Introduction to SITL. Objective
|
|
- Rodney Harper
- 5 years ago
- Views:
Transcription
1 Introduction to SITL Objective This tutorial provides a quick introduction to System-in-the-Loop (SITL) functionality, which allows physical hardware and a simulation to interact as a unified system. It shows how you can use SITL to do the following: Allow physical hardware to interact with a simulation Allow multiple physical networks to communicate through a simulation After you finish this tutorial, you will know how to use Modeler and SITL to incorporate physical hardware in a simulation. 1
2 Before You Begin To do this tutorial, you should: Know how to use Modeler to build network models and run simulations Know how to configure Ethernet interfaces and firewalls on your computer If you are new to Modeler, we suggest that you do one or more basic tutorials (such as Small Internetworks) before doing this one. You will need the following items to complete this tutorial: Modeler (Release 14.5 or later) SITL license A computer on which to run the software. This computer needs one or more Ethernet interfaces: One dedicated interface is needed for the real sim scenario A second dedicated interface is needed for the real sim real scenario 2
3 A third interface might be needed to let Modeler contact an OPNET license server (not needed if a license server is running on the local computer or if Modeler is running in Standalone license mode) Note Each network interface card (NIC) used for a SITL interface must be compatible with the Pcap library that SITL uses to capture and send packets. You can check for supported cards at the website for the Pcap library used by SITL: Winpcap on Windows ( and libpcap on Linux ( (SITL prints the Pcap library version being used at the beginning of each simulation.) One or two additional computers to represent the physical hardware in the simulations 3
4 Tasklist The tasks you will perform in this tutorial comprise the following procedures: Task 1 Preparing the simulation environment Preparing the hardware Preparing the Modeler software Task 2 Creating a Real Sim Scenario Creating the simulated network Running the simulation Sending packets through the simulation Task 3 Creating a Real Sim Real Scenario Creating the simulated network Running the simulation Sending packets through the simulation 4
5 Preparing the Simulation Environment In this task, you will set up Modeler and the computers to be used so that they are ready to run a SITL simulation. Prepare the Hardware 1 Select two, three, or four computers to use, as follows: Hardware for SITL Simulation License server Real 1 SITL Real 2 Real1 Represents a physical network or piece of hardware. Required. SITL Runs the Modeler and SITL software. Required. 5
6 Real2 Represents a second physical network or piece of hardware. Required only for the Real Sim Real scenario. License server Required only if Modeler needs a remote license server. (We recommend using a local license server or running Modeler in Standalone license mode.) Note the following: All computers must be able to communicate with each other as indicated by the links in the preceding figure. The links are Ethernet connections, either direct or through a network. The SITL computer must be running a version of Windows or Linux supported by Modeler and SITL. Real1 and Real2 can be running any operating system. 2 Set up the Ethernet interfaces on the SITL computer. 2.1 At a minimum, set the IP address, mask, and gateway for each SITL interface. Each IP address must be unique on the connected network. The mask and gateway should be appropriate for connection to the physical hardware. 6
7 2.2 If the SITL computer is running Windows, disable Netbios over TCP/IP and all items on the connection except Internet Protocol (TCP/IP). 3 Set up a firewall on the SITL computer for the interfaces that are going to be used in the SITL simulation. The firewall should not allow any exceptions, so as to prevent the operating system from interfering with SITL. On Windows, you can use the built-in firewall or other firewalls installed on your system. Some third-party firewalls (such as ZoneAlarm) interfere with Pcap, however; if you have one of those, you will have to disable it and use the Windows firewall instead. Note Do not put a firewall on the interface to a remote license server, if any. 7
8 Prepare the Modeler Software SITL models are not included in the default repository, so you must disable the use of repositories. This will cause all models to be rebuilt the first time you run a simulation. 1 Start Modeler. 2 Choose Edit > Preferences. 3 Locate the Network Simulation Repositories preference and delete the stdmod entry. 4 Close the Preferences Editor. 8
9 Real Sim Scenario This scenario models communications between two computers. One computer is the physical computer Real1. The other computer is a workstation modeled in a simulation running on the SITL computer. The simulation will comprise two nodes, one representing the connection to the physical computer and the other being the simulated workstation. Real Sim Scenario Real 1 SITL 9
10 Build and Configure the Simulated Network You already have the Real1 and SITL computers connected to each other. Now you ll create the simulated network that will run on the SITL computer. 1 Create a new project with an empty scenario. In the Startup Wizard: 1.1 Name the project SITL_Sample and the scenario real_sim. 1.2 Select the Office network scale and use the default size. 1.3 Include the ethernet_advanced and SITL model families. 2 Open the Object Palette. 3 Locate the node model called sitl_virtual_gateway_to_real_world. Drop an instance of this model into the workspace and rename it sitl. 4 Locate the node model called ethernet_wkstn_adv. Drop an instance of this model into the workspace and rename it wkstn. 10
11 5 Locate the link model called sitl_virtual_eth_link and use it to connect the sitl gateway node to the wkstn node. The network model should now resemble the following figure. Real Sim Model 6 Close the Object Palette. 7 Edit the attributes on the sitl node: 7.1 Choose your interface from the Source IP and Ethernet Mac Address pull-down list. This should be the NIC you are using for this simulation. Choosing the Interface 11
12 7.2 Set the Incoming Packet Filter String attribute to (arp or icmp) and ether src <SOURCE_MAC_ADDRESS>, where <SOURCE_MAC_ADDRESS> is the MAC address of the interface on Real1 that will be sending packets to SITL. Note This is NOT the interface used by the computer running Modeler. It resides on the external computer (Real1) that is connected to the SITL interface. 7.3 Close the Attributes dialog box. 8 Edit the attributes on the wkstn node: 8.1 Expand the IP > IP Host Parameters > Interface Information tree and set the Address and Subnet Mask attributes. The address must be unique in both the physical and simulated networks (that is, it must be different from the addresses used by the Real1 and SITL computers). The address must be in the same subnet as Real1. 12
13 8.2 Expand the Ethernet > Ethernet Parameters tree and set the Address attribute to 3 (or any single-digit number greater than zero). Some real systems don t like zero for Ethernet addresses and using a small number will be useful in debugging later on. Like all Ethernet addresses, this should be unique in your system. 8.3 Close the Attributes dialog box. 13
14 Run the Simulation You now are ready to configure and run the simulation. While the simulation is running, you will test it by pinging the simulated workstation from the external computer (Real1) and observing the response. 1 Open the Configure/Run DES dialog box. If necessary, click the Detailed button to display the detailed version of the dialog box. 2 Set Simulation Kernel to Development. You can run SITL simulations in optimized or development mode. We ll use development here in case you want to examine the internal operation of the simulation. 3 Modeler uses various techniques to make discrete event simulations more efficient (such as pre-assigning routing tables instead of computing them). To prevent these techniques from affecting the simulation, you should disable simulation efficiency for the protocols you will be using with SITL. To do so: 3.1 In the left pane, expand the tree to Inputs > Global Attributes. 14
