Wireless Local Area Networks
|
|
- Jemima Barrett
- 7 years ago
- Views:
Transcription
1 Wireless Local Area Networks Experiments for Bachelor Students of Mobile Communication Networks Course Dr.-Ing. Florian Evers & Prof. Dr.-Ing. habil. Andreas Mitschele-Thiel Integrated Communication Systems Faculty of Computer Science and Automation Ilmenau University of Technology
2
3 Contents 1. Introduction Test Set-up Gentoo Linux Network Topology IP-Addresses Netmasks Homework: Preparation 9 4. Experiments Building the Network Router Backbone Router Server Subnet Router Access Points Access Point Access Point Sniffing and Traffic Monitoring Traffic Capturing Traffic Filtering Display Filters Capture Filters Configure Cisco Aironet Web Interface Home Network Associations Setup Configuration IP and ESSID Default Gateway Radio Channel and Transmit Power WEP Abbreviations 29 Contact 33 A. Handouts 35 A.1. Handout: Network topology
4 4 A.2. Handout: IP addresses and netmasks A.3. Handout: Linux Commands
5 1. Introduction Wireless technologies are available since decades ago. One of the popular networks is the Wireless Local Area Network (WLAN). Main reasons for the popularity of WLAN are the always reduced cost of hardware and the ability of WLAN to be quick installed and configured in addition to the services that can be offered using such networks. The fact that WLAN is only suitable for indoor environments has resulted in deploying these networks in companies, airports, hospitals, etc. Thus, it is useful to provide students with knowledge on how to build and configure a WLAN, which is the purpose of these experiments. The rest of this document is structured as follows: chapter 2 provides the network topology of the experiment. In chapter 3 some tasks are given, which should be done before the experiment. Chapter 4 goes through the experiments that should be done step by step. How to configure the access points, used in these experiments, is provided in chapter Test Set-up The test set-up consists of one mobile node, two access points and four computers connected to a Keyboard Video Mouse (KVM) switch. With the help of the KVM switch, you can use one keyboard, mouse and monitor for all four computers. All network cables required for the experiment are already connected. Table 1.1.: KVM layout Port Computer 1 Server 2 Backbone Router 3 Router 4 Subnet Router 1.2. Gentoo Linux The operating system on all computers and the mobile node is Gentoo Linux. To configure the network you will work on the Unix-Shell. Each entered command will be saved in a command history and can be recalled with the help of the arrow up and down keys on the keyboard. If you want to abort a running command, press CTRL-C. 5
6
7 2. Network Topology Figure 2.1 shows the network topology of the experiments. The network is hierarchically structured and can be assumed as a simple structure of a part of the Internet. As the figure shows, the network consists of a server, a backbone router, a router, a subnet router and two access points. The Internet Protocol (IP) addresses and netmasks of the network nodes according the figure. On all computers the network interface eth0 is used for the Internet connection, but is not used in the experiment. Server eth1: /30 Backbone Router eth1: /30 eth2: /30 Router eth1: /30 eth2: /16 eth3: /30 Subnet Router eth1: /30 eth2: /24 Access Point 1 IP: /24 Access Point 2 IP: /16 Mobile Node IP 1: /24 IP 2: DHCP Backbone Router eth1 eth / /12 Server Router eth1 eth1 eth3 eth2 Subnet Router / /16 Access Point 2 eth1 Access Point 1 eth /24 Mobile Node Figure 2.1.: Network topology of the experiments Access point 1 works on channel 5, transmits with 20mW power and has Extended Service Set Identifier (ESSID) set to IKS WLAN AP1, while access point 2 operates on channel 11, sends with 5mW and has ESSID set to IKS WLAN AP2. The target is to configure the network provided in the figure 2.1, so that the mobile node can communicate with the server, which represents the Internet as it runs a web server. 7
8 2.1. IP-Addresses The IP addresses used in this experiment are free to use for private networks. The Internet Assigned Numbers Authority (IANA) defined 3 address ranges for private networks: Table 2.1.: IP addresses for private networks [ipa11] address range CIDR # addresses to / = to / = to / = In this practical course, IP addresses of the range /8 are used Netmasks A netmask is a bitmask, for the network protcol IPv4, that describes how many bits from the beginning of the IP address are used for the netprefix. A netmask has a length of 32 bit. All bits of the network part are set to 1, and all remaining bits of the host part are set to 0. A short notation of the netmask is the Classless Inter-Domain Routing (CIDR) notation, where the number of continious 1 bits from the left is counted. Table 2.2.: netmask examples [net11] CIDR netmask binary netmask # addresses / / / / / /
