1?
Answer: Yes.
Is the destination IP address the same as the default gateway noted in Part 1?
b) In the Ethernet II frame for the DNS response, what device is the source
MAC address and what device is the destination MAC address?
Answer: The source MAC address is the default gateway and the destination
MAC address is the VM.
c) Notice the source and destination IP addresses in the IP packet. What is the
destination IP address? What is the source IP address?
Answer:
The source port number is 53. The DNS server listens for a DNS query on port
53 and then sends a DNS response with a source port number of 53 back to
the originator of the DNS query.
Reflection
What are the benefits of using UDP instead of TCP as a transport protocol for
DNS?
Answer: