Introduction to SITL. Objective

Size: px
Start display at page:

Download "Introduction to SITL. Objective"

Transcription

1 Introduction to SITL Objective This tutorial provides a quick introduction to System-in-the-Loop (SITL) functionality, which allows physical hardware and a simulation to interact as a unified system. It shows how you can use SITL to do the following: Allow physical hardware to interact with a simulation Allow multiple physical networks to communicate through a simulation After you finish this tutorial, you will know how to use Modeler and SITL to incorporate physical hardware in a simulation. 1

2 Before You Begin To do this tutorial, you should: Know how to use Modeler to build network models and run simulations Know how to configure Ethernet interfaces and firewalls on your computer If you are new to Modeler, we suggest that you do one or more basic tutorials (such as Small Internetworks) before doing this one. You will need the following items to complete this tutorial: Modeler (Release 14.5 or later) SITL license A computer on which to run the software. This computer needs one or more Ethernet interfaces: One dedicated interface is needed for the real sim scenario A second dedicated interface is needed for the real sim real scenario 2

3 A third interface might be needed to let Modeler contact an OPNET license server (not needed if a license server is running on the local computer or if Modeler is running in Standalone license mode) Note Each network interface card (NIC) used for a SITL interface must be compatible with the Pcap library that SITL uses to capture and send packets. You can check for supported cards at the website for the Pcap library used by SITL: Winpcap on Windows ( and libpcap on Linux ( (SITL prints the Pcap library version being used at the beginning of each simulation.) One or two additional computers to represent the physical hardware in the simulations 3

4 Tasklist The tasks you will perform in this tutorial comprise the following procedures: Task 1 Preparing the simulation environment Preparing the hardware Preparing the Modeler software Task 2 Creating a Real Sim Scenario Creating the simulated network Running the simulation Sending packets through the simulation Task 3 Creating a Real Sim Real Scenario Creating the simulated network Running the simulation Sending packets through the simulation 4

5 Preparing the Simulation Environment In this task, you will set up Modeler and the computers to be used so that they are ready to run a SITL simulation. Prepare the Hardware 1 Select two, three, or four computers to use, as follows: Hardware for SITL Simulation License server Real 1 SITL Real 2 Real1 Represents a physical network or piece of hardware. Required. SITL Runs the Modeler and SITL software. Required. 5

6 Real2 Represents a second physical network or piece of hardware. Required only for the Real Sim Real scenario. License server Required only if Modeler needs a remote license server. (We recommend using a local license server or running Modeler in Standalone license mode.) Note the following: All computers must be able to communicate with each other as indicated by the links in the preceding figure. The links are Ethernet connections, either direct or through a network. The SITL computer must be running a version of Windows or Linux supported by Modeler and SITL. Real1 and Real2 can be running any operating system. 2 Set up the Ethernet interfaces on the SITL computer. 2.1 At a minimum, set the IP address, mask, and gateway for each SITL interface. Each IP address must be unique on the connected network. The mask and gateway should be appropriate for connection to the physical hardware. 6

7 2.2 If the SITL computer is running Windows, disable Netbios over TCP/IP and all items on the connection except Internet Protocol (TCP/IP). 3 Set up a firewall on the SITL computer for the interfaces that are going to be used in the SITL simulation. The firewall should not allow any exceptions, so as to prevent the operating system from interfering with SITL. On Windows, you can use the built-in firewall or other firewalls installed on your system. Some third-party firewalls (such as ZoneAlarm) interfere with Pcap, however; if you have one of those, you will have to disable it and use the Windows firewall instead. Note Do not put a firewall on the interface to a remote license server, if any. 7

8 Prepare the Modeler Software SITL models are not included in the default repository, so you must disable the use of repositories. This will cause all models to be rebuilt the first time you run a simulation. 1 Start Modeler. 2 Choose Edit > Preferences. 3 Locate the Network Simulation Repositories preference and delete the stdmod entry. 4 Close the Preferences Editor. 8

9 Real Sim Scenario This scenario models communications between two computers. One computer is the physical computer Real1. The other computer is a workstation modeled in a simulation running on the SITL computer. The simulation will comprise two nodes, one representing the connection to the physical computer and the other being the simulated workstation. Real Sim Scenario Real 1 SITL 9

10 Build and Configure the Simulated Network You already have the Real1 and SITL computers connected to each other. Now you ll create the simulated network that will run on the SITL computer. 1 Create a new project with an empty scenario. In the Startup Wizard: 1.1 Name the project SITL_Sample and the scenario real_sim. 1.2 Select the Office network scale and use the default size. 1.3 Include the ethernet_advanced and SITL model families. 2 Open the Object Palette. 3 Locate the node model called sitl_virtual_gateway_to_real_world. Drop an instance of this model into the workspace and rename it sitl. 4 Locate the node model called ethernet_wkstn_adv. Drop an instance of this model into the workspace and rename it wkstn. 10

11 5 Locate the link model called sitl_virtual_eth_link and use it to connect the sitl gateway node to the wkstn node. The network model should now resemble the following figure. Real Sim Model 6 Close the Object Palette. 7 Edit the attributes on the sitl node: 7.1 Choose your interface from the Source IP and Ethernet Mac Address pull-down list. This should be the NIC you are using for this simulation. Choosing the Interface 11

12 7.2 Set the Incoming Packet Filter String attribute to (arp or icmp) and ether src <SOURCE_MAC_ADDRESS>, where <SOURCE_MAC_ADDRESS> is the MAC address of the interface on Real1 that will be sending packets to SITL. Note This is NOT the interface used by the computer running Modeler. It resides on the external computer (Real1) that is connected to the SITL interface. 7.3 Close the Attributes dialog box. 8 Edit the attributes on the wkstn node: 8.1 Expand the IP > IP Host Parameters > Interface Information tree and set the Address and Subnet Mask attributes. The address must be unique in both the physical and simulated networks (that is, it must be different from the addresses used by the Real1 and SITL computers). The address must be in the same subnet as Real1. 12

13 8.2 Expand the Ethernet > Ethernet Parameters tree and set the Address attribute to 3 (or any single-digit number greater than zero). Some real systems don t like zero for Ethernet addresses and using a small number will be useful in debugging later on. Like all Ethernet addresses, this should be unique in your system. 8.3 Close the Attributes dialog box. 13

14 Run the Simulation You now are ready to configure and run the simulation. While the simulation is running, you will test it by pinging the simulated workstation from the external computer (Real1) and observing the response. 1 Open the Configure/Run DES dialog box. If necessary, click the Detailed button to display the detailed version of the dialog box. 2 Set Simulation Kernel to Development. You can run SITL simulations in optimized or development mode. We ll use development here in case you want to examine the internal operation of the simulation. 3 Modeler uses various techniques to make discrete event simulations more efficient (such as pre-assigning routing tables instead of computing them). To prevent these techniques from affecting the simulation, you should disable simulation efficiency for the protocols you will be using with SITL. To do so: 3.1 In the left pane, expand the tree to Inputs > Global Attributes. 14

15 3.2 In the Global Attributes pane, expand Simulation Efficiency and disable ARP Sim Efficiency. Note You can click on the question mark to see a description of this Sim Efficiency technique. 4 Because we want to coordinate the simulation with real hardware, we must constrain it to run at a real-time speed. 4.1 In the left pane, expand the tree to Execution > Advanced > Kernel Preferences. 4.2 In the Kernel Preferences pane, set Real-time execution ratio to 1. 5 Click Run. After the model library has been recompiled, the simulation runs. You should get output similar to the following figure. 15

16 Simulation Progress Output Also, you can look in the Simulation Console to verify that your SITL gateway was successfully matched to the physical interface, as shown in the following figure. 16

17 Simulation Console Output 17

18 Send Packets Through the Simulation To demonstrate that the physical hardware and simulated workstation are working together as a single network, ping the simulated workstation from Real1 and view the response. 1 On Real1, enter the ping command: Windows: ping -t <wkstn_addr> Linux: ping <wkstn_addr> where <wkstn_addr> is the IP address you entered when you configured the wkstn node. This will cause ICMP echo request packets to be sent to the simulated workstation via SITL. Ping replies appear on Real1. 2 When you are finished looking at the replies, stop the simulation. If you don t get any replies to the ping, verify that you have configured everything correctly. If necessary, look at the Troubleshooting SITL Simulations section in the SITL User Guide. You can observe the packets being sent with a packet capture utility such as Wireshark or by running the simulation with the OPNET Simulation Debugger (ODB) enabled and turning on SITL tracing (with the ltrace sitl command). 18

19 Real Sim Real Scenario This scenario models communications between two physical nodes by way of a simulated network. The model will comprise three nodes, two representing the physical hardware (with a SITL interface for each) and the third being a simulated network switch. Real Sim Real Scenario Real 1 SITL Real 2 Note If you do not have two dedicated Ethernet interfaces available in the SITL computer, skip this scenario and go to the Summary. 19

20 Build and Configure the Simulated Network To create the simulated network for this scenario, you ll duplicate the previous scenario, change the workstation to a switch, and add a second SITL interface to connect to the Real2 computer. 1 Duplicate the real_sim scenario and name it real_sim_real. 2 Rename the sitl node to sitl1. If you are using the same computer for Real1 as in the previous scenario, this node needs no further configuration. If you are using a different computer, change the Incoming Packet Filter String attribute to include the MAC address of the new computer. 3 Edit the attributes of the wkstn node: Change name to switch. Select the Advanced checkbox, then change model to ethernet16_switch_adv. 4 Open the Object Palette. 20

21 5 Locate the node model called sitl_virtual_gateway_to_real_world and drop a new instance of this model into the workspace. Name it sitl2. 6 Locate the link model called sitl_virtual_eth_link and use it to connect switch to sitl2. 7 Close the Object Palette. The network model should now resemble the following figure. Real Sim Real Model 8 Edit the attributes on the sitl2 node: 8.1 Choose your interface from the Source IP and Ethernet Mac Address pull-down list. This is the interface on the SITL computer that connects (either directly or through a network) to Real2. Do not use the same interface used by the sitl1 node. 8.2 Set the Incoming Packet Filter String attribute to (arp or icmp) and ether src <SOURCE_MAC_ADDRESS>, where 21

22 <SOURCE_MAC_ADDRESS> is the MAC address of the interface on Real2 that will be sending packets to SITL. Note This is NOT the interface used by the computer running Modeler. It resides on the external computer (Real2) that is connected to this SITL interface. 8.3 Close the attributes dialog box. 22

23 Run the Simulation You now are ready to configure and run the simulation. While the simulation is running, you will test it by streaming video through the simulated switch from one external computer to the other. 1 Open the Configure/Run DES dialog box. If necessary, click the Detailed button to display the detailed version of the dialog box. 2 Set Simulation Kernel to Development. 3 Confirm that the simulation will run at a real-time speed: 3.1 In the left pane, expand the tree to Execution > Advanced > Kernel Preferences. 3.2 In the Kernel Preferences pane, verify that Real-time execution ratio is set to 1. 4 Click Run. The simulation runs. You should get output similar to the following figure. 23

24 Simulation Progress Output Also, you can look in the Simulation Console to verify that both SITL gateways were successfully matched to physical interfaces, as shown in the following figure. 24

25 Simulation Console Output 25

26 Send Packets Through the Simulation To demonstrate that the simulated switch is routing traffic between the two physical computers, you can stream video from Real1 to Real2 through the SITL simulation. Note If you prefer, you can skip the steps in this section and demonstrate connectivity simply by pinging Real2 from Real1 or Real1 from Real2. To use video streaming, you need applications that can stream and receive video. This tutorial uses VLC media player, a free program available at However, you can use any suitable program you have available. 1 On computer Real2, install and start VLC media player. We ll call this instance of the program MP2. 2 Configure MP2 to receive and play a video stream by listening on UDP port 1234 (or any other available UDP port). 2.1 Choose File > Open Network Stream 2.2 Select the UDP/RTP radio button and set Port to

27 VLC Media Player Setup for MP2: Open Network Stream 2.3 Click OK. 3 On computer Real1, install and start another instance of VLC media player (called MP1). 4 Configure MP1 to play a video file (or DVD) and stream the video to computer Real2, using the same UDP port you set up for MP Select the video source: To play a video file, choose File > Open File, click Browse, and select a video file. 27

28 VLC Media Player Setup for MP1: Open File To play video from a DVD, choose File > Open Disc and enter the device name. 4.2 Select the Stream/Save checkbox and click Settings The Stream output dialog box opens. 4.3 Select the UDP checkbox. 4.4 Set Address to the physical IP address of computer Real2 and Port to

29 VLC Media Player Setup for MP2: Streaming Video 4.5 Click OK twice to close both dialog boxes. You should see the video being played in MP2 on computer Real2. Note If you don t see video, make sure MP1 and MP2 are not paused. 29

30 5 When you are finished with the video, stop MP1 and MP2, then stop the simulation. 30

31 Summary You ve seen how to use System-in-the-Loop functionality to map physical interfaces to addresses in a simulated network. In this tutorial, you have Build and run a SITL system in which physical hardware interacts with a simulation Build and run a SITL system that allowed multiple physical networks to communicate through a simulation For further information about SITL, read the SITL User Guide in the online documentation. 31

LAN Modeling. Overview

LAN Modeling. Overview LAN Modeling Overview This lesson focuses on the use of LAN models and background link utilization. You will learn to Configure the object palette with the models you need Set up application and profile

More information

This document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com].

This document presents the basics of OPNET Modeler. The content of this document is mainly transcript from the OPNET documentation [www.opnet.com]. Instituto Superior de Engenharia do Porto (ISEP) Departamento de Engenharia Informática (DEI) Mestrado em Engenharia Informática (MEI) Área: Arquitectura, Sistemas e Redes Sistemas Móveis (SIMOV) Paulo

More information

Network Design. Planning a Network with Different Users, Hosts, and Services. Laboratory. Objective. Overview

Network Design. Planning a Network with Different Users, Hosts, and Services. Laboratory. Objective. Overview Laboratory 4 Network Design Planning a Network with Different Users, Hosts, and Services Objective The objective of this lab is to demonstrate the basics of designing a network, taking into consideration

More information

Introduction to the Packet Tracer Interface using a Hub Topology

Introduction to the Packet Tracer Interface using a Hub Topology Introduction to Packet Tracer What is Packet Tracer? Packet Tracer is a protocol simulator developed by Dennis Frezzo and his team at Cisco Systems. Packet Tracer (PT) is a powerful and dynamic tool that

More information

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Communication Networks [Netw501] Spring 2018 Tutorial 3 Packet Tracer Activity 3 Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Introduction: In Packet Tracer simulation mode, detailed

More information

Lab I: Using tcpdump and Wireshark

Lab I: Using tcpdump and Wireshark Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html

More information

Lab - Using Wireshark to Examine TCP and UDP Captures

Lab - Using Wireshark to Examine TCP and UDP Captures Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.

More information

3D Network Visualizer

3D Network Visualizer 3D Network Visualizer Objective 3D Network Visualizer (3DNV) functionality lets you create three-dimensional animations based on topology information, node relationships, performance statistics, and terrain

More information

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark

More information

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2014 Networking Laboratory 1/56 An Overview Internet

More information

Deploying DSR in a Microsoft Windows Server 2003 or 2008 Environment

Deploying DSR in a Microsoft Windows Server 2003 or 2008 Environment Deploying DSR in a Microsoft Windows Server 2003 or 2008 Environment This article refers to the Barracuda Load Balancer ADC and Microsoft Windows Server 2003 and 2008. To prepare servers running Microsoft

More information

Trace Collection Guidelines

Trace Collection Guidelines Trace Collection Guidelines WiNG 5 Vik Evans Systems Engineer Enterprise Networking and Communications 1 Troubleshooting Checklist Mandatory Information ID Description Response 1 Customer 2 Perceived Problem

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Lab - Configure a NIC to Use DHCP in Windows

Lab - Configure a NIC to Use DHCP in Windows Introduction In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and test connectivity between two computers. Recommended Equipment Wireless router Two computers running

More information

Lab IP Addresses and Network Communication

Lab IP Addresses and Network Communication Lab 3.5.2 IP Addresses and Network Communication Objectives Build a simple peer-to-peer network and verify physical connectivity. Assign various IP addresses to hosts and observe the effects on network

More information

Sharing Data between Applications Connecting 2 PC s running ic/icontrol

Sharing Data between Applications Connecting 2 PC s running ic/icontrol Sharing Data between Applications Connecting 2 PC s running ic/icontrol To connect two PC s running ic or icontrol products, you must have an Ethernet connection between them. The common situations are:

More information

Network Analyzer :- Introduction to Wireshark

Network Analyzer :- Introduction to Wireshark Sungkyunkwan University Network Analyzer :- Introduction to Wireshark Syed M. Raza s.moh.raza@skku.edu H. Choo choo@skku.edu Copyright 2000-2018 Networking Laboratory Networking Laboratory 1/56 An Overview

More information

Security Labs in OPNET IT Guru

Security Labs in OPNET IT Guru Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss18/netlab 1. Practical Training: Network planning and installation of a file server

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Ethernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview

Ethernet. A Direct Link Network with Media Access Control. Laboratory 1. Objective. Overview Laboratory 1 Ethernet A Direct Link Network with Media Access Control Objective This lab is designed to demonstrate the operation of the Ethernet network. The simulation in this lab will help you examine

More information

Lab 4: Network Packet Capture and Analysis using Wireshark

Lab 4: Network Packet Capture and Analysis using Wireshark Lab 4: Network Packet Capture and Analysis using Wireshark 4.1 Details Aim: To provide a foundation in network packet capture and analysis. You may be faced with network traffic analysis, from traffic

More information

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists Name: In this lab you will learn: PartA Cisco 2600 Router Configuration Static Routing PartB 20 min Dynamic

More information

Deployment in a Microsoft Windows Server 2003, 2008, and 2012 Environment

Deployment in a Microsoft Windows Server 2003, 2008, and 2012 Environment Deployment in a Microsoft Windows Server 2003, 2008, and 2012 Environment Prepare Microsoft Windows Server 2003, 2008, and 2012 for DSR To make servers that are running Microsoft Windows Server 2003, 2008,

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

CS356 Lab NIL (Lam) In this lab you will learn: Cisco 2600 Router Configuration Static Routing PartB 20 min Access Control Lists PartC 30 min Explore!

CS356 Lab NIL (Lam) In this lab you will learn: Cisco 2600 Router Configuration Static Routing PartB 20 min Access Control Lists PartC 30 min Explore! CS356 Lab NIL (Lam) In this lab you will learn: PartA Time: 2 hrs 40 min Cisco 2600 Router Configuration Static Routing PartB 20 min Access Control Lists PartC 30 min Explore! Components used: 2 computers

More information

Lab - Configure the Firewall in Windows 8

Lab - Configure the Firewall in Windows 8 Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two computers directly connected or connected over the network Windows 8 installed

More information

Configuring a Palo Alto Firewall in AWS

Configuring a Palo Alto Firewall in AWS Configuring a Palo Alto Firewall in AWS Version 1.0 10/19/2015 GRANT CARMICHAEL, MBA, CISSP, RHCA, ITIL For contact information visit Table of Contents The Network Design... 2 Step 1 Building the AWS network...

More information

Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers

Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers Objectives The main objective of this assignment is to gain an understanding of network activities and network packet formats

More information

AT&T Digital Subscriber Line Service

AT&T Digital Subscriber Line Service AT&T Digital Subscriber Line Service Windows 2000 Professional PC Configuration Guide Overview Welcome to AT&T DSL Internet Service! This guide is designed to help you configure your PC to access the Internet

More information

Switched LANs A Set of Local Area Networks Interconnected by Switches

Switched LANs A Set of Local Area Networks Interconnected by Switches Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help

More information

Department Of Computer Science

Department Of Computer Science Department Of Computer Science Laboratory Manual Prepared By: Muhammad Nouman Farooq Lecturer and Course Coordinator Course: Network Security (CS-242) Page 1 of 47 Table of Contents Lab 1- Introduction

More information

Packet Capture & Wireshark. Fakrul Alam

Packet Capture & Wireshark. Fakrul Alam Packet Capture & Wireshark Fakrul Alam fakrul@bdhub.com Why we need to capture packet & how it s related to security? tcpdump Definition tcpdump is a utility used to capture and analyze packets on network

More information

Access Switch VLAN Y Y.1 /24

Access Switch VLAN Y Y.1 /24 Topology: Fa 0/1 VNC Server Fa 0/0 Port B Access Router Trunk VLAN X Access Switch VLAN Y Backbone Router 141.85.Y.1 /24 28.0.0.42 OSPF X.0.0.0/8 Port A 27.45.67.89 Work Station DHCP Server The Goal: Connect

More information

Switched LANs. A Set of Local Area Networks Interconnected by Switches

Switched LANs. A Set of Local Area Networks Interconnected by Switches Laboratory 3 Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this

More information

PreLab for CS356 Lab NIL (Lam) (To be submitted when you come for the lab)

PreLab for CS356 Lab NIL (Lam) (To be submitted when you come for the lab) PreLab for CS356 Lab NIL (Lam) (To be submitted when you come for the lab) Name: UT EID: 1. Differentiate between Routers, Switches, and Hubs. 2. Explain subnet masks. 3. For this lab, where is subnet

More information

Lab Applying a Logical Layered Model to a Physical Network

Lab Applying a Logical Layered Model to a Physical Network Lab 3.1.1 Applying a Logical Layered Model to a Physical Network Objective In this exercise, you will use various Cisco IOS commands and a protocol analyzer to map the layers in the OSI model to the encapsulated

More information

Order of Packet Transmission and Dropping

Order of Packet Transmission and Dropping Laboratory 9 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for

More information

License Activation Troubleshooting - Flow Planner & Workplace Planner

License Activation Troubleshooting - Flow Planner & Workplace Planner License Activation Troubleshooting - Flow Planner & Workplace Planner Location of License Files A standalone license will be named license.lic and can be found in the folder that contains the binaries

More information

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x. Exercise 1 Given the IP network below: Assign feasible IP addresses to the interfaces and write down a feasible routing table for routers A and B guaranteeing full connectivity x.x.x.33 x.x.x.254 net 131.175.16.0/24

More information

Lab - Examining Telnet and SSH in Wireshark

Lab - Examining Telnet and SSH in Wireshark Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices

More information

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...

More information

Security Lab 1 Firewall Performance

Security Lab 1 Firewall Performance Security Lab 1 Firewall Performance This lab has been partially based on OPNET Lab Manual To Accompany Data and Computer Communications, by Kevin Brown and Leann Christianson, Prentice Hall, 2004. Objective

More information

Lab 4.2.5a Connectivity Tests Ping

Lab 4.2.5a Connectivity Tests Ping Lab 4.2.5a Connectivity Tests Ping Objective Use the ping command to send ICMP datagrams to target host. Verify that the network layer between source and destination is working properly. Retrieve information

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Cisco CCNA Basic IP Routing Part I

Cisco CCNA Basic IP Routing Part I Cisco CCNA Basic IP Routing Part I Cisco CCNA IP Routing In this chapter, we re to discuss the IP routing process. This is an important subject to understand since it pertains to all routers and configurations

More information

Navigating a Database Efficiently

Navigating a Database Efficiently Navigating a Database Efficiently 1 Navigating a Database Efficiently THE BOTTOM LINE Often, the people who use a database are not the same people who create a database, and thus they may have difficulty

More information

DHCP in. Introduction. Step 1 router. In this lab, you. computer. Page 1 of 7

DHCP in. Introduction. Step 1 router. In this lab, you. computer. Page 1 of 7 Essentials 5.0 6.3.2.7 Lab - Configure a NIC to Use DHCP in Windows 7 Introduction Print and complete this lab. In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and testt

More information

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls How to Configure a Remote Management Tunnel for Barracuda NG Firewalls If the managed NG Firewall can not directly reach the NG Control Center it must connect via a remote management tunnel. The remote

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

Order of Packet Transmission and Dropping

Order of Packet Transmission and Dropping LAB 11 Queuing Disciplines Order of Packet Transmission and Dropping OBJECTIVES The objective of this lab is to examine the effect of various queuing disciplines on packet delivery and delay for different

More information

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

Chapter 6. The Protocol TCP/IP. Introduction to Protocols Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following

More information

WhatsConnected v3.5 User Guide

WhatsConnected v3.5 User Guide WhatsConnected v3.5 User Guide Contents Table of Contents Welcome to WhatsConnected Finding more information and updates... 5 Installing and Configuring WhatsConnected System requirements... 6 Installation

More information

SmartPath EMS VMA Virtual Appliance Quick Start Guide

SmartPath EMS VMA Virtual Appliance Quick Start Guide LWN600VMA SmartPath Enterprise Wireless System Virtual Appliance SmartPath EMS VMA Virtual Appliance Quick Start Guide Provides the speed, range, security, adapability, and manageability to replace wired

More information

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found

This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found FTP Application Overview This tutorial shows how to use ACE to Identify the true causes of poor response time Document the problems that are found The screen images in this tutorial were captured while

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

Chapter 1 Introduction to TCP/IP

Chapter 1 Introduction to TCP/IP Chapter 1 Introduction to TCP/IP Published: November 02, 2004 Updated: April 16, 2007 Writer: Joe Davies 1 Abstract This chapter introduces Transmission Control Protocol/Internet Protocol (TCP/IP), both

More information

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

Lab 9.6.2: Challenge EIGRP Configuration Lab

Lab 9.6.2: Challenge EIGRP Configuration Lab Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway HQ BRANCH1 BRANCH2 PC1 PC2 PC3 Fa0/0 S0/0/0 S0/0/1 Lo1 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/0 S0/0/1 NIC NIC NIC All

More information

Lab 6: Evaluating Firewall Policies to Manage Network Traffic

Lab 6: Evaluating Firewall Policies to Manage Network Traffic Lab 6: Evaluating Firewall Policies to Manage Network Traffic Objective This lab teaches the fundamentals of implementing firewall policies and understanding its effect on application performance and link

More information

To start using Opnet modeller, select the program icon from the programs menu.

To start using Opnet modeller, select the program icon from the programs menu. Lab 1, Getting Started with Opnet Modeler Creating a new Project To start using Opnet modeller, select the program icon from the programs menu. - The Opnet modeller program icon. Once the program has initialised

More information

Objective To examine the change in throughput in a local area network when upgrading from a hub to a switch.

Objective To examine the change in throughput in a local area network when upgrading from a hub to a switch. Lab 2 Switches versus Hubs Overview Ethernet hubs work at the physical layer, simply repeating any frames they receive on one port onto all other ports. For this reason, they are also called multiport

More information

Table of Contents. i-vu Open Link

Table of Contents. i-vu Open Link i-vu Open Link Modbus TCP/IP Integration Guide CARRIER CORPORATION 2011 A member of the United Technologies Corporation family Stock symbol UTX Catalog No. 11-808-479-01 3/18/2011 Table of Contents Overview...

More information

EASE Vehicle Interface Setup Instructions

EASE Vehicle Interface Setup Instructions USB Interface Setup Note: These directions should be followed only after the EASE Scan Tool has been installed. Note: Visit www.fixcarsfaster.com for video setup instructions to supplement these instructions.

More information

CCRI Networking Technology I CSCO-1850 Spring 2014

CCRI Networking Technology I CSCO-1850 Spring 2014 CCRI Networking Technology I CSCO-1850 Spring 2014 Instructor John Mowry Telephone 401-825-2138 E-mail jmowry@ccri.edu Office Hours Room 2126 Class Sections 102 Monday & Wednesday 6:00PM-9:50PM, starts

More information

Packet Sniffing and Spoofing

Packet Sniffing and Spoofing Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du Packet Sniffing and Spoofing Chester Rebeiro IIT Madras Shared Networks Every network packet reaches every

More information

NET+Works with GNU Tools Tutorial

NET+Works with GNU Tools Tutorial NET+Works with GNU Tools Tutorial NET+Works with GNU Tools Tutorial Operating system/version: 6.2 Part number/version: 90000697_B Release date: April 2005 www.netsilicon.com 2001-2005 NetSilicon, Inc.Printed

More information

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista 8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and

More information

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

Configuring IPv4. Finding Feature Information. This chapter contains the following sections: This chapter contains the following sections: Finding Feature Information, page 1 Information About IPv4, page 2 Virtualization Support for IPv4, page 6 Licensing Requirements for IPv4, page 6 Prerequisites

More information

NETWORK LAB 2 Configuring Switch Desktop

NETWORK LAB 2 Configuring Switch Desktop Configuring Switch 1. Select the switch tab and then add a switch from the list of switches we have to the workspace, we will choose (2950-24) switch. 2. Add a number of PCs next to the switch in order

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.

More information

Lab Troubleshooting RIP

Lab Troubleshooting RIP Lab 7.2.6 Troubleshooting RIP Objective Set up an IP addressing scheme using class B networks. Configure RIP on routers. Observe routing activity using the debug ip rip command. Examine routes using the

More information

Computer Network. The Practical User Guide for. Simulation. Adarshpal S. Hnatyshin. Vasil Y. CRC Press. Taylor Si Francis Croup

Computer Network. The Practical User Guide for. Simulation. Adarshpal S. Hnatyshin. Vasil Y. CRC Press. Taylor Si Francis Croup The Practical OPNET@ User Guide for Computer Network Simulation Adarshpal S. Sethi Vasil Y. Hnatyshin CRC Press Taylor Si Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Wireshark Lab Ethernet And Arp Solution

Wireshark Lab Ethernet And Arp Solution We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with wireshark lab ethernet

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

Lab 5.6.2: Challenge RIP Configuration

Lab 5.6.2: Challenge RIP Configuration Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway BRANCH HQ ISP PC1 PC2 PC3 Fa0/0 S0/0/0 Fa0/0 S0/0/0 S0/0/1 Fa0/0 S0/0/1 NIC NIC NIC Learning Objectives Upon completion

More information

Brush Electronics POC UDP Client and UDP Server Technical Note

Brush Electronics POC UDP Client and UDP Server Technical Note PIC18Fxxxx / ENC28J60 Proof of Concept UDP Client and UDP Server Solution 28 August 2006 2003-2006 Andrew Smallridge asmallri@brushelectronics.com www.brushelectronics.com This Technical note describes

More information

How to Configure a Remote Management Tunnel for an F-Series Firewall

How to Configure a Remote Management Tunnel for an F-Series Firewall How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.

More information

Troubleshooting Can not access the router on

Troubleshooting Can not access the router on Troubleshooting Can not access the router on 192.168.0.1 Please note that when accessing the router s Web interface via http://192.168.0.1 you are not accessing some web site on the Internet. The router

More information

OVERVIEW WARNING! DATE: INFORMÁTICAS LAB ASSIGNMENT 3

OVERVIEW WARNING! DATE: INFORMÁTICAS LAB ASSIGNMENT 3 PGRI PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS LAB ASSIGNMENT 3 DATE: 2010.11 OVERVIEW The Internet can be used to transmit data from a variety of applications across an infrastructure shared by millions

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask

Lab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 HQ S0/0/0 S0/0/1 Lo1 10.10.10.1 255.255.255.252 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1

More information

Packet Analysis - Wireshark

Packet Analysis - Wireshark Packet Analysis - Wireshark Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea Why do we need to capture packet & how is it relevant to security? tcpdump tcpdump is a utility used

More information

PMT-Series Encrypted Ethernet Tunnel

PMT-Series Encrypted Ethernet Tunnel PMT-Series Encrypted Ethernet Tunnel Product Family User s Guide Revised September 20, 2007 Firmware Version 1.x FCC Statement This device complies with the limits for a Class A digital device, pursuant

More information

Lab 7.1.9b Introduction to Fluke Protocol Inspector

Lab 7.1.9b Introduction to Fluke Protocol Inspector Lab 7.1.9b Introduction to Fluke Protocol Inspector Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network traffic and data frames. This lab

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information

Computer Networks Security: intro. CS Computer Systems Security

Computer Networks Security: intro. CS Computer Systems Security Computer Networks Security: intro CS 166 - Computer Systems Security A very easy network 3/14/16 Computer Networks: Intro 2 Two philosophers example Translator Language Translator Engineer Communication

More information

Exercises: Basics of Network Layer Experiential Learning Workshop

Exercises: Basics of Network Layer Experiential Learning Workshop Exercises: Basics of Network Layer Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server

More information

The following virtual machines are required for completion of this lab: Exercise I: Mapping a Network Topology Using

The following virtual machines are required for completion of this lab: Exercise I: Mapping a Network Topology Using Module 08: Sniffers Objective The objective of this lab is to make students learn to sniff a network and analyze packets for any attacks on the network. The primary objectives of this lab are to: Sniff

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Windows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication

Windows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication Windows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication May 2014 Version 4 PLEASE READ BEFORE CONTINUING: This document applies

More information

TCP/IP Diagnostic Utilities on Windows 2008 Server

TCP/IP Diagnostic Utilities on Windows 2008 Server TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP

More information

This is a sample Lab report from ECE 461 from previous years. L A B 6

This is a sample Lab report from ECE 461 from previous years. L A B 6 This is a sample Lab report from ECE 461 from previous years. L A B 6 Part 1 1. o the source and destination M A C/IP addresses change when a packet traverses a bridge? Provide an explanation and include

More information

If you re not using Microsoft Hyper-V 2012, your screens may vary.

If you re not using Microsoft Hyper-V 2012, your screens may vary. If you re not using Microsoft Hyper-V 2012, your screens may vary. VELOCITY REPLICATION ACCELERATOR Microsoft Hyper-V Hypervisor Server Mode (Single-Interface Deployment) 2013 Silver Peak Systems, Inc.

More information

IP Routing & Bridging

IP Routing & Bridging CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If

More information

( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board

( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board IJ3000 Controller IJ3000 Firmware Upgrade Process 5760-136 Revision D Page 1 of 12 These instructions assume you already know how to change the IP address of your computer, create directories and copy

More information