9 3. Homework: Preparation eth1 eth1 eth2 eth / /8 Computer Router Server Figure 3.1.: Network topology Complete the following table with the help of figure 3.1. Some fields may not be necessary. System: Computer interface eth1: /24 route default route IP forwarding System: Router interface route eth1: eth2: default route IP forwarding System: Server interface eth1: /30 route /8 gateway default route IP forwarding no 9
10 Table 3.1.: Sample routing table # Destination Gateway Genmask Interface eth eth eth eth eth1 Table 3.1 shows the routing table of a computer. The computer receives packets for another computer. Which entry of the routing table will be used, if the packet should be forwarded to: , , , , ? Inform yourself about the structure of Internet Control Message Protocol (ICMP), Network Time Protocol (NTP) and Hypertext Transfer Protocol (HTTP). How ping packets differ from other ICMP packets? Which transport protocol and port is used by NTP? Which transport protocol and port is used by HTTP? 10
11 4. Experiments The interfaces in all network nodes are not configured yet. First you have to configure the interfaces and assign the correct IP adresses. Afterwards you have to construct suitable routing tables in the network nodes, so that each node can reach all nodes connected directly to it. The next step is to activate IP forwarding, so each node can reach all other nodes in the network. IP forwarding enables the packet transfer between all network interfaces of one computer. The following steps help you. Remember, all steps are just explained once, the procedure for the other computers is analog Building the Network Turn on all computers and the mobile node. username: praktikum password: praktikum Router i. Type ifconfig -a. How many interfaces can you see? Which interfaces are already active? ii. The network interface eth1 is not configured. Use ifconfig eth /30 to configure the interface for the transit network. iii. The interface eth2 is already configured, because the router runs a Dynamic Host Configuration Protocol (DHCP) server on it. Configure interface eth3 according to eth1. iv. Type ifconfig. What do you see now? v. Type route add default gw This command adds interface eth2 of the backbone router as default gateway for the router. If the router does not know where to forward a packet, it will send the packet to the defined gateway. vi. Type route add -net /16 gw , to add a route from eth1 to the interface of the subnet router. Notice that the server is directly connected to the router. vii. If you want to check, whether the routing table is built correctly, type route -n. Interpret what you see. 11
12 viii. Type nano /proc/sys/net/ipv4/ip forward. To enable IP forwarding, replace 0 with 1, save (CTRL-O) the file and exit (CTRL-X) nano Backbone Router i. Configure the network interfaces to the following addresses: /30 (eth1) and /30 (eth2). ii. Add a route from the backbone router to the server and the router. iii. If a default gateway is necessary, add one. iv. Check, whether the routing table is built correctly. v. Type ping c 4. If everything is configured correct, you should obtain four replies from the interface. vi. Don t forget to enable IP forwarding Server i. The network interface eth1 is not yet configured. Configure it to /30. ii. Add a route, from eth1 to the backbone router. iii. Add the backbone router as default gateway for the server. iv. Is there a need of step ii and step iii, or is one of them enough? In case one is enough, which one would you choose? Discuss by looking at the routing table. v. Ping the backbone router ( ). If everything is configured correctly, you should obtain a reply from the interface. vi. Is IP forwarding necessary for the server? Why or why not? Subnet Router i. Configure the network interfaces and create corresponding routing tables. ii. If a error message appears, explain it. How to fix the error? iii. Test the network with the help of the ping command. ( ). iv. Enable IP forwarding if necessary. Especially ping the server 12
