This document is a student lab manual for configuring Huawei routers. It provides instructions for 6 experiments: 1) Introduction to Huawei routers, which demonstrates configuring IP addresses on router interfaces and PCs to enable communication; 2) PAP authentication protocol, which configures PAP authentication between two routers; 3) Frame Relay Protocol; 4) CHAP authentication protocol; 5) X.25; and 6) Frame Relay Sub-interfaces. The introduction experiment provides a baseline for the other experiments by demonstrating basic router and IP address configuration. The PAP, CHAP, and other experiments build on this by adding different WAN protocols and authentication methods.
Usrt to ethernet connectivity over the wolrd cubieboard bordsChanaka Lasantha
1. The document discusses connecting multiple microcontroller boards located worldwide over a secure VPN network.
2. It provides details on configuring the boards to connect via either RS232 or Ethernet ports and using software tools for setup and testing.
3. The goal is to enable interconnecting the boards in a one-to-many or client-server architecture over TCP/IP for monitoring and controlling remotely.
Complete Simulation of IEC 101 Client as per Protocol Standard including File transfer. Support Balanced and unbalanced modes.
Add up to 50 Client node in the simulator. Every Client node will work independently.
Send all type of commands, parameter activation, file transfer.
Features
Multiple Master / Client Simulation
In a Single Client(link) simulate Multiple Stations (Common Address)
Supports Balanced & Unbalanced Mode
Supports "Select-Before-Operate" SBO or "Direct-execute" command execution modes
supports File Transfer, Directory commands
Clock synchronization
License Perpetual One-time payment, royalty-free Neither license manager nor dongle required
Support all type of Typeid ASDU, APCI, APDU, Command activation and termination commands, support all Cause of transmission (COT), Parameter in control direction.
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...Aymen Lachkhem
This document describes the design and implementation of a robotic arm project controlled by a Windows application.
The robotic arm uses an ATmega328 microcontroller and is controlled through a C# Windows application built in Visual Studio. The application features a login system, controls for individual and coordinated servo movement, and serial communication with the microcontroller to control the arm. The microcontroller code interprets commands from the application to move the servos to desired positions. Diagrams and code snippets are provided to explain the hardware and software components of the complete robotic arm project.
Rodrigo Almeida - Microkernel development from project to implementationFelipe Prado
This document discusses developing a microkernel from project to implementation. It covers topics like kernel components, designing a kernel project, concepts for developing a microkernel like function pointers and structs, building a device driver controller, and using callbacks. Code examples are provided for initializing hardware and communicating with an LCD. The goal is for participants to have a better understanding of kernels, their advantages, and restrictions.
This document provides instructions for a lab activity involving configuring networking devices. The activity includes 7 parts where students will physically connect a router, switch, and computers, and then configure the devices by following instructions. The objectives are to practice physical connectivity, establishing console sessions on devices, assigning IP addresses for static routing, and verifying configurations and connectivity. Diagrams and tables are provided to identify device interfaces, cable types, and IP addressing schemes.
This document provides an overview of a student project analyzing the SSH protocol. The project involved setting up a lab environment with two VMs, one as an SSH server and the other as a client. The students executed experiments with SSH protocols 1 and 2, capturing packets with Wireshark. Their analysis showed the key exchange process differs between the protocols, with protocol 2 using Diffie-Hellman key exchange and protocol 1 simply sharing public keys. The document details the packet flows and messages exchanged to establish SSH sessions under each protocol.
Usrt to ethernet connectivity over the wolrd cubieboard bordsChanaka Lasantha
1. The document discusses connecting multiple microcontroller boards located worldwide over a secure VPN network.
2. It provides details on configuring the boards to connect via either RS232 or Ethernet ports and using software tools for setup and testing.
3. The goal is to enable interconnecting the boards in a one-to-many or client-server architecture over TCP/IP for monitoring and controlling remotely.
Complete Simulation of IEC 101 Client as per Protocol Standard including File transfer. Support Balanced and unbalanced modes.
Add up to 50 Client node in the simulator. Every Client node will work independently.
Send all type of commands, parameter activation, file transfer.
Features
Multiple Master / Client Simulation
In a Single Client(link) simulate Multiple Stations (Common Address)
Supports Balanced & Unbalanced Mode
Supports "Select-Before-Operate" SBO or "Direct-execute" command execution modes
supports File Transfer, Directory commands
Clock synchronization
License Perpetual One-time payment, royalty-free Neither license manager nor dongle required
Support all type of Typeid ASDU, APCI, APDU, Command activation and termination commands, support all Cause of transmission (COT), Parameter in control direction.
