The OSI Model
The OSI Model
OBJECTIVE:
CompTIA Network + Domain:
Domain 1.0: Networking Concepts
OVERVIEW:
This lab will utilize Wireshark to review network traffic. Wireshark is a network protocol analyzer licensed
under GNU General Public License. A network protocol analyzer is used to capture data packets on a
network. Students will review several layers of the OSI model during this lab. Students will be able to
describe the encapsulation process and the function of specific protocols that operate within particular
layers of the OSI model.
OUTCOMES:
In this lab you will learn to:
Reading Assignment
Introduction
In this lab, you will be using Wireshark to explore the layers of the Open Systems Interconnect, or OSI,
Model. Figure 1 shows the lab topology for this lab. You will be using a pcap file with previously captured
network activity in Wireshark to explore that network traffic and illustrate each of the seven layers of the
OSI Model.
OSI Model
The Open System Interconnection (OSI) Model is a vendor neutral conceptual model that consists of seven
layers from the physical layer to the application layer. Figure 2 shows the seven layers of the OSI model.
The data at each of the layers of the OSI model is called the protocol data unit (PDU) which includes the
message along with a header. The application, presentation, and session layers’ PDU is the data. The
transport layer’s PDU is called either the segment or datagram. The network layer’s PDU is called the
packet. The data link layer’s PDU is called the frame, and the physical layer’s PDU is the bits. As you move
up the layers, encapsulation occurs where each layer add a header to its role in the communication
process. When the receiver receives the complete PDU, decapsulation occurs where the header informs
the functions of each layer.
TCP/IP
Compared to the OSI Model, the Transmission Control Protocol/Internet Protocol (TCP/IP) networking model
consists of four layers: application, transport, network, and data link. Figure 3 shows the different TCP/IP
layers compared to the OSI model. It is important to note that the OSI Model is conceptual, whereas the
TCP/IP model is the actual implementation of how the data flows. The TCP/IP model combines the functions
of the first three OSI Model layers and also combines the last two layers (data link and physical). The
names of the PDUs at each layer still apply. Services run at the application layer and interact with the
transport layer using ports. Port numbers are assigned to different services on the operation system.
Services, such as File Transfer Protocol (FTP), telnet, Hypertext Transport Protocol (HTTP), and others use
unique port numbers assigned to them by the operating system. FTP has a port number of 21, telnet uses
the port number of 23, and HTTP has a port number of 80. These port numbers are how TCP/IP knows how
to communicate from the transport layer to the application layer. TCP/IP was not initially designed with
security in mind so some applications are configured by default to send traffic over the network in
plaintext. There are relatively newer services and more widely used protocols that use encryption like
Secure Shell (SSH) and Hypertext Transport Protocol Secure (HTTPS) that are used in place of these older,
less secure protocols.
There are several protocols used in this lab which will have an image of the header format to assist in
analyzing network traffic when you are using Wireshark.
Transport
In the OSI Model, the PDU is called either a segment or datagram. The transport layer manages the reliable
transport of segments on the network including segmentation, acknowledgment, and multiplexing. There
are two protocols at this layer in TCP/IP: transmission control protocol (TCP) and user datagram protocol
(UDP).
Network
In the OSI Model, the network layer is responsible for addressing, routing, and traffic control. In TCP/IP, the
Internet Protocol (IP) handles this function.
Ethernet
Ethernet is an IEEE 802.3 standard used for networks. It handles the communication over wired switched
network today. The frame format is shown in Figure 8. The preamble is there to help devices synchronize
bit patterns. You have the source Medium Access Control (MAC) addresses which are unique to each
network interface card (NIC). The NIC is the interface between the operating system and the physical
network. The last part of the frame is the Cyclical Redundancy Check (CRC) which handles error detection
of the data being transmitted.
The format for a packet that is transmitted over a network usually looks like in Figure 9.
This relates to the layers in the TCP/IP protocol stack. Media Access Control (MAC) header is Ethernet,
Internet Protocol (IP) header is the network/Internet layer, TCP header is the transport layer, and the
message is the application layer. When a message is transmitted over the network, it encapsulates the
header from each of the layers before it transmits onto the network. When the message is received, the
headers are stripped off as it works its way up the protocol stack to the application. Figure 10 illustrates
how a message flows from the client to the server.