13 Access Points The next step is to configure the access points. If you turn on the access points for the first time, the default settings are loaded. If no DHCP server is connected to the access point, the IP address is set to /24. On default ESSID is set to tsunami and the access point transmits on channel 7. Use the mobile node to configure the access points. Configure them one after another, to avoid confusion. Which access point is connected to a DHCP server? Access Point 1 i. Change the IP address of the interface wlan0 to the following address /24. ii. Take care that only one access point 1 is powered. iii. With the command iwconfig wlan0 essid tsunami you can connect the mobile node to the access point. iv. Type iwconfig and check if you are connected. v. Send ping packets to the access point. vi. Type konqueror, to open the webbrowser, and access vii. You have to configure the IP address, network mask, default gateway, ESSID, working channel and sending power of the access point. Reflect about the order of the changes. Maybe you have to reconnect to the accesspoint after some changes. Read chapter 5 at page 19 if you need some help for configuration. viii. Configure the interface wlan0 to the following IP address: /24 and add access point 1 as default gateway. ix. Connect the mobile node to the access point IKS WLAN AP1. x. If everything is configured correct, you should be able to ping the server Access Point 2 i. At first plug in access point 2. ii. Deactivate the interface wlan0 to delete the IP address and the default gateway with the help of ifconfig wlan0 down. iii. Type ifconfig wlan0 up to reactivate the interface. iv. Type iwlist scan wlan0 to scan for visible accesspoints and analyze the output. v. Connect the mobile node to the access point tsunami vi. Check if you are connected. vii. Type dhcpcd wlan0. Now you get your IP address, netmask and default gateway from the DHCP server. viii. Open Konqueror and access 13
14 ix. You have to configure ESSID, working channel and sending power of the access point. Maybe you have to reconnect to the accesspoint after some changes. x. Connect the mobile node to the access point IKS WLAN AP2. xi. Scan for visible accesspoints and analyze the output. What has changed? xii. If everything is configured correct, you should be able to ping the server. 14
15 4.2. Sniffing and Traffic Monitoring Packet sniffers are capable to capture network traffic, decoding packet contents and presenting them in readable way. Sniffers are used to monitor network traffic and debug errors in the network operation. This experiment provides an insight into how to use such sniffers to monitor, filter and analyze network traffic. The packet sniffer used in this experiment is wireshark ( Traffic Capturing Start wireshark on the mobile node by typing wireshark on the command line. Click on Capture Interface, to open the Capture Interfaces window. This window shows all interfaces that wireshark has detected. Click on the Start button, responsible to your wireless interface, to start capturing packets. i. Wait about one minute. Which protocols do you see? ii. Which IP addresses do you find in the current trace file? iii. Wireshark provides you with lots of informations about the captured packets. Which kind of informations can you obtain? iv. Send ping packets from the mobile node to the server. v. Monitor the ping packets in wireshark and notice their content and delay Traffic Filtering For effective traffic monitoring, traffic should be filtered, so only traffic matching the filter will be presented. The next steps should give you an insight into how to create and use traffic filters Display Filters i. Send ping packets from the mobile node to the server. ii. Create a filter to present only the packets sent by the server to the interface of your mobile node or reverse (Filter: ip.addr == ). What do you see? 15
16 iii. You can extend the filter, to show only traffic of a certain protocol. For example, ping packets are sent, using ICMP. If we are interested in this traffic only, we have to use an adequate filter (Filter: ip.addr == && icmp ). iv. Now delete the filter to show all packets. Notice the types of packets you receive. Write filters to show the traffic of each protocol for itself. v. Access in your browser and repeat step iv Capture Filters In contrast to display filters, which capture all packets and present them matching certain rules, capture filters affect the capturing of packets themselves. Only packets matching the given filter will be captured. The basic syntax of capture filters in wireshark is the following: [not] primitive [and or [not] primitive...] 16
