Esercitazione re- di accesso
|
|
- Rosalyn Eaton
- 5 years ago
- Views:
Transcription
1 Esercitazione re- di accesso
2 Outline Linux the Survivor Kit Netkit The poor man's system to experiment computer networking IpRoute2 show / manipulate rou-ng, devices, policy rou-ng and tunnels Wireshark network analyzer and sniffer
3 Why Linux? Open Source Philosophy: no secret for the user Widely used in networks Routers Embedded systems Servers Free distribu-on Large support and documenta-on and User Mode Linux
4 Linux in a nutshell FS Driver Kernel Net Scheduler shell $ o # Opera-ng System Desktop Environment (KDE, Gnome..) Slackware Debian Ubuntu glibc GCC Base U-ls(GNU) Services/daemons Mandriva Programs Packet Manager (apt, portage, rpm ) Arch Fedora Games Office (e.g. OpenOffice) Graphics (e.g. Gimp) Live Distro (e.g. Knoppix) Distribu-ons Others Suse Red Hat Gentoo
5 Support The Magic Word man Documenta-on Linux User Guide hep:// Distro Specific guides (e.g. hep://help.ubuntu it.org/ ) Linux User Group hep:// Download the netkit live distribu-on: hep://stud.netgroup.uniroma2.it/~donato.baeaglino/knoppix_netkit/knoppix.iso
6 Linux and Networking User Space System calls:socket Kernel Space Drivers Hardware Applica'on Transport Network Data Link Physical Interface Mapping eth0 eth1
7 Outline Linux the Survivor Kit Netkit The poor man's system to experiment computer networking IpRoute2 show / manipulate rou-ng, devices, policy rou-ng and tunnels Wireshark network analyzer and sniffer
8 Simula-on vs. Emula-on Emula-on and simula-on systems put at user s disposal a virtual environment that can be exploited for tests, experiments, measures SIMULATION EMULATION simula-on systems aim at reproducing the performanceof a real life system (latency -me, packet loss, etc.) e.g.: ns, real, emula-on systems aim at accurately reproducing the func-onali-esof a real life system (configura-ons, architectures, protocols), with limited aeen-on to performance References: hep:// labs/netkit_introduc-on/netkit introduc-on.pdf
9 Netkit The poor man's system to experiment computer networking WHAT S NETKIT: a system for emula-ng computer networks based on uml (user mode linux) user mode linux is a linux kernel (inner part of the linux os) that can be executed as a user process on a standard linux box a user mode linux process is also called virtual machine (vm), while the linux box that hosts a virtual machine is called host machine (host) each emulated network device is a virtual linux box note: the linux os is shipped with sojware suppor-ng most of the network protocols hence, any linux machine can be configured to act as a bridge/switch or as a router
10
11 Sekng up and using Netkit Switch on your PC and insert the live CD + For further informa-on see at the netkit introduc-on.pdf
12 Sekng up a Netkit Lab Netkit Lab: automa-ze mul-ple virtual machine startup. To create a lab are needed: a lab configura-on file describing the network topology a set of subdirectoriesth at contain the configura-on sekngs for each virtual machine.startupand.shutdownfiles that describe ac-ons performed by virtual machines when they are started or halted [op-onally] a lab.depfile describing dependency rela-onships on the startup order of virtual machines
13 Outline Linux the Survivor Kit Netkit The poor man's system to experiment computer networking IpRoute2 show / manipulate rou-ng, devices, policy rou-ng and tunnels Wireshark network analyzer and sniffer
14 Simple and basic guide: h<p:// it/ip/ip4dummies/ IPRoute2 Implemented on almost any linux box with kernel > 2.2.X Mangle almost any network stuff: Interface sekng up and drop down Rou-ng Tables Arp Tables And more Mul-ple rou-ng tables Policy Rou-ng Tunnels NAT Replace old (but s-ll used) commands: route, arp, ifconfig Syntax (man ip) : ip [ OPTIONS ] OBJECT { COMMAND help } OBJECT := { link addr route rule neigh tunnel maddr mroute monitor } OPTIONS := { V[ersion] s[ta-s-cs] r[esolve] f[amily] { inet inet6 ipx dnet link } o[neline] }
