In this lab we used the software Wireshark to capture and examine packets being sent and recieved on our computers.
http://www.wireshark.org/
The first packet we examined was a packet using TCP protocol
The source port for this packet was Port 80 which is used for http.
The destination port was 49340 which is a dynamic or private port number.
The flag being used was 0x18 (PSH, ACK). PSH bit is a push flag that tells the TCP to send any outstanding data. The ACK bit acknowledges the remote host's sequence numbers and validates the information in the acknowledgement.
The source IP address is 69.63.178.143 and the destination IP address is 10.40.1.107. My computer's IP address is 10.40.1.107 so this is an incoming packet to my computer.
The TTL (Time to Live) for this packet is 82. When this counts down to 0 the packet will be discarded.
Differentiated Services is a class-based mechanism for traffic control where the data packets are sorted by traffic classes instead of individual flow. The Differentiated Services Field for this packet was 0x00 (DSCP 0x00: Default; ECN: 0x00) I found a lot of references to this value but did not find out exactly what it stands for. The Differentiated Services Field has an eight bit number with bits 0-5 being for the value and bits 6 and 7 are reserved.
The protocol field is set to TCP which set the transmission layer protocol. The Header checksum was listed as correct. The framing type used was 22. The source MAC address was Cisco_ee:9b:ff (00:04:c0:ee:9b:ff) and the destination MAC address was Intel_31:68:a3 (00:19:d1:31:68:a3). The destination MAC address is my computer. The frame is incoming. There were 239 bytes on wire and 239 bytes captured.
Now we will look at a packet using UDP protocol

The source port is 58807 which is a dynamic or private port. The destination port is 53 which is the Domain Name System port. The Flag value is 0x00. The source IP address is 10.40.1.119 and the destination IP address is 10.40.1.6. This is an outgoing packet from my computer. The TTL for this packet is 128. If the packet is not delivered before the value counts to 0 then the packet will be discarded. The header checksum is correct. The framing type is 7 and the source MAC address is Intel_31:d4:bd (00:19:d1:31:d4:bd) and the Destination MAC address is DellPcba_d6:73:93 (00:0d:56:d6:73:93). This is an outgoing packet from my computer. This Frame contained 82 bytes on wire, and 82 bytes captured.
This is an example of a three-way handshake.

First there is an SYN segment send from 192.168.1.102 to 128.119.245.12. Then there is a
SYN ACK segment send from 128.119.245.12 to 192.162.1.102. Then the third handshake is an ACK segment sent from 192.168.1.102 to 128.116.245.12.
This is an example of an ARP packet interception

The destination MAC address is ff:ff:ff:ff:ff:ff. This is the broadcast address. The source MAC address is 00:d0:59:a9:3d:68. This is the address sending out the broadcast. The destination IP address is 192.168.1.1. This is the IP address the broadcast is looking for. The source IP address is 192.168.1.105. This is the IP address that is sending the request out.
I found this interesting that with ARP you can send out a broadcast to locate a MAC address from an IP address. In the example the host computer send out a request to locate the MAC for IP address 192.168.1.1. Then the answer was sent back that 192.167.1.1 was located at MAC address 00:06:25:da:af.
This lab was very informative and educational. It was great to be able to look at these packets and start to make sense of what we were looking at. The fog of understanding the workings of a computer are starting to thin a little. It is still fasinating to see what happens in computers and to understand as what speed it happens. I really enjoyed this lab and will continue to use wireshark on my own to explore and understand more from packets in the future.