17 Table 4.1.: Some primitives available in wireshark [wir11] Command Task [src dest] host <ip address> This primitive allows you to filter on a host IP address or name. You can optionally precede the primitive with the keyword src dst to specify that you are only interested in source or destination addresses. ether [src dst] host <ehost> This primitive allows you to filter on Ethernet host addresses. You can optionally include the keyword src dst between the keywords ether and host to specify that you are only interested in source or destination addresses. gateway host <host> This primitive allows you to filter on packets that used host as a gateway. That is, where the Ethernet source or destination was host but neither the source nor destination IP address was host. [tcp udp] [src dst] port <port> This primitive allows you to filter on TCP and UDP port numbers. You can optionally precede this primitive with the keywords src dst and tcp udp which allow you to specify that you are only interested in source or destination ports and TCP or UDP packets respectively. The keywords tcp udp must appear before src dst. less greater <length> This primitive allows you to filter on packets whose length was less than or equal to the specified length, or greater than or equal to the specified length, respectively. ether ip broadcast multicast This primitive allows you to filter on either Ethernet or IP broadcasts or multicasts. Table 4.2.: Operators for primitives in wireshark [wir11] Operator Meaning!, not logical NOT-operation &&, and logical AND-operation, or logical OR-operation & bitwise AND-operation 17
18 You can access and check the content of packets with the help of the capture filters. The basic syntax is: protocol[<offset in bytes from the beginning of the header>:<number of bytes>] Table 4.3.: Examples for filter expressions checking the contents of packets [wir11] Filter Result ip[8] = 1 Filters IP packets, where the byte number 8 (TTL) equals 1. tcp[0:2] = 22 Filters TCP packets, where the value of the first two bytes of TCP header (port number) equals 22. Notice that the <number of bytes> in the basic syntax can be 1, 2 or 4. If you do not give any number, this value will be 1. If you want to use a capture filter, you have to stop capturing first. Next step is to click Capture Interface. Before you can restart capturing, you have to click Options responsible to your wireless interface. Enter your filter behind Capture Filter: and press Start. Now practice your knowledge about filtering. i. Access in Konqueror. ii. Write a filter that captures all packets with Time to Live (TTL) greater than 63. iii. Ping the server to test the filter. What can you see? iv. Write a filter that captures all HTTP traffic. v. Test the filter by accessing the server in Konqueror. vi. Write a filter that captures all NTP traffic sent from the mobile node. Reflect which protocol and port is used by NTP. vii. Write a filter that captures all ICMP packets, but no ping ones. Reflect the structure of the ICMP header. 18
19 5. Configure Cisco Aironet Web Interface Home Figure 5.1 shows the Home page, that displays the status of the access point. There you can see informations about the number of radio devices associated, the status of the Ethernet as well as the radio interface and a list of recent events. Also, this page shows information about IP and Media Access Control (MAC) addresses of both interfaces. Figure 5.1.: Summary Status 19
20 Network Figure 5.2 shows the Network page. It displays the status and statistics for the Ethernet and radio interfaces. Figure 5.2.: Network Ports 20
21 Associations The Associations page displays a list of all devices in your WLAN. It lists their system names, network roles, and parent-client relationships. Figure 5.3 presents a screenshot of the page. Figure 5.3.: Association Table 21
22 Setup The Setup page is shown in Figure 5.4. It contains links for configure associations, event log, services and network ports. Section 5.2 gives you a insight in some of the configurations. Figure 5.4.: Setup 22
23 5.2. Configuration IP and ESSID Click on the link Identification behind AP Radio: Internal on the Setup page. Here you can configure the IP address, network mask and ESSID of the radio interface. Figure 5.5.: AP Radio: Internal Identification 23
24 Figure 5.6 shows the Ethernet Identifaction page. Here you can configure the IP address and network mask of the Ethernet interface. You get to the page with the link Identification behind Ethernet on the Setup page. Figure 5.6.: Ethernet Identification 24
25 Default Gateway Click on the link Routing on the Setup page. Figure 5.7 shows the page that appears. Here you can define the default gateway for the access point. Figure 5.7.: Routing Setup 25
26 Radio Channel and Transmit Power Click on the link Hardware behind AP Radio: Internal on the Setup page. Next to many other configurations, you can set up the transmission power and the radio channel here. Figure 5.8.: AP Radio: Internal Hardware 26
27 WEP If you follow the link Radio Data Encryption (WEP) on the page shown on figure 5.8, you can define a Wired Equivalent Privacy (WEP) encryption key for the radio interface. Figure 5.9.: AP Radio: Internal Data Encryption 27
28
