Skip to main content

ARP Message Format

ARP Message Format
Address resolution using ARP is accomplished through the exchange of messages between the source device seeking to perform the resolution, and the destination device that responds to it. As with other protocols, a special message format is used containing the information required for each step of the resolution process.
ARP messages use a relatively simple format. It includes a field describing the type of message (its operational code or opcode) and information on both layer two and layer three addresses. In order to support addresses that may be of varying length, the format specifies the type of protocol used at both layer two and layer three and the length of addresses used at each of these layers. It then includes space for all four of the address combinations we saw in the previous topic.
The format used for ARP messages is described fully in Table 42, and illustrated in Figure 49.

Table 42: Address Resolution Protocol (ARP) Message Format
Field Name
Size (bytes)
Description
HRD
2

PRO
2
Protocol Type: This field is the complement of the Hardware Type field, specifying the type of layer three addresses used in the message. For IPv4 addresses, this value is 2048 (0800 hex), which corresponds to the EtherType code for the Internet Protocol.
HLN
1
Hardware Address Length: Specifies how long hardware addresses are in this message. For Ethernet or other networks using IEEE 802 MAC addresses, the value is 6.
PLN
1
Protocol Address Length: Again, the complement of the preceding field; specifies how long protocol (layer three) addresses are in this message. For IP(v4) addresses this value is of course 4.
OP
2

SHA
(Variable, equals value in HLNfield)
Sender Hardware Address: The hardware (layer two) address of the device sending this message (which is the IP datagram source device on a request, and the IP datagram destination on a reply, as discussed in the topic on ARP operation).
SPA
(Variable, equals value in PLNfield)
Sender Protocol Address: The IP address of the device sending this message.
THA
(Variable, equals value in HLNfield)
Target Hardware Address: The hardware (layer two) address of the device this message is being sent to. This is the IP datagram destination device on a request, and the IP datagram source on a reply)
TPA
(Variable, equals value in PLNfield)
Target Protocol Address: The IP address of the device this message is being sent to.

Comments

Unknown said…
Hi Fazil,

Jeez oh man, while I applaud for your writing, it’s just so damn straight to the point ARP Message Format.

I have a net book Samsung N150plus, and sometimes I’m having problems with google that crashes and close, even is a bit slow as I’m going to a 2gb ram also, I had re installed it several times but someone told me to install a Linux software on my net book,
can I? Are there any disadvantages?
In that case your server will be in unbootable state. Your Server can’t boot without /boot directory because this directory contains all bootable files.
Please keep providing such valuable information.

Obrigado,
Kevin

Popular posts from this blog

VPN Interview Questions and Answers

What is VPN? Virtual Private Network (VPN) creates a secure network connection over a public network such as the internet. It allows devices to exchange data through a secure virtual tunnel. It uses a combination of security features like encryption, authentication, tunneling protocols, and data integrity to provide secure communication between participating peers. What is Authentication, Confidentiality & Integrity? Authentication - Verifies that the packet received is actually from the claimed sender. It verifies the authenticity of sender. Pre-shared Key, Digital Certificate are some methods that can be used for authentication. Integrity - Ensures that the contents of the packet has not been altered in between by man-in-middle. Hashing Algorithm includes MD5, SHA. Confidentiality - Encrypts the message content through encryption so that data is not disclosed to unauthorized parties. Encryption algorithms include DES (Data Encryption Standard), 3DES (Triple-DES), AES (Ad...

Network Security Interview Question (Basic + Advanced)

What is FW Monitor? Check Point's FW Monitor is a powerful built-in tool for capturing network traffic at the packet level. The FW Monitor utility captures network packets at multiple capture points along the FireWall inspection chains. These captured packets can be inspected later using the WireShark. What is HSRP Cisco? In computer networking, the Hot Standby Router Protocol (HSRP) is a Ciscoproprietary redundancy protocol for establishing a fault-tolerant default gateway How does HSRP work? “HSRP is a redundancy protocol developed by Cisco to provide gateway redundancy without any additional configuration on the end devices in the subnet. With HSRP configured between a set of routers, they work in concert to present the appearance of a single virtual router to the hosts on the LAN. What is the trace route? Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified desti...

GOOGLE WEB DESIGNER ASSESSMENT

D 1. What does Google Web Designer offer HTML5 coders in particular?       HTML5 syntax highlighting and autocompletion     A code sample library     See tips from award-winning graphic designers     Target ads to specific browsers D 2. What does Google Web Designer help beginners do?      Build creatives without HTML5 coding skills     Learn HTML5 from experts     Consult award-winning graphic designers     Test ads on different browsers simultaneously A 3. How can you move an element in Quick mode animation?       By adding a scene and moving the element where desired     By selecting the element you want to move in the timeline and setting an event marker     By moving the element on the stage and clicking the play button at the top of the animation timeline     By selecting the keyframe in the transition editor The correc...