15 IpRoute2: basic usage ip link set eth0 up Ac-vate eth0 interface ip addr add /24 dev eth0 Set an Ip to eth0 and setup an entry in the rou-ng table ip route add default via ip route add /16 via Ip link set eth0 address MAC_ADDRESS Set the default gateway Set a sta-c route Change the device MAC address and many other func-ons for managing arp cache, policy rou-ng, mul-ple rou-ng tables, tunnels, mul-cast addresses, IPsec policy, etc
16 Simplest Scenario VM1 eth0 eth0 VM / / 24
17 Basic Rou-ng eth0 VM3 eth / / 16 VM1 eth / 24 eth0 VM / 16
18 Outline Linux the Survivor Kit Netkit The poor man's system to experiment computer networking IpRoute2 show / manipulate rou-ng, devices, policy rou-ng and tunnels Wireshark network analyzer and sniffer
19 Wireshark: the network analyzer Wireshark is the world's foremost network protocol analyzer, and is the de facto (and ojen de jure) standard across many industries and educa-onal ins-tu-ons. Wireshark development thrives thanks to the contribu-ons of networking experts across the globe. It is the con-nua-on of a project that started in 1998 (Ethereal). Ethereal logo Wireshark screeshot
20 Wireshark features * Deep inspec-on of hundreds of protocols, with more being added all the -me * Live capture and offline analysis * Standard three pane packet browser * Mul- plaorm: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others * Captured network data can be browsed via a GUI, or via the TTY mode TShark u-lity * The most powerful display filters in the industry * Rich VoIP analysis * Read/write many different capture file formats * Capture files compressed with gzip can be decompressed on the fly * Live data can be read from Ethernet, IEEE , PPP/HDLC, ATM, Bluetooth, USB,,Token Ring, Frame Relay, FDDI, and others (depending on your plarom) * Decryp-on support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2 (having the keys ) * Coloring rules can be applied to the packet list for quick, intui-ve analysis * Output can be exported to XML, PostScript, CSV, or plain text and now, let s have fun!!!
21 Sekng up a TAP interface VM1 eth0 tap eth0 VM / / 24 nk_tap_something Host Machine / 24
22 Sta-c rou-ng scenario with a TAP interface VM /24 eth0 eth1 tap eth / /24 VM3 eth /24 VM1 eth / / /24 eth0 VM4 nk_tap_something Host Machine /0
Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni
Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni h"p://netgroup.uniroma2.it Donato Battaglino donato.battaglino [at] uniroma2.it Lorenzo Bracciale lorenzo.bracciale [at] uniroma2.it
More informationFondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni
Fondamenti di Internet: Aspetti pratici delle reti di telecomunicazioni!"#$%%&'()*+,#-,&.*+/01-.(2 Donato Battaglino donato.battaglino [at] uniroma2.it Lorenzo Bracciale lorenzo.bracciale [at] uniroma2.it
More informationsottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi
Titolo presentazione Piattaforme Software per la Rete sottotitolo Network Administration Milano, XX mese 20XX A.A. 2016/17, Alessandro Barenghi Outline 1) Introduction and Netkit-NG 2) Link-Layer Management
More informationEthernet/IP interac.on emulated with NETKIT. DHCP relay, proxy ARP, Port stealing and ARP poisoning adack.
Ethernet/IP interac.on emulated with NETKIT. DHCP relay, proxy ARP, Port stealing and ARP poisoning adack. Marco Bonola, Lorenzo Bracciale Corso di Re. di Accesso e Trasporto Tor Vergata Prof. Stefano
More informationSo What is WireShark?