29 Abbreviations CIDR DHCP ESSID HTTP IANA ICMP IP KVM MAC NTP TCP TTL UDP WEP WLAN Classless Inter-Domain Routing Dynamic Host Configuration Protocol Extended Service Set Identifier Hypertext Transfer Protocol Internet Assigned Numbers Authority Internet Control Message Protocol Internet Protocol Keyboard Video Mouse Media Access Control Network Time Protocol Transmission Control Protocol Time to Live User Datagram Protocol Wired Equivalent Privacy Wireless Local Area Network 29
30
31 Bibliography [air11] Cisco Aironet 1200 Series Access Point Installation and Configuration Guide. ConfigurationGuide.pdf, last accessed 12. July 2011 [gen11] Gentoo Linux x86 Handbook. handbook-x86.xml, last accessed 12. July 2011 [htt11] Hypertext Transfer Protocol. last accessed 12. July 2011 [icm11] Internet Control Message Protocol. Control_Message_Protocol, last accessed 12. July 2011 [ipa11] Private IP address. last accessed 12. July 2011 [ipf11] IP forwarding. last accessed 12. July 2011 [net11] Netmask. last accessed 12. July 2011 [ntp11] Network Time Protocol. Protocol, last accessed 12. July 2011 [rou11a] Routing. last accessed 12. July 2011 [rou11b] Routing table. last accessed 12. July 2011 [wir11] Wireshark Documentation. last accessed 12. July
32
33 Contact 33
34
35 A. Handouts A.1. Handout: Network topology Server eth1: /30 Backbone Router eth1: /30 eth2: /30 Router eth1: /30 eth2: /16 eth3: /30 Subnet Router eth1: /30 eth2: /24 Access Point 1 IP: /24 Access Point 2 IP: /16 Mobile Node IP 1: /24 IP 2: DHCP Backbone Router eth1 eth / /12 Server Router eth1 eth1 eth3 eth2 Subnet Router / /16 Access Point 2 eth1 Access Point 1 eth /24 Mobile Node Figure A.1.: Network topology of the experiments
36
37 A.2. Handout: IP addresses and netmasks Table A.1.: IP addresses for private networks [ipa11] address range CIDR # addresses to / = to / = to / = Table A.2.: netmask examples [net11] CIDR netmask binary netmask # addresses / / / / / /
38
39 A.3. Handout: Linux Commands dhcpcd wlan0 Receive IP address, netmask and default gateway for interface wlan0 from the DHCP server. ifconfig Display informations about all active network interfaces. ifconfig -a Display informations about all network interfaces, active or inactive. ifconfig eth /30 Assign IP address and netmask to interface eth0. ifconfig wlan0 down Deactivate interface wlan0 if it is not already inactive. ifconfig wlan0 up Activate interface wlan0 if it is not already active. iwconfig Display informations about all wireless network interfaces. iwconfig wlan0 essid tsunami Connect the interface wlan0 to the accesspoint with ESSID tsunmai. iwlist scan wlan0 Scan for visible access points seen by interface wlan0. konqueror Open the webbrowser konqueror. nano /proc/sys/net/ipv4/ip forward Open the file /proc/sys/net/ipv4/ip forward to edit it. ping c 4 Ping the host four times to see if it can be reached. route -n Show the routing table for all interfaces. route add -net /16 gw Add a route for the network /16 via gateway route add default gw Add the IP address as default gateway. route del -net /16 gw Delete the route for the network /16 via gateway route del default gw Delete the IP address as default gateway. wireshark Open the network analyzer wireshark.
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More informationUnix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
More informationIP Address: the per-network unique identifier used to find you on a network
Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationComputer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1
More informationIntroduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
More informationChapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
More informationICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008
More informationIntroduction on Low level Network tools
Georges Da Costa dacosta@irit.fr http: //www.irit.fr/~georges.da-costa/cours/addis/ 1 Introduction 2 Aircrack-ng 3 Wireshark Low level tools Hacking tools Aircrack-ng (ex Aircrack, ex Airsnort) WEP/WPA
More informationThe following sections describe the Gateway configuration pages in the SBG1000 Setup Program.
Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP
More information1:1 NAT in ZeroShell. Requirements. Overview. Network Setup
1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already
More informationCCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
More informationADSL Router Quick Installation Guide Revised, edited and illustrated by Neo
ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the
More informationLab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
More informationQuick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.
Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...
More informationCisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
More informationCONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
More informationSavvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking
More informationComputer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
More informationTHE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationNetworking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationPractical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
More informationCS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationOSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
More informationConfiguring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
More informationNBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012
NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com
More informationRaritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
More informationInstructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Yung-Chih Chen University of Massachusetts Amherst Department of Computer Science 1 Reminders 2 Reminders Assignment
More informationTCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationEKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
More informationLab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
More informationSchool of Information Science (IS 2935 Introduction to Computer Security, 2003)
Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack
More informationNetwork Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
More informationUser guide for NANOSTATION 2
User guide for NANOSTATION 2 1. Connecting hardware. Connecting your Nanostation 2 to your network is very easy, as it s using the POE (Power Over Ethernet) technology. For this you will need two direct
More informationBR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01
BR-800 ProHD Broadcaster Easy Set-Up Guide V 1.01 BR-800 EASY SET-UP GUIDE BEFOREYOUBEGIN! Pleasedeterminethetypeofconfigurationbyselectingthescenariothatbest describesthewayyouwillbeusingyourbr-800prohdbroadcaster.onceyouhavedeterminedyour
More informationLab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
More information108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL
108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL Contents 1. Overview...1 1.1 Product Feature...1 1.2 System Requirements...1 1.3 Applications...1 2. Getting Start...2 2.1 Know the 108Mbps Wireless
More informationImplementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More information- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
More informationSample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationPreparing the Computers for TCP/IP Networking
Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationPART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
More informationIssue 1 April 2, 2009 Using the VT2442 Web User Interface
Using the VT2442 Web User Interface View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. 1 Table of Contents Introduction to the Web UI... 3 Home Page... 4 Setup... 7 WAN Configuration...
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationUIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
More informationMITM Man in the Middle
MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi
More informationIP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
More information101 Application Delivery Fundamentals
CERTIFIED F5 STUDY GUIDE Eric Mitchell Channel SE, East US and Federal F5 Networks Contents Overview 4 Printed References 4 Section 1 - OSI 5 Objective - 1.01 Explain, compare, and contrast the OSI layers
More informationLevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router
LevelOne WBR-3405TX 11g Wireless AP Router User`s Manual Contents 1. Overview...4 1.1 Product Feature...4 1.2 System Requirements...4 1.3 Applications...4 2. Getting Start...5 2.1 Know the 11g Wireless
More informationChapter 3 Using Access Control Lists (ACLs)
Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol
More informationChapter 11 Network Address Translation
Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses
More informationASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide
ASUS WL-5XX Series Wireless Router Internet Configuration User s Guide Contents Chapter 1 Introduction:...1 Chapter 2 Connecting the wireless router...1 Chapter 3 Getting to know your Internet connection
More informationBroadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationWireshark Tutorial INTRODUCTION
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation
More informationPacket Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
More informationLab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
More informationNokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationArduino Wifi shield And reciever. 5V adapter. Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the shield:
the following parts are needed to test the unit: Arduino UNO R3 Arduino Wifi shield And reciever 5V adapter Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the
More informationDCB Ethernet Tunnel Family Configuration Guide
DCB Ethernet Tunnel Family Configuration Guide Introduction Thank you for your purchase of the DCB Ethernet Tunnel. This guide will step you through a typical installation as shown in the following diagram.
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationConfiguring the PIX Firewall with PDM
Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure
More informationFuture Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
More informationNetworking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationIP Filter/Firewall Setup
IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from
More informationThe Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
More informationDeployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
More informationKvaser BlackBird Getting Started Guide
Kvaser BlackBird Getting Started Guide Copyright 2007-2011 Kvaser AB, Mölndal, Sweden http://www.kvaser.com Last updated Wednesday, 18 September 2013 We believe that the information contained herein was
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
More informationIS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos
0215 IS SERIES IP Network Direct System QuikStart Programming Guide 1 4 GHI 2 ABC 5 JKL 3 DEF 6 MNO PRIVACY TRANSFER LIST SETTING 7 PQRS 8 TUV 9 WXYZ ZOOM 0 # WIDE Programming Videos ATTENTION: This is
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationnetkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)
netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description silvia.filippi@kaskonetworks.it http://www.kaksonetworks.it/ A lab showing
More informationZyAIR B-4000. Hot Spot Gateway. Quick Installation Guide Version 1.04 March 2004
Hot Spot Gateway Quick Installation Guide Version 1.04 March 2004 Table of Contents 1 Introducing the ZyAIR... 3 1.1 Rear Panel Connections... 3 1.2 The Front Panel LEDs... 3 1.3 Factory Defaults... 4
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationPacket Sniffing with Wireshark and Tcpdump
Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security
More informationD-Link DAP-1360 Repeater Mode Configuration
D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter
More informationSample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
More information1.0 Basic Principles of TCP/IP Network Communications
Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems
More informationConfiguring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
More informationSubnetting,Supernetting, VLSM & CIDR
Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space
More information