A DisplayFilter allows you to only see traffic that you want to see. You can filter on items like the TCP port
number, the protocol type, IP addresses, etc. For more information on DisplayFilters, see this link. To fully
appreciate the details of the headers of the different protocols at the different layers, you need to review
the header information. Wikipedia is a good source of header information for the different protocols used
on a network. Once the filter is set, the results appear in #2. As you change the DisplayFilter, you can filter
the display to show only the relevant related traffic. When you click on a packet, the packet info appears in
#3. Details about the selected link are provided in the second part of the window. You can examine the
details of that particular part of the captured data. #4 of the screenshot shows the file in hexadecimal
format on the left side of the pane.
CONCLUSION:
In this lab, you will be using Wireshark to analyze different protocols at different layers of the OSI and
TCP/IP models.
Review of the OSI Model and Wireshark
The Open System Interconnection, or OSI, model defines a framework through which networking protocols
(or protocol suites) can be implemented. The OSI model consists of seven layers. Each layer has its own
responsibility within the communication process. Hosts that have data to send over the network pass the
data through each of the seven layers, starting at the top, until the last layer is reached. Each layer adds
the information it needs to the data in a process known as encapsulation. The information added at each
layer usually comes in the form of a header specific to the protocol in use at that layer. As the data is
manipulated at each layer, a new name is given to it, as to associate it with the specific layer. These new
data pieces are called Protocol Data Units (PDU). The seven layers of the OSI model and the PDU
associated with the layer is shown.
Once the data has reached the physical layer of the OSI model, it is transmitted onto the networking media
and sent to the destination host. The destination host passes the data back up through the layers of the
OSI model with each layer processing and removing its header. This process is known as de-encapsulation.
This process continues up the layers of the OSI model until the receiving host’s application processes the
data.
Wireshark is a network protocol analyzer that allows you to capture and interactively browse the traffic
running on a computer network. With Wireshark, users can view the encapsulation and de-encapsulation
process for any captured network conversation. Wireshark runs interactively on one of the client
computers and works by processing every data packet it receives on its network interface even if that
packet is not destined for the client system running Wireshark. A network interface functioning in this
manner is said to be operating in promiscuous mode. It does not interfere with normal network
communication. Instead, it simply displays all received data in the program’s capture window.
WIRESHARK
From this window, a user can view the contents of any captured packet to reveal the details of a network
conversation. In this lab, you will view a network conversation between a web client application and a web
server for the request of a webpage at the URL http://www.isp.com. The host running the web client
application, requesting the webpage is the Internal 192.168.12.11 Windows Server machine in the pod
topology. This is also the machine running the Wireshark utility. The web server responding to the request
for the webpage is the Windows 2k8 R2 External machine in the pod topology.
POD TOPOLOGY
This lab serves as a demonstration of Wireshark’s ability to capture and view this process. Each layer of
the OSI model will be identified, and the data associated with that layer will be viewed in its raw format. It
is not expected that you will become a network expert at the conclusion of this lab; instead, this lab serves
to give you an understanding of how the OSI model functions and to demonstrate the powerful capabilities
of the Wireshark utility.
DISCUSSION QUESTIONS:
1. What is the OSI model?
2. What is Wireshark?
3. What is promiscuous mode?
Reviewing the Application, Presentation, and
Session Layers
Many protocols operate at the application, presentation, and session layers of the OSI model. The top three
layers of the OSI are often looked at from the perspective of the TCP/IP model which encompasses all three
layers into one layer labeled application. These three layers operate on the data that is being formed and
readied to be packaged. The PDU associated with information created by any of the top three layers of the
OSI model is referred to as data. The protocols at these layers prepare the data by formatting it based on
the network service or application being used, encrypting and encoding the data, and controlling the
dialog between the end system applications. Examples of network services, protocols, and client requests
interfacing at these layers include File Transfer Protocol (FTP), Telnet, and Hypertext Transfer Protocol
(HTTP).
2. After the machine boots up, click the Send Ctrl+Alt+Delete button on the upper-right corner.
SEND CTRL+ALT+DELETE BUTTON
3. In the password text box, type P@ssw0rd and press Enter to log into the Internal 192.168.12.11
Windows Server.
5. Once the file has opened, take a moment to get familiar with the Capture window. The top pane of
the window shows the individual captured packets. The middle pane shows the details for the
currently selected packet. The bottom pane shows the packet content.
CAPTURE WINDOW
6. The first column in the captured packet pane is the packet number assigned in the order they were
captured by the program. Scrolling through the list, you will notice there were a total of 226 packets
captured in this example.
CAPTURE WINDOW
7. The second column shows the time at which the packet was captured in reference to when the
capture was initiated. Scrolling through the list, you will notice the last packet was captured
approximately 11.74 seconds after the capture was started.
CAPTURE WINDOW
8. The third column is the source IP address associated with the packet that was captured. The source
is where the packet came from. Scrolling through the list, you will notice several examples of source
IP addresses including some that you will work with in this lab. These addresses include
192.168.12.11, 192.168.12.10, and 131.107.0.200.
CAPTURE WINDOW
9. The fourth column is the destination IP address associated with the packet that was captured. The
destination is where the packet is going. Scrolling through the list, you will notice that many of the
source addresses you just saw are also included in this column. This shows the two-way
conversation between these machines.
CAPTURE WINDOW
10. The fifth column indicates the protocol being used within the captured packet. Scrolling through the
list, you will notice several protocols associated with this conversation, including HTTP, TCP, DNS,
and ARP.
CAPTURE WINDOW
11. The sixth column is the length of the captured packet. Scrolling through the list, you will notice
packets vary greatly in size. For example, DNS or ARP packets are relatively small, while several of
the TCP packets are relatively large.
CAPTURE WINDOW
12. The seventh and final column gives you information about what is inside of the packet. Scrolling
through the list, the information within packets will vary greatly.
CAPTURE WINDOW
13. Scroll in the list until you see packet number 10. Select this packet by clicking on it in the top pane
of the Capture window.
PACKET NUMBER 10
14. In the middle pane of the Capture window, expand the + next to Hypertext Transfer Protocol.
15. Hypertext Transfer Protocol (HTTP) is one of the application layer protocols in the TCP/IP suite. What
you are currently looking at is the initial request from the web client to the web server for the
website http://www.isp.com. This can be identified by the line GET / HTTP/1.1. GET messages are
used to request information from web servers. Referring back to the highlighted packet number 10,
you can also use the source and destination IP address fields to see where the request is coming
from and going to.
17. In the middle pane of the capture window, expand the + next to Hypertext Transfer Protocol.
18. What you are currently seeing is the initial response from the web server to the web client. Look for
the line labeled Server. This line shows the service responding to the request on the server. In this
example, the web server is running Microsoft Internet Information Services (IIS) version 7.5.
WEB SERVER
19. Scroll down and expand the + next to Line-based text data: text/html.
LINE-BASED TEXT DATA
20. As you scroll down, you are looking at the html code and text that make up the requested web page.
This is interpreted by the web browser application on the client machine and the webpage is
displayed. Scroll to the very bottom of the text and locate the line that begins with <a href=.
Reading across, you will see the text img src=“welcome.png.” This line is a reference to an image
that should be displayed on the webpage. The href reference before this is actually a link to a
different website that you would be taken to if you clicked on the welcome.png picture on the
webpage. The client will need to request this image before it can be displayed.
PACKET NUMBER 12
22. In the middle pane of the capture window, expand the + next to Hypertext Transfer Protocol.
HYPERTEXT TRANSFER PROTOCOL
23. Notice the line GET /welcome.png. This is the request from the web client to the web server to
obtain the image named welcome.png. This image will be displayed on the requested web page.
24. Scroll down through the top capture window and click on packet number 204.
25. In the middle pane of the capture window, expand the + next to Hypertext Transfer Protocol.
26. Notice the line HTTP/1.1 200 OK. This message signifies that the web server has processed the
client request for the image and the image should have been sent to the client’s web browser. (We
will review the packets we skipped at a later time.) Notice the next line labeled Content-Type. This
also shows that a PNG formatted image was requested from the server.
HTTP/1.1 200 OK
CONCLUSION:
HTTP is an application layer protocol of the OSI model. End-user applications, such as a web browser, use
this protocol to send a request for required web based information and the server packages data that
makes up the web page to respond to the request.
DISCUSSION QUESTIONS:
1. What is the PDU associated with the top three layers of the OSI model?
2. What HTTP message type is used to request data?
3. What HTTP message type was used to signify the image was successfully transferred to the client?
2. In the middle pane of the capture window, expand the + next to Transmission Control Protocol.
3. Notice the line Source Port. This port is a randomly generated number between 49152 and 65535
that the requesting client will use to keep track of this web page request. This range of ports is
known as Dynamic Ports.
SOURCE PORT
4. Notice the line Destination Port. Port 80, the destination port of this packet, is assigned by IANA
specifically for the HTTP protocol. Ports that fall into the range 0-1023 are known as System Ports.
Some texts also refer to this range as Well Known Ports. These ports are assigned to specific
applications allowing the receiving server to identify the application. In this example port 80
indicates that the web server application needs to respond to the request.
DESTINATION PORT
5. Notice the line Sequence Number. Sequence numbers are used to keep all of the TCP segments in
the correct order. The first segment in the TCP three-way handshake is always assigned sequence
number 0 in a default Wireshark configuration. This segment is called the SYN segment.
SEQUENCE NUMBER
6. Expand the + next to Flags. Flags are used to set certain options available to the segment. In this
example, there is one flag set – the Syn flag. This can be observed by noting the 1 bit is set in this
field, while all others have the bit set to 0.
FLAGS
7. Expand the + next to the line Syn: Set. Notice the line Expert Info. The purpose of this flag is
explained. The SYN segment is used to request a connection from the client to the server.
EXPERT INFO
9. In the middle pane of the capture window, expand the + next to Transmission Control Protocol.
10. Notice the lines Source port and Destination port. You will see that the same port numbers are
being used, but they have now changed positions. This is because this segment is a response from
the server hosting the web page to the web client that requested the webpage. Because the
application receiving the response is also a web-based application, the port number indicates the
HTTP protocol in the returning packet to alert the client to use the web browser.
11. Notice the line Sequence Number. Since this is the first segment coming from the server (and the
second part of the three-way handshake), this sequence number is also set to 0.
SEQUENCE NUMBER
12. Notice the line Acknowledgment number. The TCP protocol uses acknowledgment numbers to
indicate to the client that it has received its request and is responding to that request. The client in
turn needs to use that acknowledgement number as the next sequence number because the server
expects to see in the conversation. With the exception of the three-way handshake,
acknowledgments are not sent for each segment. Instead, they are sent at periodic intervals set by
a sliding window. This allows for greater efficiency since a large group of segments can be
acknowledged at the same time. In this part of the three-way handshake, the acknowledgment
number is 1.
ACKNOWLEDGMENT NUMBER
13. Expand the + next to Flags. Flags are used to set certain options available to the segment. In this
example, there are two flags set – the Acknowledgment flag and the Syn flag.
FLAGS
14. Expand the + next to the line Syn: Set. Notice the line Expert Info. The purpose of this flag is
explained. The SYN+ACK segment is used to acknowledge the request for a connection from the
client to the server.
SYN+ACK SEGMENT
15. Notice the line Window size value. This is the number of segments that will be sent before an
acknowledgment is expected. It is called a sliding window because this value can change based on
varying network conditions.
16. In the top capture window, select packet number 9 by clicking on it.
PACKET NUMBER 9
17. In the middle pane of the capture window, expand the + next to Transmission Control Protocol.
TRANSMISSION CONTROL PROTOCOL
18. Notice the lines Source port and Destination port. You will see that the port numbers have returned
to their original configuration. This is because this segment is the final response of the three-way
handshake from the client to the server hosting the web page.