15 3.2 In the Global Attributes pane, expand Simulation Efficiency and disable ARP Sim Efficiency. Note You can click on the question mark to see a description of this Sim Efficiency technique. 4 Because we want to coordinate the simulation with real hardware, we must constrain it to run at a real-time speed. 4.1 In the left pane, expand the tree to Execution > Advanced > Kernel Preferences. 4.2 In the Kernel Preferences pane, set Real-time execution ratio to 1. 5 Click Run. After the model library has been recompiled, the simulation runs. You should get output similar to the following figure. 15
16 Simulation Progress Output Also, you can look in the Simulation Console to verify that your SITL gateway was successfully matched to the physical interface, as shown in the following figure. 16
17 Simulation Console Output 17
18 Send Packets Through the Simulation To demonstrate that the physical hardware and simulated workstation are working together as a single network, ping the simulated workstation from Real1 and view the response. 1 On Real1, enter the ping command: Windows: ping -t <wkstn_addr> Linux: ping <wkstn_addr> where <wkstn_addr> is the IP address you entered when you configured the wkstn node. This will cause ICMP echo request packets to be sent to the simulated workstation via SITL. Ping replies appear on Real1. 2 When you are finished looking at the replies, stop the simulation. If you don t get any replies to the ping, verify that you have configured everything correctly. If necessary, look at the Troubleshooting SITL Simulations section in the SITL User Guide. You can observe the packets being sent with a packet capture utility such as Wireshark or by running the simulation with the OPNET Simulation Debugger (ODB) enabled and turning on SITL tracing (with the ltrace sitl command). 18
19 Real Sim Real Scenario This scenario models communications between two physical nodes by way of a simulated network. The model will comprise three nodes, two representing the physical hardware (with a SITL interface for each) and the third being a simulated network switch. Real Sim Real Scenario Real 1 SITL Real 2 Note If you do not have two dedicated Ethernet interfaces available in the SITL computer, skip this scenario and go to the Summary. 19
20 Build and Configure the Simulated Network To create the simulated network for this scenario, you ll duplicate the previous scenario, change the workstation to a switch, and add a second SITL interface to connect to the Real2 computer. 1 Duplicate the real_sim scenario and name it real_sim_real. 2 Rename the sitl node to sitl1. If you are using the same computer for Real1 as in the previous scenario, this node needs no further configuration. If you are using a different computer, change the Incoming Packet Filter String attribute to include the MAC address of the new computer. 3 Edit the attributes of the wkstn node: Change name to switch. Select the Advanced checkbox, then change model to ethernet16_switch_adv. 4 Open the Object Palette. 20
21 5 Locate the node model called sitl_virtual_gateway_to_real_world and drop a new instance of this model into the workspace. Name it sitl2. 6 Locate the link model called sitl_virtual_eth_link and use it to connect switch to sitl2. 7 Close the Object Palette. The network model should now resemble the following figure. Real Sim Real Model 8 Edit the attributes on the sitl2 node: 8.1 Choose your interface from the Source IP and Ethernet Mac Address pull-down list. This is the interface on the SITL computer that connects (either directly or through a network) to Real2. Do not use the same interface used by the sitl1 node. 8.2 Set the Incoming Packet Filter String attribute to (arp or icmp) and ether src <SOURCE_MAC_ADDRESS>, where 21
22 <SOURCE_MAC_ADDRESS> is the MAC address of the interface on Real2 that will be sending packets to SITL. Note This is NOT the interface used by the computer running Modeler. It resides on the external computer (Real2) that is connected to this SITL interface. 8.3 Close the attributes dialog box. 22
23 Run the Simulation You now are ready to configure and run the simulation. While the simulation is running, you will test it by streaming video through the simulated switch from one external computer to the other. 1 Open the Configure/Run DES dialog box. If necessary, click the Detailed button to display the detailed version of the dialog box. 2 Set Simulation Kernel to Development. 3 Confirm that the simulation will run at a real-time speed: 3.1 In the left pane, expand the tree to Execution > Advanced > Kernel Preferences. 3.2 In the Kernel Preferences pane, verify that Real-time execution ratio is set to 1. 4 Click Run. The simulation runs. You should get output similar to the following figure. 23