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...Aymen Lachkhem
This document describes the design and implementation of a robotic arm project controlled by a Windows application.
The robotic arm uses an ATmega328 microcontroller and is controlled through a C# Windows application built in Visual Studio. The application features a login system, controls for individual and coordinated servo movement, and serial communication with the microcontroller to control the arm. The microcontroller code interprets commands from the application to move the servos to desired positions. Diagrams and code snippets are provided to explain the hardware and software components of the complete robotic arm project.
Rodrigo Almeida - Microkernel development from project to implementationFelipe Prado
This document discusses developing a microkernel from project to implementation. It covers topics like kernel components, designing a kernel project, concepts for developing a microkernel like function pointers and structs, building a device driver controller, and using callbacks. Code examples are provided for initializing hardware and communicating with an LCD. The goal is for participants to have a better understanding of kernels, their advantages, and restrictions.
This document provides instructions for a lab activity involving configuring networking devices. The activity includes 7 parts where students will physically connect a router, switch, and computers, and then configure the devices by following instructions. The objectives are to practice physical connectivity, establishing console sessions on devices, assigning IP addresses for static routing, and verifying configurations and connectivity. Diagrams and tables are provided to identify device interfaces, cable types, and IP addressing schemes.
This document provides an overview of a student project analyzing the SSH protocol. The project involved setting up a lab environment with two VMs, one as an SSH server and the other as a client. The students executed experiments with SSH protocols 1 and 2, capturing packets with Wireshark. Their analysis showed the key exchange process differs between the protocols, with protocol 2 using Diffie-Hellman key exchange and protocol 1 simply sharing public keys. The document details the packet flows and messages exchanged to establish SSH sessions under each protocol.
El documento discute los desafíos que enfrentan las instituciones educativas al incorporar medios y TIC, como crear una cultura que valore estas herramientas. También sugiere articular su uso en el PMI y PEI mediante una política mínima de incorporación en los planes de aula de cada área. Además, presenta ejemplos de estrategias de aprendizaje como lectura autónoma, construcción de mapas conceptuales, centros literarios y creación de textos.
Nespresso was created in 1976 but initially saw moderate success selling its coffee machines to professional coffee makers, as it was an unnecessary luxury. It then repositioned itself to cater to the high-end consumer market by marketing its ability to brew high-quality coffee at home. This successful repositioning led to $3 billion in turnover by 2014. However, some competitors tried to discredit Nespresso by claiming its capsules were polluting. To maintain its position as market leader, the document recommends that Nespresso strengthen its positioning as a high-end brand.
"Bezpieczeństwo Danych w Firmie." - materiały do występienia w ramach Naukowego Koła e-Biznesu przy Akademii Morskiej w Gdyni. Więcej na www.KNeB.pl
Autor: Łukasz Tomczak
Toyota has built a huge global manufacturing network that can produce millions of cars for a variety of consumers through techniques like line modernization, line filling, and mass communication. Toyota was able to grow larger than other auto manufacturers because of these production techniques and continuous improvement. Toyota also differentiated its products through customization, reliability, features, and pricing strategies. It was the first company to mass produce a hybrid vehicle, the Prius. Overall, Toyota has positioned itself as a brand for everyone through lean manufacturing, responsiveness to markets, and problem solving.
The document discusses the effective use of pronouns in management. It explains that pronouns like "I", "you", "he/she", "they", and "we" can impact teamwork, motivation, and success. While "I" is best used sparingly, "we" is the most important pronoun as it fosters cooperation and emphasizes teamwork. The right choice of pronouns can make one a strong leader, while the wrong choice may lead to failure. Sales managers are an exception, as "I" and "you" are most effective when interacting with customers.
TBEX 2013 Toronto The Online Consumer Journey: Inspiring Traveler Decisions, ...TBEX
The document summarizes the online consumer journey for travel planning. It discusses how consumers are inspired by online videos and content to consider destinations, do extensive research across multiple devices over 1-2 weeks, and return to websites and search engines numerous times before booking. It also highlights how Google tools like Flights, Trends, Authorship and Hangouts can enhance every stage of the process from inspiration to sharing experiences.
Nespresso has experienced success due to its unique brand positioning in the premium coffee market. It positions itself through a unique distribution system and cube-shaped Nespresso machines. It focuses on high quality coffee, premium pricing, research and development, and quirky communication strategies. To resist new competition, Nespresso should strengthen its high-end positioning, focus on global expansion, and make its machines incompatible with other coffee pods.
El documento define los constructos TPACK (conocimiento tecnológico pedagógico de contenido) y proporciona ejemplos de cada uno. TPACK incluye el conocimiento tecnológico (TK), pedagógico (PK), de contenido (CK), pedagógico de contenido (PCK), tecnológico pedagógico (TPK), tecnológico de contenido (TCK) y el conocimiento tecnológico pedagógico de contenido (TPACK). Cada uno se define y ejemplifica en
La escala de rango es una herramienta de evaluación que consiste en una serie de indicadores graduados para medir el logro de una competencia. Se usa para evaluar comportamientos, habilidades y actitudes de los estudiantes. Para elaborarla, se definen los indicadores de la competencia a evaluar y se decide el tipo de escala, como numérica o descriptiva. Luego, el docente evalúa el nivel de logro de cada estudiante para cada indicador y proporciona retroalimentación para mejorar.
Prezi Template with a car interior and an animated road video background.
Present a company roadmap, your road to success or any creative project.
Show how fast you are going and the things already achieved during the journey.
A good template for a business, technology related or personal presentation.
Zoom into the GPS display map and show the details of the trip.
Where are you heading, where have you been to. Illustrate the journey with map markers.
El documento resume las principales etapas y autores de la literatura griega clásica. La época jónica estuvo dominada por la épica, con Homero escribiendo La Ilíada y La Odisea. En la época ática florecieron los géneros de la tragedia, la comedia y la historia, con autores como Esquilo, Sófocles, Aristófanes, Herodoto y Jenofonte. La época helenística vio el surgimiento de la nueva comedia y la poesía bucólica, con autores
Quinto Horacio Flaco fue un poeta lírico romano del siglo I a.C. que buscó la perfección estética influenciado por poetas griegos como Safo y Teócrito. Escribió sátiras y epodos en los que criticaba los abusos de la sociedad y los gobernantes, y sus Odas trataron sobre temas como el amor, el vino y la naturaleza. Adicionalmente, su Epístola a los Pisones influyó en la teoría literaria occidental.
(BAREFOOTJOURNAL.COM) 15 Travel Destinations that will Stir Your Spirit in 2015barefootjournal
(BAREFOOTJOURNAL.COM) 15 Travel Destinations that will Stir Your Spirit in 2015
Need to recharge your spirit? Need answers to some bigger questions? Well, maybe these destinations will give you the inspiration and energy you are looking for.
El documento resume la evolución del castellano desde las lenguas prerromanas habladas en la península ibérica hasta la dominación romana y la extensión del latín. Luego, con las invasiones germánicas y árabes surgieron nuevas lenguas que dieron origen al castellano, absorbiendo vocablos de esas lenguas. Finalmente, el documento describe la difusión mundial del castellano en el presente.
El documento describe las diferentes funciones del lenguaje, incluyendo las funciones básicas de referencia, emotiva y conativa propuestas por Karl Bühler, así como funciones secundarias como la metalingüística, fática y poética. También explica la diferencia entre lengua y habla, y cómo existen variaciones en las lenguas como dialectos, sociolectos e idiolectos.
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
- The document provides lab exercises for CCNA/ICND2 exam preparation over 7 days, with topology diagrams and tasks to complete for each day including implementing routing protocols and troubleshooting scenarios.
- Day 1 requires implementing the given topology within 20 minutes, configuring routing to allow ping from a test PC to router R2.
- Additional tasks and topologies are provided for subsequent days covering topics like VLANs, OSPF, EIGRP, IPv6 routing, and troubleshooting L2 issues.
- Configuration files are included for some devices as examples.
El documento discute los desafíos que enfrentan las instituciones educativas al incorporar medios y TIC, como crear una cultura que valore estas herramientas. También sugiere articular su uso en el PMI y PEI mediante una política mínima de incorporación en los planes de aula de cada área. Además, presenta ejemplos de estrategias de aprendizaje como lectura autónoma, construcción de mapas conceptuales, centros literarios y creación de textos.