19. Notice the line Sequence Number. Since this is the second segment coming from the client (and the
third part of the three-way handshake), this sequence number is set to 1. This number also matches
the acknowledgment number from the previous segment because the server is expecting to see
segment number 1 next.
SEQUENCE NUMBER
20. Notice the line Acknowledgment number. This number is also set to 1. The client is telling the web
server that is did receive the initial segment and that it is expecting to see segment number 1 next.
ACKNOWLEDGMENT NUMBER
21. Expand the + next to Flags. Flags are used to set certain options available to the segment. In this
example, there is only one flag set – the Acknowledgment flag.
ACKNOWLEDGMENT FLAG
22. Scroll down and expand the + next to the line SEQ/ACK analysis. This section actually tells you
that this segment is an acknowledgment to the segment in frame number 8. It also includes the
Round Trip Time, or how long it took for the acknowledgment to arrive. Once the TCP three-way
handshake is complete, data transmission can begin. (These are the segments we skipped earlier.)
These packets actually contain the data that makes up the picture on the web page.
SEQ/ACK ANALYSIS
23. Scroll through the list and select packet number 16.
PACKET NUMBER 16
24. Using the procedures from above, expand the Transmission Control Protocol segment and look at
the options that are set. Expand the + next to the line SEQ/ACK analysis. Notice the message now
states Reassembled PDU in frame: 204. This means the picture was completely transmitted and
reassembled in packet number 204.
25. Scroll slowly down through the top capture window, noticing some of the packets that are
highlighted in black. Look closely at the Info column. Notice that each of these segments is an
acknowledgment to a previous group of segments. Remember that the Ack number is always the
next segment expected in the sequence. Notice that even though the Ack (acknowledgment)
number continues to increase, the Seq (sequence) number does not. This is because the client
computer has not sent any additional segments; it is only receiving segments from the web server.
26. Scroll through the top capture window and select packet number 204 by clicking on it. Notice that
the protocol is once again HTTP. In the middle pane of the capture window, expand the + next to
[128 Reassembled TCP Segments. This shows all of the packets in the capture that it took to
transmit the picture from the web server to the client.
CONCLUSION:
There are two protocols in the TCP/IP suite that reside at the transport layer of the OSI model – TCP and
UDP. The TCP protocol is the transport layer protocol used by the HTTP protocol for reliable data transfer.
TCP uses a three-way handshake to initiate a conversation and then sequence and acknowledgment
numbers to keep segments in the correct order during transmission. Port numbers are used to differentiate
conversations.
DISCUSSION QUESTIONS:
1. In Segment Protocol Data Unit section, Step 2a, what is the source port for the conversation?
2. In Segment Protocol Data Unit section, Step 2b, what is the well-known port number for the HTTP
protocol?
3. Identify which flags are set in each segment of the three-way handshake. There are three segments.
4. The port number 49157 is known as this type of port because it is randomly generated when the
conversation is initiated.
5. The port number 80 is known as this type of port because it is assigned to the HTTP protocol by
IANA.
IPV4 HEADER
2. Notice the line Version. This describes the IP version in use for this packet. This line has only two
options: 4 or 6. In this example, we are using version 4.
IP VERSION
3. Notice the line Header length. This describes the length of the IP header only. In IPv4, this is usually
20 bytes as it is in this example.
HEADER LENGTH
4. The Differentiated Services Field can be used to specify certain Quality of Service parameters for a
packet. In this example, this field is not used and set to 0x00.
5. Notice the line Total Length. This describes the length of the IP header plus the length of the
segment passed down from the transport layer (in bytes). In this example, the total length of this
packet is 121 bytes.
IP TOTAL LENGTH
6. The Identification line is a 16-bit number used to uniquely identify the IP packet within the
conversation. In this example, the Identification number is 0x0391. The “0x” means that the number
being represented is actually in the hexadecimal format. The number in the parenthesis to the right
is that same hexadecimal number converted to decimal format.