24 Simulation Progress Output Also, you can look in the Simulation Console to verify that both SITL gateways were successfully matched to physical interfaces, as shown in the following figure. 24
25 Simulation Console Output 25
26 Send Packets Through the Simulation To demonstrate that the simulated switch is routing traffic between the two physical computers, you can stream video from Real1 to Real2 through the SITL simulation. Note If you prefer, you can skip the steps in this section and demonstrate connectivity simply by pinging Real2 from Real1 or Real1 from Real2. To use video streaming, you need applications that can stream and receive video. This tutorial uses VLC media player, a free program available at However, you can use any suitable program you have available. 1 On computer Real2, install and start VLC media player. We ll call this instance of the program MP2. 2 Configure MP2 to receive and play a video stream by listening on UDP port 1234 (or any other available UDP port). 2.1 Choose File > Open Network Stream 2.2 Select the UDP/RTP radio button and set Port to
27 VLC Media Player Setup for MP2: Open Network Stream 2.3 Click OK. 3 On computer Real1, install and start another instance of VLC media player (called MP1). 4 Configure MP1 to play a video file (or DVD) and stream the video to computer Real2, using the same UDP port you set up for MP Select the video source: To play a video file, choose File > Open File, click Browse, and select a video file. 27
28 VLC Media Player Setup for MP1: Open File To play video from a DVD, choose File > Open Disc and enter the device name. 4.2 Select the Stream/Save checkbox and click Settings The Stream output dialog box opens. 4.3 Select the UDP checkbox. 4.4 Set Address to the physical IP address of computer Real2 and Port to
29 VLC Media Player Setup for MP2: Streaming Video 4.5 Click OK twice to close both dialog boxes. You should see the video being played in MP2 on computer Real2. Note If you don t see video, make sure MP1 and MP2 are not paused. 29
30 5 When you are finished with the video, stop MP1 and MP2, then stop the simulation. 30
31 Summary You ve seen how to use System-in-the-Loop functionality to map physical interfaces to addresses in a simulated network. In this tutorial, you have Build and run a SITL system in which physical hardware interacts with a simulation Build and run a SITL system that allowed multiple physical networks to communicate through a simulation For further information about SITL, read the SITL User Guide in the online documentation. 31
LAN Modeling. Overview
LAN Modeling Overview This lesson focuses on the use of LAN models and background link utilization. You will learn to Configure the object palette with the models you need Set up application and profile
More informationThis document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com].
Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Área: Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo
More informationNetwork Design. Planning a Network with Different Users, Hosts, and Services. Laboratory. Objective. Overview
Laboratory 4 Network Design Planning a Network with Different Users, Hosts, and Services Objective The objective of this lab is to demonstrate the basics of designing a network, taking into consideration
More informationIntroduction to the Packet Tracer Interface using a Hub Topology
Introduction to Packet Tracer What is Packet Tracer? Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco Systems. Packet Tracer (PT) is a powerful and dynamic tool that
More informationUse of the TCP/IP Protocols and the OSI Model in Packet Tracer
Communication Networks [Netw501] Spring 2018 Tutorial 3 Packet Tracer Activity 3 Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Introduction: In Packet Tracer simulation mode, detailed
More informationLab I: Using tcpdump and Wireshark
Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html
More informationLab - Using Wireshark to Examine TCP and UDP Captures
Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.
More information3D Network Visualizer
3D Network Visualizer Objective 3D Network Visualizer (3DNV) functionality lets you create three-dimensional animations based on topology information, node relationships, performance statistics, and terrain
More informationBSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario
BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark
More informationIntroduction to OSI model and Network Analyzer :- Introduction to Wireshark
Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2014 Networking Laboratory 1/56 An Overview Internet
More informationDeploying DSR in a Microsoft Windows Server 2003 or 2008 Environment
Deploying DSR in a Microsoft Windows Server 2003 or 2008 Environment This article refers to the Barracuda Load Balancer ADC and Microsoft Windows Server 2003 and 2008. To prepare servers running Microsoft
More informationTrace Collection Guidelines
Trace Collection Guidelines WiNG 5 Vik Evans Systems Engineer Enterprise Networking and Communications 1 Troubleshooting Checklist Mandatory Information ID Description Response 1 Customer 2 Perceived Problem
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationLab - Configure a NIC to Use DHCP in Windows
Introduction In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and test connectivity between two computers. Recommended Equipment Wireless router Two computers running
More informationLab IP Addresses and Network Communication
Lab 3.5.2 IP Addresses and Network Communication Objectives Build a simple peer-to-peer network and verify physical connectivity. Assign various IP addresses to hosts and observe the effects on network
More informationSharing Data between Applications Connecting 2 PC s running ic/icontrol
Sharing Data between Applications Connecting 2 PC s running ic/icontrol To connect two PC s running ic or icontrol products, you must have an Ethernet connection between them. The common situations are:
More informationNetwork Analyzer :- Introduction to Wireshark
Sungkyunkwan University Network Analyzer :- Introduction to Wireshark Syed M. Raza s.moh.raza@skku.edu H. Choo choo@skku.edu Copyright 2000-2018 Networking Laboratory Networking Laboratory 1/56 An Overview
More informationSecurity Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss18/netlab 1. Practical Training: Network planning and installation of a file server
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationEthernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview
Laboratory 1 Ethernet A Direct Link Network with Media Access Control Objective This lab is designed to demonstrate the operation of the Ethernet network. The simulation in this lab will help you examine
More informationLab 4: Network Packet Capture and Analysis using Wireshark
Lab 4: Network Packet Capture and Analysis using Wireshark 4.1 Details Aim: To provide a foundation in network packet capture and analysis. You may be faced with network traffic analysis, from traffic
More informationCS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists
CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists Name: In this lab you will learn: PartA Cisco 2600 Router Configuration Static Routing PartB 20 min Dynamic
More informationDeployment in a Microsoft Windows Server 2003, 2008, and 2012 Environment
Deployment in a Microsoft Windows Server 2003, 2008, and 2012 Environment Prepare Microsoft Windows Server 2003, 2008, and 2012 for DSR To make servers that are running Microsoft Windows Server 2003, 2008,
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationCS356 Lab NIL (Lam) In this lab you will learn: Cisco 2600 Router Configuration Static Routing PartB 20 min Access Control Lists PartC 30 min Explore!
CS356 Lab NIL (Lam) In this lab you will learn: PartA Time: 2 hrs 40 min Cisco 2600 Router Configuration Static Routing PartB 20 min Access Control Lists PartC 30 min Explore! Components used: 2 computers
More informationLab - Configure the Firewall in Windows 8
Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two computers directly connected or connected over the network Windows 8 installed
More informationConfiguring a Palo Alto Firewall in AWS
Configuring a Palo Alto Firewall in AWS Version 1.0 10/19/2015 GRANT CARMICHAEL, MBA, CISSP, RHCA, ITIL For contact information visit Table of Contents The Network Design... 2 Step 1 Building the AWS network...
More informationComputer Networks A Simple Network Analyzer Decoding Ethernet and IP headers
Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers Objectives The main objective of this assignment is to gain an understanding of network activities and network packet formats
More informationAT&T Digital Subscriber Line Service
AT&T Digital Subscriber Line Service Windows 2000 Professional PC Configuration Guide Overview Welcome to AT&T DSL Internet Service! This guide is designed to help you configure your PC to access the Internet
More informationSwitched LANs A Set of Local Area Networks Interconnected by Switches
Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help
More informationDepartment Of Computer Science
Department Of Computer Science Laboratory Manual Prepared By: Muhammad Nouman Farooq Lecturer and Course Coordinator Course: Network Security (CS-242) Page 1 of 47 Table of Contents Lab 1- Introduction
More informationPacket Capture & Wireshark. Fakrul Alam
Packet Capture & Wireshark Fakrul Alam fakrul@bdhub.com Why we need to capture packet & how it s related to security? tcpdump Definition tcpdump is a utility used to capture and analyze packets on network
More informationAccess Switch VLAN Y Y.1 /24
Topology: Fa 0/1 VNC Server Fa 0/0 Port B Access Router Trunk VLAN X Access Switch VLAN Y Backbone Router 141.85.Y.1 /24 28.0.0.42 OSPF X.0.0.0/8 Port A 27.45.67.89 Work Station DHCP Server The Goal: Connect
More informationSwitched LANs. A Set of Local Area Networks Interconnected by Switches
Laboratory 3 Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this
More informationPreLab for CS356 Lab NIL (Lam) (To be submitted when you come for the lab)
PreLab for CS356 Lab NIL (Lam) (To be submitted when you come for the lab) Name: UT EID: 1. Differentiate between Routers, Switches, and Hubs. 2. Explain subnet masks. 3. For this lab, where is subnet
More informationLab Applying a Logical Layered Model to a Physical Network
Lab 3.1.1 Applying a Logical Layered Model to a Physical Network Objective In this exercise, you will use various Cisco IOS commands and a protocol analyzer to map the layers in the OSI model to the encapsulated
More informationOrder of Packet Transmission and Dropping
Laboratory 9 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for
More informationLicense Activation Troubleshooting - Flow Planner & Workplace Planner
License Activation Troubleshooting - Flow Planner & Workplace Planner Location of License Files A standalone license will be named license.lic and can be found in the folder that contains the binaries
More informationExercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.
Exercise 1 Given the IP network below: Assign feasible IP addresses to the interfaces and write down a feasible routing table for routers A and B guaranteeing full connectivity x.x.x.33 x.x.x.254 net 131.175.16.0/24
More informationLab - Examining Telnet and SSH in Wireshark
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices
More informationApplication Note 3Com VCX Connect with SIP Trunking - Configuration Guide
Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...
More informationSecurity Lab 1 Firewall Performance
Security Lab 1 Firewall Performance This lab has been partially based on OPNET Lab Manual To Accompany Data and Computer Communications, by Kevin Brown and Leann Christianson, Prentice Hall, 2004. Objective
More informationLab 4.2.5a Connectivity Tests Ping
Lab 4.2.5a Connectivity Tests Ping Objective Use the ping command to send ICMP datagrams to target host. Verify that the network layer between source and destination is working properly. Retrieve information
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationK2289: Using advanced tcpdump filters
K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering
More informationCisco CCNA Basic IP Routing Part I
Cisco CCNA Basic IP Routing Part I Cisco CCNA IP Routing In this chapter, we re to discuss the IP routing process. This is an important subject to understand since it pertains to all routers and configurations
More informationNavigating a Database Efficiently
Navigating a Database Efficiently 1 Navigating a Database Efficiently THE BOTTOM LINE Often, the people who use a database are not the same people who create a database, and thus they may have difficulty
More informationDHCP in. Introduction. Step 1 router. In this lab, you. computer. Page 1 of 7
Essentials 5.0 6.3.2.7 Lab - Configure a NIC to Use DHCP in Windows 7 Introduction Print and complete this lab. In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and testt
More informationHow to Configure a Remote Management Tunnel for Barracuda NG Firewalls
How to Configure a Remote Management Tunnel for Barracuda NG Firewalls If the managed NG Firewall can not directly reach the NG Control Center it must connect via a remote management tunnel. The remote
More informationCCNA MCQS with Answers Set-1
CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.
More informationOrder of Packet Transmission and Dropping
LAB 11 Queuing Disciplines Order of Packet Transmission and Dropping OBJECTIVES The objective of this lab is to examine the effect of various queuing disciplines on packet delivery and delay for different
More informationChapter 6. The Protocol TCP/IP. Introduction to Protocols
Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following
More informationWhatsConnected v3.5 User Guide
WhatsConnected v3.5 User Guide Contents Table of Contents Welcome to WhatsConnected Finding more information and updates... 5 Installing and Configuring WhatsConnected System requirements... 6 Installation
More informationSmartPath EMS VMA Virtual Appliance Quick Start Guide
LWN600VMA SmartPath Enterprise Wireless System Virtual Appliance SmartPath EMS VMA Virtual Appliance Quick Start Guide Provides the speed, range, security, adapability, and manageability to replace wired
More informationThis tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found
FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while
More informationNetworking By: Vince
Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that
More informationChapter 1 Introduction to TCP/IP
Chapter 1 Introduction to TCP/IP Published: November 02, 2004 Updated: April 16, 2007 Writer: Joe Davies 1 Abstract This chapter introduces Transmission Control Protocol/Internet Protocol (TCP/IP), both
More informationTCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER
CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a
More information1. Which OSI layers offers reliable, connection-oriented data communication services?
CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.
More informationLab 9.6.2: Challenge EIGRP Configuration Lab
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway HQ BRANCH1 BRANCH2 PC1 PC2 PC3 Fa0/0 S0/0/0 S0/0/1 Lo1 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/0 S0/0/1 NIC NIC NIC All
More informationLab 6: Evaluating Firewall Policies to Manage Network Traffic
Lab 6: Evaluating Firewall Policies to Manage Network Traffic Objective This lab teaches the fundamentals of implementing firewall policies and understanding its effect on application performance and link
More informationTo start using Opnet modeller, select the program icon from the programs menu.
Lab 1, Getting Started with Opnet Modeler Creating a new Project To start using Opnet modeller, select the program icon from the programs menu. - The Opnet modeller program icon. Once the program has initialised
More informationObjective To examine the change in throughput in a local area network when upgrading from a hub to a switch.
Lab 2 Switches versus Hubs Overview Ethernet hubs work at the physical layer, simply repeating any frames they receive on one port onto all other ports. For this reason, they are also called multiport
More informationTable of Contents. i-vu Open Link
i-vu Open Link Modbus TCP/IP Integration Guide CARRIER CORPORATION 2011 A member of the United Technologies Corporation family Stock symbol UTX Catalog No. 11-808-479-01 3/18/2011 Table of Contents Overview...
More informationEASE Vehicle Interface Setup Instructions
USB Interface Setup Note: These directions should be followed only after the EASE Scan Tool has been installed. Note: Visit www.fixcarsfaster.com for video setup instructions to supplement these instructions.
More informationCCRI Networking Technology I CSCO-1850 Spring 2014
CCRI Networking Technology I CSCO-1850 Spring 2014 Instructor John Mowry Telephone 401-825-2138 E-mail jmowry@ccri.edu Office Hours Room 2126 Class Sections 102 Monday & Wednesday 6:00PM-9:50PM, starts
More informationPacket Sniffing and Spoofing
Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du Packet Sniffing and Spoofing Chester Rebeiro IIT Madras Shared Networks Every network packet reaches every
More informationNET+Works with GNU Tools Tutorial
NET+Works with GNU Tools Tutorial NET+Works with GNU Tools Tutorial Operating system/version: 6.2 Part number/version: 90000697_B Release date: April 2005 www.netsilicon.com 2001-2005 NetSilicon, Inc.Printed
More information8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista
8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and
More informationConfiguring IPv4. Finding Feature Information. This chapter contains the following sections:
This chapter contains the following sections: Finding Feature Information, page 1 Information About IPv4, page 2 Virtualization Support for IPv4, page 6 Licensing Requirements for IPv4, page 6 Prerequisites
More informationNETWORK LAB 2 Configuring Switch Desktop
Configuring Switch 1. Select the switch tab and then add a switch from the list of switches we have to the workspace, we will choose (2950-24) switch. 2. Add a number of PCs next to the switch in order
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationChapter 10 - Configure ASA Basic Settings and Firewall using ASDM
Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.
More informationLab Troubleshooting RIP
Lab 7.2.6 Troubleshooting RIP Objective Set up an IP addressing scheme using class B networks. Configure RIP on routers. Observe routing activity using the debug ip rip command. Examine routes using the
More informationComputer Network. The Practical User Guide for. Simulation. Adarshpal S. Hnatyshin. Vasil Y. CRC Press. Taylor Si Francis Croup
The Practical OPNET@ User Guide for Computer Network Simulation Adarshpal S. Sethi Vasil Y. Hnatyshin CRC Press Taylor Si Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
More informationWireshark Lab Ethernet And Arp Solution
We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with wireshark lab ethernet
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More informationLab 5.6.2: Challenge RIP Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway BRANCH HQ ISP PC1 PC2 PC3 Fa0/0 S0/0/0 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/1 NIC NIC NIC Learning Objectives Upon completion
More informationBrush Electronics POC UDP Client and UDP Server Technical Note
PIC18Fxxxx / ENC28J60 Proof of Concept UDP Client and UDP Server Solution 28 August 2006 2003-2006 Andrew Smallridge asmallri@brushelectronics.com www.brushelectronics.com This Technical note describes
More informationHow to Configure a Remote Management Tunnel for an F-Series Firewall
How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.
More informationTroubleshooting Can not access the router on
Troubleshooting Can not access the router on 192.168.0.1 Please note that when accessing the router s Web interface via http://192.168.0.1 you are not accessing some web site on the Internet. The router
More informationOVERVIEW WARNING! DATE: INFORMÁTICAS LAB ASSIGNMENT 3
PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 3 DATE: 2010.11 OVERVIEW The Internet can be used to transmit data from a variety of applications across an infrastructure shared by millions
More informationComputer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic
Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network
More informationLab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 HQ S0/0/0 S0/0/1 Lo1 10.10.10.1 255.255.255.252 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1
More informationPacket Analysis - Wireshark
Packet Analysis - Wireshark Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea Why do we need to capture packet & how is it relevant to security? tcpdump tcpdump is a utility used
More informationPMT-Series Encrypted Ethernet Tunnel
PMT-Series Encrypted Ethernet Tunnel Product Family User s Guide Revised September 20, 2007 Firmware Version 1.x FCC Statement This device complies with the limits for a Class A digital device, pursuant
More informationLab 7.1.9b Introduction to Fluke Protocol Inspector
Lab 7.1.9b Introduction to Fluke Protocol Inspector Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network traffic and data frames. This lab
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More informationComputer Networks Security: intro. CS Computer Systems Security
Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication
More informationExercises: Basics of Network Layer Experiential Learning Workshop
Exercises: Basics of Network Layer Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents
More informationCTS2134 Introduction to Networking. Module : Troubleshooting
CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server
More informationThe following virtual machines are required for completion of this lab: Exercise I: Mapping a Network Topology Using
Module 08: Sniffers Objective The objective of this lab is to make students learn to sniff a network and analyze packets for any attacks on the network. The primary objectives of this lab are to: Sniff
More informationIntroduction to Firewalls using IPTables
Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your
More informationWindows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication
Windows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication May 2014 Version 4 PLEASE READ BEFORE CONTINUING: This document applies
More informationTCP/IP Diagnostic Utilities on Windows 2008 Server
TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP
More informationThis is a sample Lab report from ECE 461 from previous years. L A B 6
This is a sample Lab report from ECE 461 from previous years. L A B 6 Part 1 1. o the source and destination M A C/IP addresses change when a packet traverses a bridge? Provide an explanation and include
More informationIf you re not using Microsoft Hyper-V 2012, your screens may vary.
If you re not using Microsoft Hyper-V 2012, your screens may vary. VELOCITY REPLICATION ACCELERATOR Microsoft Hyper-V Hypervisor Server Mode (Single-Interface Deployment) 2013 Silver Peak Systems, Inc.
More informationIP Routing & Bridging
CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If
More information( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board
IJ3000 Controller IJ3000 Firmware Upgrade Process 5760-136 Revision D Page 1 of 12 These instructions assume you already know how to change the IP address of your computer, create directories and copy
More information