Prepared By: Eng. Wasan Fraihat

Size: px
Start display at page:

Download "Prepared By: Eng. Wasan Fraihat"

Transcription

1 Objectives Taibah University College of Computer Science & Eng. Computer Engineering Department Computer Networks Laboratory CN332 Lab. 1 Cabling & Packet Sniffing Prepared By: Eng. Wasan Fraihat 1. To become familiar with the different types of cables used in the lab. 2. To become familiar with cable tester equipment 3. To become familiar with the WIRESHARK packet sniffer software package. Pre-lab Preparation: 1. Read thoroughly and prepare the experiment sheet. 2. Review the sections in the book regarding HTTP communications. 3. Review the Ethernet frame format, the IPv4 packet format and the TCP/UDP segment formats. 4. You must bring a printed copy of this experiment with you to the lab. Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Cabling Choosing the cables necessary to make a successful LAN or WAN connection requires consideration of the different media types. There are many different Physical layer implementations that support multiple media types. UTP cabling connections are specified by the Electronics Industry Alliance/Telecommunications Industry Association (EIA/TIA). The RJ-45 connector is the male component crimped on the end of the cable. When viewed from the front, the pins are numbered from 8 to 1. When viewed from above with the opening gate facing you, the pins are numbered 1 through 8, from left to right. This orientation is important to remember when identifying a cable. Page 1 of 21

2 Types of Interfaces In an Ethernet LAN, devices use one of two types of UTP interfaces - MDI or MDIX. The MDI (media-dependent interface) uses the normal Ethernet pinout. Pins 1 and 2 are used for transmitting and pins 3 and 6 are used for receiving. Devices such as computers, servers, or routers will have MDI connections. The devices that provide LAN connectivity - usually hubs or switches - typically use MDIX (media-dependent interface, crossover) connections. The MDIX connection swaps the transmit pairs internally. This swapping allows the end devices to be connected to the hub or switch using a straight-through cable. Typically, when connecting different types of devices, use a straight-through cable. And when connecting the same type of device, use a crossover cable. Straight-through UTP Cables A straight-through cable has connectors on each end that are terminated the same in accordance with either the T568A or T568B standards. Identifying the cable standard used allows you to determine if you have the right cable for the job. More importantly, it is a common practice to use the same color codes throughout the LAN for consistency in documentation. Use straight-through cables for the following connections: Switch to a router Ethernet port Computer to switch Computer to hub Page 2 of 21

3 Crossover UTP Cables For two devices to communicate through a cable that is directly connected between the two, the transmit terminal of one device needs to be connected to the receive terminal of the other device. The cable must be terminated so the transmit pin, Tx, taking the signal from device A at one end, is wired to the receive pin, Rx, on device B. Similarly, device B's Tx pin must be connected to device A's Rx pin. If the Tx pin on a device is numbered 1, and the Rx pin is numbered 2, the cable connects pin 1 at one end with pin 2 at the other end. These "crossed over" pin connections give this type of cable its name, crossover. To achieve this type of connection with a UTP cable, one end must be terminated as EIA/TIA T568A pinout, and the other end terminated with T568B pinout. To summarize, crossover cables directly connect the following devices on a LAN: Switch to switch Switch to hub Hub to hub Router to router Ethernet port connection Computer to computer Computer to a router Ethernet port Page 3 of 21

4 Rollover UTP Cables In a rolled cable, the colored wires at one end of the cable are in the reverse sequence of the colored wires at the other end of the cable. Console Cables (RJ-45 to DB-9 Female) This cable is also known as Management Cable. The connection to the console is made by plugging the DB-9 connector into an available EIA/TIA 232 serial port on the computer. It is important to remember that if there is more than one serial port, note which port number is being used for the console connection. Once the serial connection to the computer is made, connect the RJ-45 end of the cable directly into the console interface on the router. Page 4 of 21

5 MDI/MDIX Selection Many devices allow the UTP Ethernet port to be set to MDI or MDIX. This can be done in one of three ways, depending on the features of the device: 1. On some devices, ports may have a mechanism that electrically swaps the transmit and receive pairs. The port can be changed from MDI to MDIX by engaging the mechanism. 2. As part of the configuration, some devices allow for selecting whether a port functions as MDI or as MDIX. 3. Many newer devices have an automatic crossover feature. This feature allows the device to detect the required cable type and configures the interfaces accordingly. On some devices, this auto-detection is performed by default. Other devices require an interface configuration command for enabling MDIX auto-detection. Page 5 of 21

6 Serial Cables In the lab experiments, you may be using Cisco routers with one of two types of physical serial cables. Both cables use a large Winchester 15 Pin connector on the network end. This end of the cable is used as a V.35 connection to a Physical layer device such as a CSU/DSU. The first cable type has a male DB-60 connector on the Cisco end and a male Winchester connector on the network end. The second type is a more compact version of this cable and has a Smart Serial connector on the Cisco device end. It is necessary to be able to identify the two different types in order to connect successfully to the router. Data Communications Equipment and Data Terminal Equipment The following terms describe the types of devices that maintain the link between a sending and a receiving device: Data Communications Equipment (DCE) - A device that supplies the clocking services to another device. Typically, this device is at the WAN access provider end of the link. Data Terminal Equipment (DTE) - A device that receives clocking services from another device and adjusts accordingly. Typically, this device is at the WAN customer or user end of the link. If a serial connection is made directly to a service provider or to a device that provides signal clocking such as a channel service unit/data service unit (CSU/DSU), the router is considered to be data terminal equipment (DTE) and will use a DTE serial cable. DCEs and DTEs are used in WAN connections. The communication via a WAN connection is maintained by providing a clock rate that is acceptable to both the sending and the receiving device. In most cases, the ISP provides the clocking service that synchronizes the transmitted signal. For example, if a device connected via a WAN link is sending its signal at Mbps, each receiving device must use a clock, sending out a sample signal every 1/1,544,000th of a second. The timing in this case is extremely short. The devices must be able to synchronize to the signal that is sent and received very quickly. Page 6 of 21

7 By assigning a clock rate to the router, the timing is set. This allows a router to adjust the speed of its communication operations (the router will therefore use a data communications equipment (DCE) cable), thereby synchronizing with the devices connected to it. When making WAN connections between two routers in a lab, connect two routers with a serial cable to simulate a point-to-point WAN link. In this case, decide which router is going to be the one in control of clocking. Routers are DTE devices by default, but they can be configured to act as DCE devices. The V35 compliant cables are available in DTE and DCE versions. To create a point-to-point serial connection between two routers, join together a DTE and DCE cable. Each cable comes with a connector that mates with its complementary type. These connectors are configured so that you cannot join two DCE or two DTE cables together by mistake. Page 7 of 21

8 How to prepare a UTP cable Example: Instructions to prepare a Crossover cable Things you'll need: Step 1 RJ-45 Crimp Tool Cat-5e Cable RJ-45 Jacks Step 2 Prepare your workspace. Take the roll of UTP cable and cut the cable to length using the cutting blade on the crimp tool. Step 3 Splice the end by using the splicing blades to expose the unshielded twisted pairs. Step 4 Take each twisted pair and make four wire strands, each going out from the center of the wire. Now take the individual twisted wire pairs and untwist them down to individual wires in the following order: Striped Orange, Orange, Striped Green, Blue, Striped Blue, Green, Striped Brown, Brown. Page 8 of 21

9 Step 5 Step 6 Next, grasp the wires with your thumb and index finger of your non-dominant hand. Take each wire and snug them securely side by side. Step 7 Using the cutting blade of the crimp tool, cut the ends off of the wires to make each wire the same height. Step 8 Still grasping the wires, insert the RJ-45 jack on the wires with the clip facing away from you. Step 9 Insert the jack into the crimper and press down tightly on the tool to seal the wires in place. Once the first head is made, repeat steps two through eight. When untwisting the wires down to sing strands, use the following order: Striped Green, Green, Striped Orange, Blue, Striped Blue, Orange, Striped Brown, Brown. Step 10 Plug in the cable to test connectivity. Page 9 of 21

10 Part 2: Cables Testing In this lab, we are going to use MicroScanner2 UTP cable tester device to verify that cables were prepared correctly else diagnosing cable's faults. MicroScanner2 Features Page 10 of 21

11 Auto Shutoff The tester turns off after 10 minutes if no keys are pressed and nothing changes at the tester s connectors. Changing the Length Units Page 11 of 21

12 Page 12 of 21

13 Page 13 of 21

14 Diagnosing Wiremap Faults Open Wires connected to wrong pins at connector or punchdown blocks Faulty connections Damaged connector Damaged cable Wrong pairs selected in setup Wrong application for cable Page 14 of 21

15 Split Pair Wires connected to wrong pins at connector or punchdown block. Reversed Pairs Wires connected to wrong pins at connector or punchdown block. Crossed Pairs Wires connected to wrong pins at connector or punchdown block. Mix of 568A and 568B wiring standards (12 and 36 crossed). Crossover cables used where not needed (12 and 36 crossed). Short Damaged connector Damaged cable Conductive material stuck between pins at connector. Improper connector termination Wrong application for cable ******************************************* *** Solve associated parts in the problem sheet *** ******************************************* Page 15 of 21

16 Part 3: WIRESHARK Packet Sniffer The purpose of this part is to introduce the packet sniffer WIRESHARK. WIRESHARK will be used for the lab experiments. This part introduces the basic operation of a packet sniffer, and a test run of WIRESHARK. The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ( sniffs ) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages. A packet sniffer itself is passive. It observes messages being sent and received by applications and protocols running on your computer, but never sends packets itself. Similarly, received packets are never explicitly addressed to the packet sniffer. Instead, a packet sniffer receives a copy of packets that are sent/received from/by application and protocols executing on your machine. Figure 1 shows the structure of a packet sniffer. At the right of Figure 1 are the protocols (in this case, Internet protocols) and applications (such as a web browser or ftp client) that normally run on your computer. The packet sniffer, shown within the dashed rectangle in Figure 1 is an addition to the usual software in your computer, and consists of two parts. The packet capture library receives a copy of every link-layer frame that is sent from or received by your computer. Recall from the discussion from section 1.5 in the text (Figure 1.202) that messages exchanged by higher layer protocols such as HTTP, FTP, TCP, UDP, DNS, or IP all are eventually encapsulated in link-layer frames that are transmitted over physical media such as an Ethernet cable. In Figure 1, the assumed physical media is an Ethernet, and so all upper layer protocols are eventually encapsulated within an Ethernet frame. Capturing all link-layer frames thus gives you all messages sent/received from/by all protocols and applications executing in your computer. The second component of a packet sniffer is the packet analyzer, which displays the contents of all fields within a protocol message. In order to do so, the packet analyzer must understand the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Page 16 of 21

17 Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string GET, POST, or HEAD Running Wireshark When you run the Wireshark program, the Wireshark graphical user interface shown in Figure 2 will be displayed. Initially, no data will be displayed in the various windows. The Wireshark interface has five major components: The command menus are standard pulldown menus located at the top of the window. Of interest to us now are the File and Capture menus. The File menu allows you to save captured packet data or open a file containing previously captured packet data, and exit the Wireshark application. The Capture menu allows you to begin packet capture. The packet-listing window displays a one-line summary for each packet captured, including the packet number (assigned by Wireshark; this is not a packet number contained in any protocol s header), the time at which the packet was captured, the packet s source and destination addresses, the protocol type, and protocol-specific information contained in the packet. The packet listing can be sorted according to any of these categories by clicking Page 17 of 21

18 on a column name. The protocol type field lists the highest level protocol that sent or received this packet, i.e., the protocol that is the source or ultimate sink for this packet. The packet-header details window provides details about the packet selected (highlighted) in the packet listing window. (To select a packet in the packet listing window, place the cursor over the packet s one-line summary in the packet listing window and click with the left mouse button.). These details include information about the Ethernet frame (assuming the packet was sent/received over an Ethernet interface) and IP datagram that contains this packet. The amount of Ethernet and IP-layer detail displayed can be expanded or minimized by clicking on the plus-or-minus boxes to the left of the Ethernet frame or IP datagram line in the packet details window. If the packet has been carried over TCP or UDP, TCP or UDP details will also be displayed, which can similarly be expanded or minimized. Finally, details about the highest level protocol that sent or received this packet are also provided. The packet-contents window displays the entire contents of the captured frame, in both ASCII and hexadecimal format. Towards the top of the Wireshark graphical user interface, is the packet display filter field, into which a protocol name or other information can be entered in order to filter the information displayed in the packet-listing window (and hence the packet-header and packet-contents windows). In the example below, we ll use the packet-display filter field to have Wireshark hide (not display) packets except those that correspond to HTTP messages. Taking Wireshark for a Test Run 1. Start up your favorite web browser, which will display your selected homepage. 2. Start up the Wireshark software. You will initially see a window similar to that shown in Figure 2, except that no packet data will be displayed in the packetlisting, packet-header, or packet-contents window, since Wireshark has not yet begun capturing packets. 3. To begin packet capture, select the Capture pull down menu and select Options. This will cause the Wireshark: Capture Options window to be displayed, as shown in Figure 3. Page 18 of 21

19 4. You can use most of the default values in this window, but uncheck Hide capture info dialog under Display Options. The network interfaces (i.e., the physical connections) that your computer has to the network will be shown in the Interface pull down menu at the top of the Capture Options window. In case your computer has more than one active network interface (e.g., if you have both a wireless and a wired Ethernet connection), you will need to select an interface that is being used to send and receive packets (mostly likely the wired interface). After selecting the network interface (or using the default interface chosen by Wireshark), click Start. Packet capture will now begin - all packets being sent/received from/by your computer are now being captured by Wireshark! 5. Once you begin packet capture, a packet capture summary window will appear, as shown in Figure 4. This window summarizes the number of packets of various types that are being captured, and (importantly!) contains the Stop button that will allow you to stop packet capture. Don t stop packet capture yet. Page 19 of 21

20 6. While Wireshark is running, enter the URL: And have that page displayed in your browser. In order to display this page, your browser will contact the HTTP server at gaia.cs.umass.edu and exchange HTTP messages with the server in order to download this page. The Ethernet frames containing these HTTP messages will be captured by Wireshark. 7. After your browser has displayed the INTRO-wireshark-file1.html page, stop Wireshark packet capture by selecting stop in the Wireshark capture window. This will cause the Wireshark capture window to disappear and the main Wireshark window to display all packets captured since you began packet capture. The main Wireshark window should now look similar to Figure 2. You now have live packet data that contains all protocol messages exchanged between your computer and other network entities! The HTTP message exchanges with the gaia.cs.umass.edu web server should appear somewhere in the listing of packets captured. But there will be many other types of packets displayed as well (see, e.g., the many different protocol types shown in the Protocol column in Figure 2). 8. Type in http (without the quotes, and in lower case all protocol names are in lower case in Wireshark) into the display filter specification window at the top of the main Wireshark window. Then select Apply (to the right of where you entered http ). This will cause only HTTP message to be displayed in the packet-listing window. Page 20 of 21