IDENTIFICATION LINE
7. The Flags and Fragment offset lines go together. These fields control whether a router can fragment
an IP packet and indicate the parts of the packet to the receiver. In this example, the Don’t
Fragment flag is set and, as such, the Fragment offset is set to 0.
8. Notice the line Time to live. This number represents the number of hops (routers) that the packet
can go through on its way to the destination. Each router along the way will decrease this number
by one. If this number ever reaches “0” (typically due to a routing loop) the packet will be discarded.
In this example, the TTL is set to 127.
TIME TO LIVE
9. Notice the line Protocol. This field is used to indicate the transport layer protocol being carried by
the packet. Each protocol is identified by a number. In this example, the protocol in use is number 6,
or TCP. Another example is the UDP protocol represented by the number 17.
PROTOCOL
10. The Header checksum is used to verify that the header has not become corrupted or modified in
transfer. If the checksum is correct, the packet is accepted. If the checksum is incorrect, the packet
is discarded. IP is a connectionless protocol meaning that if it discards a packet, it does not ask for
the packet to be retransmitted. In this example, the checksum was calculated correctly.
HEADER CHECKSUM
11. Notice the lines Source and Destination. These represent the logical IP addresses of the client and
the server. In this example, the Source IP address is the web server (131.107.0.200) and the
Destination IP address is the client requesting the web page (192.168.12.11).
12. Take a moment to view the packet information within other captured frames. Notice that each of
them has the same basic structure.
OTHER CAPTURED FRAMES
CONCLUSION:
The network layer of the OSI model is responsible for logical addressing. IP is the major protocol of the
TCP/IP suite that resides at the network layer. Routers use IP addresses to forward packets to their
destination network.
DISCUSSION QUESTIONS:
1. What is the typical header length for the IP protocol?
2. What device decreases the TTL value whenever a packet traverses it?
3. What is the PDU associated with the network layer of the OSI model?
2. In the middle pane of the capture window, expand the + next to Ethernet II. This line describes the
layer 2 protocol that is used to encapsulate the IP packet and prepare the information to be
transmitted over the physical media.
ETHERNET II
3. Notice the lines Destination and Source. Ethernet uses the physical MAC addresses burned into the
NIC as the addresses at this layer.
4. The Destination address in this example is the MAC address of the client machine (look at the one in
parenthesis). The first 3 bytes of the MAC address represent the Organizationally Unique Identifier
(OUI). This is a number assigned by IEEE to identify the vendor of the NIC. Wireshark automatically
substitutes the vendor’s name for the first 3 bytes of the MAC address. The last 3 bytes of the MAC
address is essentially a serial number assigned to the NIC by the manufacturer.
DESTINATION ADDRESS
5. Here is an example of how it is possible to filter or change the MAC address of a client machine. MAC
adress filtering is used in some networks to control which end-user devices or computers can
connect to the network. Click on the Start button and type network in the search box. Then click
on Network and Sharing Center in the search results.
9. Click on the Advanced tab, then under Property: select Locally Administered Address.
12. Let’s take a moment to verify the MAC address for the client machine. Click on the Start button,
then click on the Command Prompt shortcut.
COMMAND PROMPT
13. In the Command Prompt window, type the command ipconfig /all and press Enter.
COMMAND PROMPT
14. Scroll up until you see the header Ethernet adapter Local Area Connection. Below this header,
locate the line Physical Address. You will notice that the destination MAC address matches the
Physical Address of this machine. In order for this machine to process a frame, the destination MAC
address must match the Physical Address or the frame will be ignored. Note that your MAC address
may vary based on your hardware.
PHYSICAL ADDRESS
15. Type exit and press Enter to close the Command Prompt.
16. The Source address in this example is the MAC address of the default gateway for this network. The
reason for this is because the data link layer information must be recreated by every router that
receives the frame. Since routers make their decision on where to move packets based upon IP
addresses, the data link layer information must be removed by the router so it can see the network
layer information. Routers simply create new data link layer information based upon the type of
network they will be sending the frame onto.
SOURCE ADDRESS
17. Notice the line Type. This line describes the network layer protocol that is being encapsulated by
this frame. In this example, the network layer protocol being used is IP. It is represented in the
frame in its hexadecimal format 0x0800.