Drinking from the network hose So What is WireShark? Packet sniffer/protocol analyzer Open Source Network Tool Latest version of the ethereal tool 1 Source: www.fcc.gov A packet is a chunk of data enclosed
More informationFTTH-GPON OLT Emulator with integrated Network Analyser
By WYZARTEL FTTH-GPON OLT Emulator with integrated Network Analyser Features OLT Emula on Emulates OLT func onality, allowing to build specific provi sioning models and configure OMCI enes individually
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon
More informationImage Crea)on MODULE 2. mpcdata delivering software innovation
Image Crea)on MODULE 2 Learning Objec-ves - Module 2 In this module we will learn about: Feature Sets and Packages Wizard based and advanced Image crea-on (IBW and ICE) Target Analyzer Introduc-on to Windows
More information*nix Crash Course. Presented by: Virginia Tech Linux / Unix Users Group VTLUUG
*nix Crash Course Presented by: Virginia Tech Linux / Unix Users Group VTLUUG Ubuntu LiveCD No information on your hard-drive will be modified. Gives you a working Linux system without having to install
More informationCS 378 (Spring 2003)
Department of Computer Sciences THE UNIVERSITY OF TEXAS AT AUSTIN CS 378 (Spring 2003) Linux Kernel Programming Yongguang Zhang (ygz@cs.utexas.edu) Copyright 2003, Yongguang Zhang This Lecture Linux Networking
More informationIntroduction to Raspberry Pi 3 Model B Updates: 9/18/17 6/2/2018
Introduction to Raspberry Pi 3 Model B Updates: 9/18/17 6/2/2018 A. Objectives 1. Learn about basics of Pi 3 embedded system 2. Learn how to operate your Pi 3 using different interfaces 3. Learn how to
More informationVPN-against-Firewall Lab: Bypassing Firewalls using VPN
SEED Labs 1 VPN-against-Firewall Lab: Bypassing Firewalls using VPN Copyright c 2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation
More informationFor personnal use only
Network Namespaces in RHEL7 Finnbarr P. Murphy (fpm@fpmurphy.com) Linux namespaces are somewhat like Solaris zones in many ways from a user perspective but have significant differences under the hood.
More informationWhen does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009
Packet Sniffers INFO 404 - Lecture 8 24/03/2009 nfoukia@infoscience.otago.ac.nz Definition Sniffer Capabilities How does it work? When does it work? Preventing Sniffing Detection of Sniffing References
More informationOPTIONAL EXERCISE 1: CREATING A FUSION PROJECT PART A
Exercise Objec ves In the previous exercises, you were provided a full Fusion LIDAR dataset. In this exercise, you will begin with raw LIDAR data and create a new Fusion project one that will be as complete
More informationNetwork packet analyzer Wireshark
Network packet analyzer Wireshark Antonio Cianfrani NetLab - Dipartimento DIET Università Sapienza di Roma E-mail: antonio.cianfrani@uniroma1.it What is a packet analyzer? A network packet analyzer is
More informationProject 1 ECE544 Communica-on Networks II Francesco Bronzino. Includes teaching material from Bart Braem and Michael Voorhaen
Project 1 ECE544 Communica-on Networks II Francesco Bronzino Includes teaching material from Bart Braem and Michael Voorhaen Project Goals Get familiar with Click s environment Get familiar with our virtualized
More informationIntroduction to Linux
Introduction to Linux EECS 211 Martin Luessi April 14, 2010 Martin Luessi () Introduction to Linux April 14, 2010 1 / 14 Outline 1 Introduction 2 How to Get Started 3 Software Development under Linux 4
More informationTo see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP.
Lab Exercise ARP Objective To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Requirements Wireshark: This lab uses the Wireshark
More informationIntroduction To Linux. Rob Thomas - ACRC
Introduction To Linux Rob Thomas - ACRC What Is Linux A free Operating System based on UNIX (TM) An operating system originating at Bell Labs. circa 1969 in the USA More of this later... Why Linux? Free
More informationNetworking for Wide Format Printers
Networking for Wide Format Printers Table of Contents Configure PC before RIP Installa on... 1 Verifying Your Network Se ngs for Mac Communica on... 3 Changing Your Network Adapter for Mac Communica on...
More informationIntroduction to Linux
Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA - Dong-Yun Lee (dylee@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating
More informationThe Unix Family. Linux 101. GNU/Linux distributions. Even more. MULTICS MIT/GE/Bell Labs. UNIX AT&T (Bell Labs) Mach, Carnegie Mellon
The Unix Family MULTICS MIT/GE/Bell Labs Linux 101 Johan Montelius KTH 2017 Mach, Carnegie Mellon GNU/Hurd OS X, Apple UNIX AT&T (Bell Labs) BSD Berkeley SysV AT&T Minix, Tanenbaum FreeBSD NetBSD GNU/Linux,
More informationSoftware Distribution and Package Management
Software Distribution and Package Management Pieter Lexis February 15, 2016 Package Management - Pieter Lexis February 15, 2016 1 / 1 whoami Pieter Lexis OS3 graduate SysAdmin for a long time DNS + DNSSEC
More informationIntroduction to Operating Systems. Note Packet # 1. CSN 115 Operating Systems. Genesee Community College. CSN Lab Overview
Introduction to Operating Systems Note Packet # 1 CSN 115 Operating Systems Genesee Community College CSN Lab Overview Dual booted Windows/Linux Workstations Linux workstations currently run CentOS and
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationIntroduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University
Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an
More informationIntroduction to Linux
Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA - Kisik Jeong (kisik@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating
More informationJackson State University Department of Computer Science CSC 437/539 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan
Jackson State University Department of Computer Science CSC 437/539 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 3: Simulating DHCP Snooping and DNS Cache Poisoning through
More informationBoost local network performance (Increase network thoroughput) by enabling Jumbo Frames on GNU / Linux
Boost local network performance (Increase network thoroughput) by enabling Jumbo Frames on GNU / Linux Author : admin So what is Jumbo Frames? and why, when and how it can increase the network thoroughput
More informationUnit- 5. Linux Systems
Unit- 5 Linux System- Basic Concepts; System Administration-Requirements for Linux System Administrator, Setting up a LINUX Multifunction Server, Domain Name System, Setting Up Local Network Services;
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationLab01: Part I. Introduction to Linux. Professional Training Academy Linux Series
Lab01: Part I Introduction to Linux Professional Training Academy Linux Series What is Linux? Linux is an operating system. Specifically, Linux is the kernel or the core of the system Originally developed
More informationJdk Linux Ubuntu Bit Desktop Iso >>>CLICK HERE<<<
Jdk Linux Ubuntu 10.04 32 Bit Desktop Iso Introduction, 64-bit PC (amd64, x86_64) (Recommended), 32-bit PC (i386, x86) The minimal iso image will download packages from online archives at of collections
More informationIGMP and MLD Op-miza-on for Mobile Hosts and Routers
76 th IETF, Nov. 2009, Hiroshima, Japan IGMP and MLD Op-miza-on for Mobile Hosts and Routers dra< asaeda mul-mob igmp mld op-miza-on 01 Hitoshi Asaeda (Keio University) 1 Overview This dra< aims to describe
More informationDigital Analy 韜 cs Installa 韜 on and Configura 韜 on
Home > Digital AnalyĀcs > Digital Analy 韜 cs Installa 韜 on and Configura 韜 on Digital Analy 韜 cs Installa 韜 on and Configura 韜 on Introduc 韜 on Digital Analy 韜 cs is an e automate applica 韜 on that assists
More informationPart 3. ARP poisoning
Part 3 ARP poisoning Outline 1. ARP management in Linux 2. NETKIT LAB Setup 3. HTTP connecbon (from L2 to L7) 4. ARP poisoning ahack 5. AHacker configurabon and setup ARP management in Linux The ARP cache
More informationIP Addressing, monitoring and packet analyzing
IP Addressing, monitoring and packet analyzing CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 TCP/IP stack 2 TCP/IP stack At sending: Each layer adds information to
More informationPackage Management Over Tor
Package Management Over Tor Alexander Nasonov alnsn@netbsd.org 1 The NetBSD Project 2 XMM Swap Ltd February 2018, FOSDEM, Brussels About Myself Member of the NetBSD project Author of bpfjit and aes-xts
More informationProjects and Environment Introduction
Projects and Environment Introduction A lot to go over today History of Linux Projects Overview Project partners Programming environment Programming language Useful Tools History of Linux The Beginning:
More informationBrief Contents. Acknowledgments... xv. Introduction...xvii. Chapter 1: Packet Analysis and Network Basics Chapter 2: Tapping into the Wire...
Brief Contents Acknowledgments... xv Introduction...xvii Chapter 1: Packet Analysis and Network Basics... 1 Chapter 2: Tapping into the Wire... 17 Chapter 3: Introduction to Wireshark... 37 Chapter 4:
More informationT Multimedia Programming. Different Operating Systems and their Multimedia Support
T-111.5350 Multimedia Programming Different Operating Systems and their Multimedia Support Carlos Herrero September 27, 2007 Contents Windows DirectX.NET Framework Linux KDE & Gnome Gstreamer SDL Mac OS
More informationIntroduction to Local Area Networks Contents. Preface... xv
Contents Preface... xv Prerequisites... xv Who Should Study This Course?...xvi Key Topics...xvi Course Objectives...xvi How Do I Use This Course?...xvii Real-World Scenarios...xvii Pedagogy...xvii Key
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More information2 nd SEE 6DISS Workshop Plovdiv June Host Configuration (Windows XP) Athanassios Liakopoulos
2 nd SEE 6DISS Workshop Plovdiv 27-29 June 2007 Host Configuration (Windows XP) Athanassios Liakopoulos aliako@grnet.gr 1. Lab information Network Topology The network topology is shown in Figure 1. PCs
More informationLAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external?
LAN Setup Reflection Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other VMs in the classroom?
More informationGNU/Linux Course Lesson 1. Puria Nafisi
GNU/Linux Course Lesson 1 Puria Nafisi Azizi @pna http://netstudent.polito.it Netstudent is an students volunteer association within the Politecnico di Torino. Is build of different people and students
More informationLab Assignment for Chapter 1
CHAPTER 1 Lab Assignment for Chapter 1 We have created lab assignments for eight chapters of the textbook (Chapters 1, 2, 3, 4, 5, 6, 8, and 10). We have no lab assignments for Chapter 7, 9 or 11. We cannot
More informationLinux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1
Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?
More informationUbuntu Set Static Ip Address Command Line
Ubuntu 10.04 Set Static Ip Address Command Line Check to see if everything works, Mount at startup, Automounter, Static Mounts These have to be IP addresses because of a limitation in portmap (it doesn't
More informationIntroduction to OSI model and Network Analyzer :- Introduction to Wireshark
Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2014 Networking Laboratory 1/56 An Overview Internet
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationPOLYBIUS TOKEN WHITEPAPER
POLYBIUS TOKEN WHITEPAPER Dra May 10 2017 etoken 1. etoken Contract as a basis for Polybius Token (PLBT) PLBT is a token issued within an etoken 1 contract. There is no limit to the number of Polybius
More information5. Write a capture filter for question 4.
Pre-Lab 2: Single Segment IP Networks 1. Review Linux man pages for arp at www.linuxmanpages.com (in both Sections 7 and 8), the ARP RFC (RFC 826) at www.ietf.org, and Section 3.4 of the IBM Red Book.
More informationCOURSE OUTLINE. UNIX Programming 2014 Fall by Euiseong Seo
COURSE OUTLINE UNIX Programming 2014 Fall by Euiseong Seo Overview What this course is about Who teaches this course Why you have to take this course What you will learn in this course What you will earn
More informationAddress Resolution Protocol (ARP), RFC 826
Address Resolution Protocol (ARP), RFC 826 Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Sept. 2017 ARP & RARP } Note: } The Internet is based on IP addresses } Data link protocols (Ethernet,
More informationThe student will have the essential skills needed to be proficient at the Unix or Linux command line.
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This challenging course focuses on the fundamental
More informationHow To Install Java Manually Linux Ubuntu Bit
How To Install Java Manually Linux Ubuntu 12.10 32 Bit Installing oracle jdk 8 on linux- Ubuntu example. Links oracle.com p. web.umkc. Scroll to the bottom, and you can even read about different versions
More informationCanvas USSD Service Center Interac ve Services for a Mobile World. Copyright 2018 Telenity Confiden al & Proprietary
Canvas USSD Service Center Interac ve for a Mobile World Copyright 2018 Telenity Confiden al & Proprietary Canvas USSD Service Center Canvas USSD Service Center wireless operators to offer rapid and secure
More informationHow to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS 1 BACKGROUND 2 WINDOWS SERVER CONFIGURATION STEPS 2 CONFIGURING USER AUTHENTICATION 3 ACTIVE DIRECTORY
More informationCONTAINERIZING JOBS ON THE ACCRE CLUSTER WITH SINGULARITY
CONTAINERIZING JOBS ON THE ACCRE CLUSTER WITH SINGULARITY VIRTUAL MACHINE (VM) Uses so&ware to emulate an en/re computer, including both hardware and so&ware. Host Computer Virtual Machine Host Resources:
More informationChapter 5: Trouble shooting of a network
5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping
More informationLinux Fundamentals (L-120)
Linux Fundamentals (L-120) Modality: Virtual Classroom Duration: 5 Days SUBSCRIPTION: Master, Master Plus About this course: This is a challenging course that focuses on the fundamental tools and concepts
More informationCMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems
CMPSC 311- Introduction to Systems Programming Module: UNIX/Operating Systems Professor Patrick McDaniel Fall 2015 Assignment #1 See webpage Due 9/14/15 Page 2 UNIX Utilities: tar tar collects multiple
More informationLAN Setup Reflection
LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other
More informationDIRECT SUPPLIER P RTAL INSTRUCTIONS
DIRECT SUPPLIER P RTAL INSTRUCTIONS page I IMPORTANT Please complete short Online Tutorials and Quiz at www.supplierportal.coles.com.au/dsd TABLE of Contents 1 Ingredients 2 Log In 3 View a Purchase Order
More informationCC6000 Active Intercept
CC6000 Active Intercept When real-time intelligence is needed on suspected Terrorist and Criminal Organizations, the CC6000 is the next generation of Active Interception Technologies. This system is able
More informationCOMPUTER NETWORKS. CPSC 441, Winter 2016 Prof. Mea Wang Department of Computer Science University of Calgary
COMPUTER NETWORKS CPSC 441, Winter 2016 Prof. Mea Wang Department of Computer Science University of Calgary Introduction: Wireshark and tshark Running tshark Running Wireshark Exercise: Analyze HTTP traffic
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Tell me and I forget. Show me and I remember. Involve
More information10/26/2018
Supported System Requirements for TABE Online Testing Effective October February 2019 This document describes the current system requirements for the DRC INSIGHT Online Learning System, including student-tes
More informationLINUX FUNDAMENTALS (5 Day)
www.peaklearningllc.com LINUX FUNDAMENTALS (5 Day) Designed to provide the essential skills needed to be proficient at the Unix or Linux command line. This challenging course focuses on the fundamental
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.
More informationLab I: Using tcpdump and Wireshark
Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html
More informationWireshark intro. Introduction. Packet sniffer
Wireshark intro Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationCanvas BCM Bandwidth & Content Manager. Copyright 2018 Telenity Confiden al & Proprietary
Canvas BCM Bandwidth & Content Manager Copyright 2018 Telenity Confiden al & Proprietary Canvas BCM, Bandwidth & Content Manager With both exis ng LTE/LTE Advanced func onali es and the upcoming capabili
More informationOpenFlow Configuration Lab
APNIC SDN Workshop Lab OpenFlow Configuration Lab Objective: As part of this hands-on module, you will be installing the Mininet network emulator on your PC. You will then configure a standalone OpenFlow
More informationMaterial for the Networking lab in EITF25 & EITF45
Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab
More informationHow to run a service scan? How to measure network round-trip time? How to trace the route of packets to destination host?...
Fing CLI FAQs Fing CLI vs. FingKit... 3 What is the difference between Fing CLI and Fing Kit?... 3 What are the kit requirements?... 3 How can I launch the Fing Kit using the Fing CLI?... 3 Installation...
More informationLab: 2. Wireshark Getting Started
Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationModeling and evaluation of VPN laboratory exercises for Information Technology curricula
Emerging Research and Solutions in ICT 1(1):32 44 DOI: 10.20544/ERSICT.01.16.P04 UDC: 004.738.4.056:377.36.091.64 Modeling and evaluation of VPN laboratory exercises for Information Technology curricula
More informationLab Exercise Sheet 2 (Sample Solution)
Lab Exercise Sheet 2 (Sample Solution) Document and analyze your experimental procedures by using your Wireshark and terminal recordings. Note all relevant intermediate steps. Mark and explain all relevant
More informationAurelien Jarno 26/02/2006 FOSDEM. Debian GNU/kFreeBSD. Aurelien Jarno. What? Why? Status. The future. How to help?
aurel32@debian.org FOSDEM 26/02/2006 What is? port FreeBSD kernel (kfreebsd for short) kfreebsd 5.4 experimental version of kfreebsd 6.0 GNU userland GNU libc Cool tools (dpkg, apt,...) A Gentoo port has
More informationNetwork Traffic Analysis - Course Outline
Network Traffic Analysis - Course Outline This course is designed for system/network administrations with an overall understanding of computer networking. At the end of this course, students will have
More informationCOMPUTER NETWORKING LAB EXERCISES (TP) 4
Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 4 IPV6 December 14, 2009 Abstract In this TP you will revisit some of the basic networking tools that were introduced in TP1, only this
More informationVirtual Private Network with Open Source and Vendor Based Systems
Paper 192, IT 303 Virtual Private Network with Open Source and Vendor Based Systems Abstract Veeramuthu Rajaravivarma SUNY, Farmingdale State College, Farmingdale Rajarav@farmingdale.edu Heavy dependency
More informationModule 2 OpenFlow Configuration Lab
APNIC SDN Workshop Lab Module 2 OpenFlow Configuration Lab Objective: As part of this hands-on module, you will be installing the Mininet network emulator on your PC. You will then configure a standalone
More informationIntroduction to OSI model and Network Analyzer :- Introduction to Wireshark
Sungkyunkwan University Introduction to OSI model and Network Analyzer :- Introduction to Wireshark Syed Muhammad Raza s.moh.raza@gmail.com Copyright 2000-2015 Networking Laboratory 1/56 An Overview of
More informationRouting. Basic principles. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/23 10:58:58)
Routing Basic principles Karst Koymans Informatics Institute University of Amsterdam (version 16.4, 2017/02/23 10:58:58) Friday, February 24, 2017 Karst Koymans (UvA) Routing Friday, February 24, 2017
More informationUNIT 9 Introduction to Linux and Ubuntu
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 9 Introduction to Linux and Ubuntu Learning Objectives Participants will understand the basics of Linux, including the nature,
More informationG-WAN. Complete install process for Ubuntu (both for the 32 and the 64 OS versions).
G-WAN Complete install process for Ubuntu 11.10 (both for the 32 and the 64 OS versions). G-WAN (Global Web Area Network) is both a web server (for static web pages) and a web application server (for rich
More informationLinux Desktop Pocket Guide Download Free (EPUB, PDF)
Linux Desktop Pocket Guide Download Free (EPUB, PDF) While Mac OS X garners all the praise from pundits, and Windows XP attracts all the viruses, Linux is quietly being installed on millions of desktops
More informationLinux VPN Configuration
Linux VPN Configuration Note. This information is based on Red Hat 9.0, it should be used as a guide only as other distributions may have similar installation methods. VPN Software Installation - PPP (Point-to-Point
More informationMininet: Squeezing a 1000 node OpenFlow Network onto a Laptop. Bob Lantz, November 19, 2009
Mininet: Squeezing a 1000 node OpenFlow Network onto a Laptop Bob Lantz, rlantz@cs.stanford.edu November 19, 2009 How To Do Network Research - I'm trying to figure this out! - Use OpenFlow, do cool stuff!
More informationIn Workflow. Viewing: Last edit: 11/04/14 4:01 pm. Approval Path. Programs referencing this course. Submi er: Proposing College/School: Department:
1 of 5 1/6/2015 1:20 PM Date Submi ed: 11/04/14 4:01 pm Viewing: Last edit: 11/04/14 4:01 pm Changes proposed by: SIMSLUA In Workflow 1. INSY Editor 2. INSY Chair 3. EN Undergraduate Curriculum Commi ee
More informationManual Install Package Rpm Linux Command Line
Manual Install Package Rpm Linux Command Line You can either install it as a package or via another installer, or download the source code If you want to install Git on Linux via a binary installer, you
More informationDFM Concurrent Costing
Die Casting Analysis Start a new analysis For the purposes of this tutorial we will es mate the cost per part of manufacturing 200,000 of the disk drive casings shown here: front The material is to be
More informationRiso Comcolor Series
Riso Comcolor Series Ge ng Started Guide No. 1 Ini al Setup Administrator Func ons Administrator Setup Default Se ngs User Names and Passwords Setup IC Card Control System Configura on Riso (UK) Limited
More informationIntroduction to Linux
Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA Sanghoon Han(sanghoon.han@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Announcement (1) Please come
More informationCOMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY:
Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 1 BASIC CONFIGURATION AND TOOLS FOR EVERYBODY: PING(6), DIG, TRACEROUTE(6), NETSTAT September 24, 2012 Abstract In this TP you will
More informationStructure and Config
Ubuntu Linux Server Structure and Config interlab at AIT Network Management Workshop March 11 Hervey Allen What's Our Goal? A bit of Debian & Ubuntu philosophy Differences from the Red Hat world Package
More information