21 9. Select the first http message shown in the packet-listing window. This should be the HTTP GET message that was sent from your computer to the gaia.cs.umass.edu HTTP server. When you select the HTTP GET message, the Ethernet frame, IP datagram, TCP segment, and HTTP message header information will be displayed in the packet-header window3. By clicking plus and- minus boxes to the left side of the packet details window, minimize the amount of Frame, Ethernet, Internet Protocol, and Transmission Control Protocol information displayed. Maximize the amount information displayed about the HTTP protocol. Your Wireshark display should now look roughly as shown in Figure 5. (Note, in particular, the minimized amount of protocol information for all protocols except HTTP, and the maximized amount of protocol information for HTTP in the packet-header window). 10. Exit Wireshark ******************************************* *** Solve associated parts in the problem sheet *** ******************************************* Page 21 of 21

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Tell me and I forget. Show me and I remember. Involve

More information

Lab: 2. Wireshark Getting Started

Lab: 2. Wireshark Getting Started Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.

More information

Ethereal Lab: Getting Started

Ethereal Lab: Getting Started Ethereal Lab: Getting Started Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Tell me and I forget. Show

More information

University of Maryland Baltimore County Department of Information Systems Spring 2015

University of Maryland Baltimore County Department of Information Systems Spring 2015 University of Maryland Baltimore County Department of Information Systems Spring 2015 IS 450/650: Data Communications and Networks Homework Assignment 1 Wireshark Lab (Handed Out: February 3, 2015 (Tuesday),

More information

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started Wireshark Lab: Getting Started Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-2019, J.F Kurose and K.W. Ross, All Rights Reserved Introduction to Wireshark

More information

Wireshark Lab: Getting Started v7.0

Wireshark Lab: Getting Started v7.0 Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Goals - to become acquainted with Wireshark, and make some simple packet captures and observations

Goals - to become acquainted with Wireshark, and make some simple packet captures and observations CSCI 395: Networks Lab 2: Introductory Wireshark Lab, Current state of the Internet, and Transmission/ Delay Due: 2/19/16 at the beginning of class 20 Points Part I Goals - to become acquainted with Wireshark,

More information

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark

More information

Ethereal Lab: Getting Started

Ethereal Lab: Getting Started Ethereal Lab: Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

New York University Computer Science Department Courant Institute of Mathematical Sciences

New York University Computer Science Department Courant Institute of Mathematical Sciences New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:

More information

Wireshark intro. Introduction. Packet sniffer

Wireshark intro. Introduction. Packet sniffer Wireshark intro Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

Wireshark Lab: Getting Started v7.0

Wireshark Lab: Getting Started v7.0 Wireshark Lab: Getting Started v7.0 Adapted by HMC from the supplement to Computer Networking: A Top-Down Approach, 7 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve

More information

Getting Wireshark. Detailed installing steps can be found on the Internet, so this tutorial won t cover this part.

Getting Wireshark. Detailed installing steps can be found on the Internet, so this tutorial won t cover this part. Wireshark Tutorial Getting Wireshark Wireshark for Windows and Mac OS X can be easily downloaded from its official website. If you are Linux users, you ll probably find Wireshark in its package repositories.

More information

Project points. CSE422 Computer Networking Spring 2018

Project points. CSE422 Computer Networking Spring 2018 Project 1 100 points Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

Submit your captured trace file from the TCP lab exercise (Section 1 describes how this can be done).

Submit your captured trace file from the TCP lab exercise (Section 1 describes how this can be done). TCN 5030 - Project 2 Overview: This project will give you hands-on experience with the Wireshark network protocol analyzer, by investigating the behavior of TCP. Wireshack is a popular open-source tool

More information

Department Of Computer Science

Department Of Computer Science Department Of Computer Science Laboratory Manual Prepared By: Muhammad Nouman Farooq Lecturer and Course Coordinator Course: Network Security (CS-242) Page 1 of 47 Table of Contents Lab 1- Introduction

More information

Getting Started. 1 Earlier versions of these labs used the Ethereal packet analyzer. In May 2006, the developer of Ethereal

Getting Started. 1 Earlier versions of these labs used the Ethereal packet analyzer. In May 2006, the developer of Ethereal Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages exchanged between

More information

Planning and Cabling Networks

Planning and Cabling Networks Planning and Cabling Networks LANs - Making the Physical Connection Choosing the Appropriate LAN Device For this course, the choice of which router to deploy is determined by the Ethernet interfaces that

More information

Introduction to Wireshark

Introduction to Wireshark Introduction to Wireshark 1 Objective In this lab, the student shall work individually to: 1. Learn about packet sniffers and see how they capture and analyze network traffic. 2. Install Wireshark and

More information

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 Due Wednesday, 12/7, at 11:59:59 PM. One s understanding of network protocols can often be greatly deepened by seeing protocols

More information

1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2.

1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2. 1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2. Refer to the exhibit. A network administrator has decided to use packet

More information

Network Forensics (wireshark) Cybersecurity HS Summer Camp

Network Forensics (wireshark) Cybersecurity HS Summer Camp Network Forensics (wireshark) Cybersecurity HS Summer Camp Packet Sniffer a packet sniffer captures ( sniffs ) messages being sent/received from/by your computer; it will also typically store and/or display

More information

Twisted-Pair Cabling; Crossover Cables. Wiring standards for Ethernet cables using twisted-pair wires; Making and testing cables

Twisted-Pair Cabling; Crossover Cables. Wiring standards for Ethernet cables using twisted-pair wires; Making and testing cables Twisted-Pair Cabling; Crossover Cables Wiring standards for Ethernet cables using twisted-pair wires; Making and testing cables UTP and STP UTP Unshielded Twisted Pair; four pairs are bundled in a plastic

More information

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University DEVELOPMENT AND APPLICATION OF A NEW CURRICULUM FOR COMPUTER NETWORKING Presenter Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University Gabriel

More information

CNE301 Network I Lab 04 Building a cross-over cable and configuring back2back network.

CNE301 Network I Lab 04 Building a cross-over cable and configuring back2back network. CNE301 Network I Lab 04 Building a cross-over cable and configuring back2back network. # Student ID Student Name Grade (10) 1-1 / 10 - Build a Crossover Cable Objective Build a Category 5 or Category 5e

More information

Lab Assignment for Chapter 1

Lab Assignment for Chapter 1 CHAPTER 1 Lab Assignment for Chapter 1 We have created lab assignments for eight chapters of the textbook (Chapters 1, 2, 3, 4, 5, 6, 8, and 10). We have no lab assignments for Chapter 7, 9 or 11. We cannot

More information

DKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK

DKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK DKT 224/3 DATA COMMUNICATION & NETWORK LAB 2 NETWORK PROTOCOL ANALYZER SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK Lab #2 2 Lab #2 : Network Protocol Analyzer (Sniffing and Identify Protocol used

More information

Lab - Building an Ethernet Crossover Cable

Lab - Building an Ethernet Crossover Cable Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway PC-A NIC 192.168.10.1 255.255.255.0 N/A PC-B NIC 192.168.10.2 255.255.255.0 N/A Part 1: Analyze Ethernet Cabling

More information

8.0.1 Chapter 8 Introduction

8.0.1 Chapter 8 Introduction 8.0.1 Chapter 8 Introduction Physical layer protocols and services Physical layer signaling and encoding. Role of signals used to represent bits as a frame is transported across the local media. Basic

More information

Communication Wiring Color Codes

Communication Wiring Color Codes Communication Wiring Color Codes Cat 5 & 5e Network Color Codes for RJ-45 Ethernet Plug Eight-conductor data cable (Cat 3 or Cat 5) contains 4 pairs of wires. Each pair consists of a solid color wire and

More information

Student Lab Manual. Networks and Communications (COMP277L) SYSTEM PROPERTIES. Dr. Mohamed Ben Laroussi Aissa Room 11 A- 2.

Student Lab Manual. Networks and Communications (COMP277L) SYSTEM PROPERTIES. Dr. Mohamed Ben Laroussi Aissa Room 11 A- 2. Laboratory Exercise N o 1 SYSTEM PROPERTIES College of Arts and Sciences Department of Mathematical And Physical Sciences Computer Science Section Upon completion of this session,, a successful student

More information

COMPUTER ENGINEERING AND INFORMATION TECHNOLOGY DEPARTMENT NETWORK LABORATORY. Ethernet Cabling

COMPUTER ENGINEERING AND INFORMATION TECHNOLOGY DEPARTMENT NETWORK LABORATORY. Ethernet Cabling Experiment number :(1) Ethernet Cabling Introduction:- The EIA/TIA (Electronic Industries Association and the newer Telecommunications Industry Alliance) is the standards body that creates the Physical

More information

CCENT Study Guide. Chapter 2 Ethernet Networking and Data Encapsulation

CCENT Study Guide. Chapter 2 Ethernet Networking and Data Encapsulation CCENT Study Guide Chapter 2 Ethernet Networking and Data Encapsulation Chapter 2 Objectives The CCENT Topics Covered in this chapter include: Network Fundamentals 1.6 Select the appropriate cabling type

More information

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks CCNA Exploration Network Fundamentals Chapter 10 Planning and Cabling Networks Updated: 15/07/2008 1 10.0.1 Introduction 2 10.0.1 Introduction The following have been covered in previous chapters: considered

More information

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Abstract The Office of Navel Research Network Team actively

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer

More information

Introduction to Wireshark

Introduction to Wireshark Introduction to Wireshark CS3C03/SE4C03 Jason Jaskolka Department of Computing and Software Faculty of Engineering McMaster University Hamilton, Ontario, Canada jaskolj@mcmaster.ca Winter 2013 Jason Jaskolka

More information

Problem Set 9 Due: Start of class, December 4

Problem Set 9 Due: Start of class, December 4 CS242 Computer Networks Handout # 18 Randy Shull November 27, 2017 Wellesley College Problem Set 9 Due: Start of class, December 4 Reading: Kurose & Ross, Sections 6.1 through 6.5 Wireshark Lab [16] In

More information

RS-232 Connector Pin Assignments

RS-232 Connector Pin Assignments APPENDIXB This appendix lists the connector pin assignments for the CDEs, and includes the following sections: Serial Console-Interface, page B- Ethernet, page B- Cable Pin Assignments, page B- Serial

More information

Networking Fundamentals. An Introduction to Networks. tel: +44 (0) fax: +44 (0) web:

Networking Fundamentals. An Introduction to Networks. tel: +44 (0) fax: +44 (0) web: Networking Fundamentals An Introduction to Networks Official UK distribution partner tel: +44 (0)1457 874 999 fax: +44 (0)1457 829 201 email: sales@cop-eu.com web: www.cop-eu.com Course Content The following

More information

Packet Tracer Mini-Lab 05: Supplement Configuring 2 LANs with 2 Routers using CLI in Packet Tracer

Packet Tracer Mini-Lab 05: Supplement Configuring 2 LANs with 2 Routers using CLI in Packet Tracer Packet Tracer Mini-Lab 05: Supplement Configuring 2 LANs with 2 Routers using CLI in Packet Tracer CAVEAT: THE LABS IN CC2-180 MAY NOT WORK ENTIRELY AS PLANNED. WE WILL BE UTILIZING BOTH A SERVER 2012

More information

Appendix B Networks, Routing, and Firewall Basics

Appendix B Networks, Routing, and Firewall Basics Appendix B Networks, Routing, and Firewall Basics This appendix provides an overview of IP networks, routing, and firewalls. Related Publications As you read this document, you may be directed to various

More information

Making Ethernet Cables

Making Ethernet Cables Making Ethernet Cables Straight Through Cable is a standard transmission media connection for connecting two networking device which different one and another. One of them have an IP address but another

More information

RS232/RS485/RS422 to TCP/IP Converter ITEM NO.: RS007

RS232/RS485/RS422 to TCP/IP Converter ITEM NO.: RS007 RS232/RS485/RS422 to TCP/IP Converter ITEM NO.: RS007 RS007 is a universal data converter which support serial RS232, RS422 and RS485 to the TCP / IP intelligent communication converter, it offers RS485/RS422

More information

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction Wireshark HTTP Introduction Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we re now ready to use Wireshark to investigate protocols in operation. In this lab, we

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Cable Specifications. Interface Specifications. Fiber-Optic Specifications APPENDIXB

Cable Specifications. Interface Specifications. Fiber-Optic Specifications APPENDIXB APPENDIXB This appendix lists the cable specifications for supported modules on the Cisco 7600 series router. The following signal summaries are contained in this appendix: Interface Specifications, page

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

ROCKETLINX ES7110. Quick Installation Guide Rev C ES7110 ES7110-VB. Industrial PoE Switch

ROCKETLINX ES7110. Quick Installation Guide Rev C ES7110 ES7110-VB. Industrial PoE Switch ROCKETLINX ES7110 Industrial PoE Switch Quick Installation Guide ES7110 ES7110-VB 2000550 Rev C www.comtrol.com Overview The RocketLinx ES7110 and ES7110-VB are industrial Power over Ethernet (PoE) switches

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

Wireshark Lab: HTTP. 1. The Basic HTTP GET/response interaction

Wireshark Lab: HTTP. 1. The Basic HTTP GET/response interaction Wireshark Lab: HTTP Version: 2.0 (June 2007) 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Having gotten our feet wet with the Wireshark packet

More information

Cable and Port Specifications

Cable and Port Specifications Send documentation comments to mdsfeedback-doc@cisco.com APPENDIXC This appendix includes the cables and connectors used with the Cisco MDS 9100 Series Fixed Configuration Fabric Switch, and it includes

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Physical Layer V What does the physical layer provide?

Physical Layer V What does the physical layer provide? SEMESTER 1 Chapter 8 Physical Layer V 4.0 90 Points 8.1.1 What does the physical layer provide? What are the four elements of delivering frames across the media? 8.1.2 What are the three basic forms of

More information

Wireshark Lab: HTTP v6.1

Wireshark Lab: HTTP v6.1 Wireshark Lab: HTTP v6.1 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb

More information

Modern Ethernet. Chapter 6

Modern Ethernet. Chapter 6 Modern Ethernet Chapter 6 Contents Define the characteristics, cabling, and connectors used in 10BaseT and 10BaseFL Explain how to connect multiple Ethernet segments Define the characteristics, cabling,

More information

Department Of Computer Science

Department Of Computer Science Department Of Computer Science Laboratory Manual Prepared By: Muhammad Nouman Farooq Lecturer and Course Coordinator Course: Computer Communication and Networks (CS-205) Page 1 of 43 Table of Contents

More information

Contents. 1 Introduction Appearance Verification Unpacking the tester Package Checklist...

Contents. 1 Introduction Appearance Verification Unpacking the tester Package Checklist... Contents 1 Introduction...1-1 2 Appearance...2-1 3 Verification...3-1 3.1 Unpacking the tester...3-1 3.2 Package Checklist...3-1 3.3 Power Supply...3-2 3.4 Power On and Self Check...3-2 4 User Interface...4-1

More information

Cisco - Ethernet 100BaseTX and 10BaseT Cables: Guidelines and Specifications

Cisco - Ethernet 100BaseTX and 10BaseT Cables: Guidelines and Specifications Page 1 of 8 Ethernet 100BaseTX and 10BaseT Cables: Guidelines and Specifications Contents Introduction Prerequisites Requirements Components Used Conventions Which Cable Do I Need? Ethernet Cabling Guidelines

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

NT1210 Introduction to Networking. Unit 5:

NT1210 Introduction to Networking. Unit 5: NT1210 Introduction to Networking Unit 5: Chapter 5, Ethernet LANs 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

RS232+LAN INTERFACE USER MANUAL

RS232+LAN INTERFACE USER MANUAL LAN202 USER MANUAL May 2006 - Ed. 1 English 1 SUMMARY 1 LAN202 module... 3 1.1 Connections via Ethernet... 4 2 Configuration... 5 2.1 Saving and protection of the configuration... 8 3 Virtual COM... 9

More information

3 Chapter Introduction. 3.2 Copper Cable

3 Chapter Introduction. 3.2 Copper Cable 3 Chapter 3 3.1 Introduction The Network Media is the device that physically carries the data from computer to computer. The three major types of network media are: Copper Cable Fiber-Optic Cable Wireless

More information

4-port 10/100TX + 1 or 2-port 100FX Industrial Switch. User Manual

4-port 10/100TX + 1 or 2-port 100FX Industrial Switch. User Manual 4-port 10/100TX + 1 or 2-port 100FX Industrial Switch User Manual Rev.1.03 Sep-2010 FCC Warning This Equipment has been tested and found to comply with the limits for a Class A digital device, pursuant

More information

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network.

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network. Q.1 Explain IP address. IP address is unique number of network device in network. Two IP address could not be same. Using this network we can connect the devices with each other. It is separated by dot(.).

More information

Section 1.1: Networking Overview

Section 1.1: Networking Overview Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission

More information

Lantech I(P)GS-0008B. 8 10/100/1000T (PoE at/af) Industrial Unmanaged Ethernet Switch I(P)ES-0008B

Lantech I(P)GS-0008B. 8 10/100/1000T (PoE at/af) Industrial Unmanaged Ethernet Switch I(P)ES-0008B Lantech I(P)GS-0008B 8 10/100/1000T (PoE at/af) Industrial Unmanaged Ethernet Switch I(P)ES-0008B 8 10/100TX (PoE at/af) Industrial Unmanaged Ethernet Switch User Manual V1.11 Jan-2018 Recommendation for

More information

Lab Assignment 3 for ECE374

Lab Assignment 3 for ECE374 Lab Assignment 3 for ECE374 Posted: 02/25/18 Due: 03/08/18 In this lab, we ll take a quick look at the UDP and TCP transport protocol. Whenever possible you should hand in a Wireshark screenshot that you

More information

CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP

CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP Objectives CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP To get familiar with capturing network packets using Wireshark. To explore the HTTP message formats and basic operations of HTTP protocol.

More information

Cable and Port Specifications

Cable and Port Specifications APPENDIXC This appendix provides cable and port specifications, and includes the following sections: Cables and Adapters Provided, page C-1 Console Port, page C-2 COM1 Port, page C-3 MGMT 10/100/1000 Ethernet

More information

Sniffter 100 Documentation

Sniffter 100 Documentation Sniffter 100 Documentation Written by Tom Collins The contents of this manual are copyright 2004 by Tom Logic LLC, All Rights Reserved. For more information on the Sniffter 100 Network Tester, contact

More information

Cabling Guide for Console and AUX

Cabling Guide for Console and AUX Page 1 of 13 Cabling Guide for and AUX Ports TAC Notice: What's Changing on TAC Web Help us help you. Contents Introduction Before You Begin Conventions Prerequisites Components Used Table of Routers with

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

5 10/100TX w/ 4 PoE Injector Industrial Switch. User Manual

5 10/100TX w/ 4 PoE Injector Industrial Switch. User Manual 5 10/100TX w/ 4 PoE Injector Industrial Switch User Manual V1.01 Nov-2010 CE Mark Warning This is a Class-A product. In a domestic environment this product may cause radio interference in which case the

More information

Connector and Cable Specifications

Connector and Cable Specifications APPENDIX B This appendix describes the Catalyst 3550 switch ports and the cables and adapters that you use to connect the switch to other devices. Connector Specifications These sections describe the connectors

More information

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 ECE374: Homework 4 1 Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can

More information

7I74 MANUAL 8 CHANNEL RS-422 INTERFACE

7I74 MANUAL 8 CHANNEL RS-422 INTERFACE 7I74 MANUAL 8 CHANNEL RS-422 INTERFACE V1.2 This page intentionally almost blank Table of Contents GENERAL.......................................................... 1 DESCRIPTION.................................................

More information

8 10/100/1000T Industrial Switch. User Manual MS655208(X)

8 10/100/1000T Industrial Switch. User Manual MS655208(X) 8 10/100/1000T Industrial Switch User Manual MS655208(X) Content Overview... 1 Introduction... 1 Features... 3 Packing List... 4 Safety Precaution... 4 Hardware Description... 5 Front Panel... 5 Top View...

More information

9. Wireshark I: Protocol Stack and Ethernet

9. Wireshark I: Protocol Stack and Ethernet Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the

More information

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark

More information

Contents. One Introduction 2. Two Installation 3 Front Panel Connecting Ports LEDs

Contents. One Introduction 2. Two Installation 3 Front Panel Connecting Ports LEDs Contents One Introduction 2 Two Installation 3 Front Panel Connecting Ports LEDs Three Configuration and Installation Guidelines 7 Hub/Network Configuration Ports and Connectors Typical Use for the Megaswitch

More information

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta)

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta) 70-742 Number: 70-742 Passing Score: 750 Time Limit: 120 min File Version: 1.0 Microsoft 70-742 Exam Name: Identity with Windows Server 2016 (beta) Sections 1. Understanding Local Area Networks 2. Defining

More information

Appendix A Cable Pinouts

Appendix A Cable Pinouts Appendix A Cable Pinouts This appendix lists the cables and connector pinout assignments for the cables used with the ERX-7xx models and ERX-14xx models. Topic Page SRP I/O Module 163 CT1 and CE1 I/O Modules

More information

MDI/MDIX) FEP-32005T-2

MDI/MDIX) FEP-32005T-2 TM Mico-Switch/5 5 Port 10/100Base-TX Switch (Auto MDI/MDIX) FEP-32005T-2 U SER S M ANUAL (Auto MDI/MDIX) FEP-32005T-2 TM TM Package Contents Package contents include the following: Micro-Switch/5; 5 Port

More information

Lab Capturing and Analyzing Network Traffic

Lab Capturing and Analyzing Network Traffic Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

Hypercable injecteur HPOE - Industrial IEEE 802.3at Gigabit PoE Injector. User Manual. v.1.0 Jun Mail :

Hypercable injecteur HPOE -  Industrial IEEE 802.3at Gigabit PoE Injector. User Manual. v.1.0 Jun Mail : Industrial IEEE 802.3at Gigabit PoE Injector User Manual v.1.0 Jun-2011 FCC Warning This Equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15

More information

Cisco CCT Routing & Switching

Cisco CCT Routing & Switching Cisco - CCT Routing & Switching 1 QUESTION: 1 Which router can be used for disk-in-access to the router CLI management purposes and does not usually pass normal network traffic? A. AUX B. Gigabit Ethernet

More information

Cable Pinouts. SRP I/O Module

Cable Pinouts. SRP I/O Module Cable Pinouts A This appendix lists the cables and connector pinout assignments for the cables used with the ERX-7xx models and ERX-14xx models. Topic Page SRP I/O Module A-1 CT1 and CE1 I/O Modules A-4

More information

Wireshark Lab: Ethernet and ARP v6.01

Wireshark Lab: Ethernet and ARP v6.01 Wireshark Lab: Ethernet and ARP v6.01 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

Networking Devices. Punch_down panels

Networking Devices. Punch_down panels Networking Devices Punch_down panels Hubs Switches Bridges Routes Gateways Network Interface Cards (NICs) Wireless access points Modems 1 Punch_down panels Wiring closets Labeling schemes 2 1 Hubs The

More information

See instructions to download and install the latest version of LinkBoxMB and the user's manual at

See instructions to download and install the latest version of LinkBoxMB and the user's manual at Safety Instructions WARNING Follow carefully this safety and installation instructions. Improper work may lead to serious harmful for your health and also may damage seriously the IntesisBox and/or any

More information

EXTENDER 6000 / 7000 CABLES & CONNECTORS

EXTENDER 6000 / 7000 CABLES & CONNECTORS EXTENDER 6000 / 7000 CABLES & CONNECTORS This document outlines the cables required for the installation of the Citel EXTenders (6000, 7000) 1 CABLE: 9 M-F Straight Through Serial Cable, All pins straight

More information

Manual Documentation Number EIR418-2SFP-T 0912m

Manual Documentation Number EIR418-2SFP-T 0912m EIR418-2SFP-T User Manual Manual Documentation Number EIR418-2SFP-T 0912m EIR418-2SFP-T Documentation Number: EIR418-2SFP-T- 0912m Using domestic and imported parts by International Headquarters B&B Electronics

More information

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS SNIFFING AND ANALYSING NETWORK PACKETS 1. OBJECTIVE To further understand how the Internet really works and how the concept of encapsulation is being implemented in the different layers of the TCP/IP protocol

More information