TYPE
18. Take a moment to view the frame information within other captured frames. Notice that each of
them has the same basic structure. Can you find any frames that carry a different protocol type? An
example is frame 219, which carries the ARP protocol at layer 3 instead of IP.
FRAME 219
CONCLUSION:
The data link layer of the OSI model is responsible for physical addressing. Ethernet switches and hosts
use MAC addresses to move frames between nodes on the same network.
DISCUSSION QUESTIONS:
1. How long is a MAC address in bits?
2. How long is a MAC address in bytes?
3. What is the first half of a MAC address known as?
4. What command can be used on a Windows machine to view the MAC address?
Reviewing the Physical Layer
The physical layer of the OSI model incorporates all of the tangible network components such as cables,
connectors, and repeaters. The electronic signals on the media are also included in this layer. The
electronic signals make the 1’s and 0’s that physically represent the data on the media. The PDU
associated with the physical layer of the OSI model is simply bits.
PHYSICAL FRAME
2. Locate the line Destination under the Ethernet II heading and click on it. Wireshark highlights the
Destination MAC address of the frame within the hexadecimal data. Notice how the numbers
actually match.
DESTINATION MAC ADDRESS
3. Locate the line Source under the Ethernet II heading and click on it. Wireshark highlights the
Source MAC address of the frame within the hexadecimal data.
4. Locate the line Source under the Internet Protocol Version 4 heading and click on it. Wireshark
highlights the Source IP address of the packet within the hexadecimal data. Notice that these
numbers do not match exactly. This is because the IP address you are used to seeing is represented
in decimal format; the raw data is represented in hexadecimal format. Each octet has been
converted separately. In this example, 131.107.0.200 is represented as 83 6b 00 c8.
SOURCE IP ADDRESS
5. Locate the line Destination under the Internet Protocol Version 4 heading. Wireshark highlights the
Destination IP address of the packet within the hexadecimal data. In this example, 192.168.12.11 is
represented as c0 a8 0c 0b.
DESTINATION IP ADDRESS
6. Take a moment to view some of the other information in its raw format. Keep in mind that some of
the values may already be in their hexadecimal format while others may not.
OTHER INFORMATION – RAW FORMAT
7. Close the Lab_01 file by clicking the X in the top right hand pane of Wireshark.
CLOSE FILE
FILTER
Notice the flag of 999818. Click on the Challenge icon and type the flag number into the answer box.
This is just to show you how to capture Challenge Flags you will see throughout this lab.
Challenge Sample #
7. In the filter pane, type dns and frame contains flag2
FILTER
Challenge #
7. In the filter pane, type dns and frame contains flag3
FILTER
Challenge #
7. In the filter pane, type udp and tftp.block. Right click on the first frame and select follow
UDP Stream
FILTER
Challenge #
7. In the filter pane, type ftp.
FILTER
Challenge #
7. In the filter pane, type http and frame contains flag6. Right click on the first frame
and select follow TCP Stream. Scroll down until you see the flag.
FILTER
Challenge #
CONCLUSION:
The physical layer of the OSI model incorporates all of the tangible network components. This includes the
electronic signals on the media that are used to represent the 1’s and 0’s that, in turn, make up the data
you requested.
DISCUSSION QUESTIONS:
1. What is the PDU associated with the physical layer of the OSI model?
2. True or false—a bad cable is considered a physical layer issue.
3. True or false—a misconfigured IP address is considered a physical layer issue.
References:
Organization: Stanly Community College
The development of this document is funded by the Department of Labor (DOL) Trade Adjustment
Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48. The
National Information Security, Geospatial Technologies Consortium (NISGTC) is an entity of Collin College
of Texas, Bellevue College of Washington, Bunker Hill Community College of Massachusetts, Del Mar
College of Texas, Moraine Valley Community College of Illinois, Rio Salado College of Arizona, and Salt Lake
Community College of Utah. This work is licensed under the Creative Commons Attribution 3.0 Unported
License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to
Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA.