To open up the day15.ethereal file: 1. cd 2. cd common 3. xhost + 4. sudo ethereal day15.ethereal You will need to carefully examine different captured packets to answer these questions. You will also want to do some filtering, unless you want to wade through way more packets than necessary. Answer the following questions: 1. How many arp requests were there? 2. What were the MAC addresses for all of the ARP replies? You may give these in hexadecimal (leave them in hexadecimal, as they are shown by ethereal). 3. How many get requests were there (for the HTTP protocol packets)? 4. What host or hosts were contacted to get http files from? 5. Write down a table showing ALL of the port numbers involved in the TCP protocol for all of the HTTP get requests. Write the port number and the host IP for the server. The client computer was drone-21, which will always be 192.168.10.121 for the drone-21 machine in the front row. 6. Filtering for TCP protocol will show all of the three-way handshakes used to establish a connection. Recall [SYN] [SYN,ACK] [ACK} Add a new column to the table you made in answer to question 5 to indicate whether a 3-way handshake was used to establish a connection for the GET request to the given web server host or not.