Nespresso was created in 1976 but initially saw moderate success selling its coffee machines to professional coffee makers, as it was an unnecessary luxury. It then repositioned itself to cater to the high-end consumer market by marketing its ability to brew high-quality coffee at home. This successful repositioning led to $3 billion in turnover by 2014. However, some competitors tried to discredit Nespresso by claiming its capsules were polluting. To maintain its position as market leader, the document recommends that Nespresso strengthen its positioning as a high-end brand.
"Bezpieczeństwo Danych w Firmie." - materiały do występienia w ramach Naukowego Koła e-Biznesu przy Akademii Morskiej w Gdyni. Więcej na www.KNeB.pl
Autor: Łukasz Tomczak
Toyota has built a huge global manufacturing network that can produce millions of cars for a variety of consumers through techniques like line modernization, line filling, and mass communication. Toyota was able to grow larger than other auto manufacturers because of these production techniques and continuous improvement. Toyota also differentiated its products through customization, reliability, features, and pricing strategies. It was the first company to mass produce a hybrid vehicle, the Prius. Overall, Toyota has positioned itself as a brand for everyone through lean manufacturing, responsiveness to markets, and problem solving.
The document discusses the effective use of pronouns in management. It explains that pronouns like "I", "you", "he/she", "they", and "we" can impact teamwork, motivation, and success. While "I" is best used sparingly, "we" is the most important pronoun as it fosters cooperation and emphasizes teamwork. The right choice of pronouns can make one a strong leader, while the wrong choice may lead to failure. Sales managers are an exception, as "I" and "you" are most effective when interacting with customers.
TBEX 2013 Toronto The Online Consumer Journey: Inspiring Traveler Decisions, ...TBEX
The document summarizes the online consumer journey for travel planning. It discusses how consumers are inspired by online videos and content to consider destinations, do extensive research across multiple devices over 1-2 weeks, and return to websites and search engines numerous times before booking. It also highlights how Google tools like Flights, Trends, Authorship and Hangouts can enhance every stage of the process from inspiration to sharing experiences.
Nespresso has experienced success due to its unique brand positioning in the premium coffee market. It positions itself through a unique distribution system and cube-shaped Nespresso machines. It focuses on high quality coffee, premium pricing, research and development, and quirky communication strategies. To resist new competition, Nespresso should strengthen its high-end positioning, focus on global expansion, and make its machines incompatible with other coffee pods.
El documento define los constructos TPACK (conocimiento tecnológico pedagógico de contenido) y proporciona ejemplos de cada uno. TPACK incluye el conocimiento tecnológico (TK), pedagógico (PK), de contenido (CK), pedagógico de contenido (PCK), tecnológico pedagógico (TPK), tecnológico de contenido (TCK) y el conocimiento tecnológico pedagógico de contenido (TPACK). Cada uno se define y ejemplifica en
La escala de rango es una herramienta de evaluación que consiste en una serie de indicadores graduados para medir el logro de una competencia. Se usa para evaluar comportamientos, habilidades y actitudes de los estudiantes. Para elaborarla, se definen los indicadores de la competencia a evaluar y se decide el tipo de escala, como numérica o descriptiva. Luego, el docente evalúa el nivel de logro de cada estudiante para cada indicador y proporciona retroalimentación para mejorar.
Prezi Template with a car interior and an animated road video background.
Present a company roadmap, your road to success or any creative project.
Show how fast you are going and the things already achieved during the journey.
A good template for a business, technology related or personal presentation.
Zoom into the GPS display map and show the details of the trip.
Where are you heading, where have you been to. Illustrate the journey with map markers.
El documento resume las principales etapas y autores de la literatura griega clásica. La época jónica estuvo dominada por la épica, con Homero escribiendo La Ilíada y La Odisea. En la época ática florecieron los géneros de la tragedia, la comedia y la historia, con autores como Esquilo, Sófocles, Aristófanes, Herodoto y Jenofonte. La época helenística vio el surgimiento de la nueva comedia y la poesía bucólica, con autores
Quinto Horacio Flaco fue un poeta lírico romano del siglo I a.C. que buscó la perfección estética influenciado por poetas griegos como Safo y Teócrito. Escribió sátiras y epodos en los que criticaba los abusos de la sociedad y los gobernantes, y sus Odas trataron sobre temas como el amor, el vino y la naturaleza. Adicionalmente, su Epístola a los Pisones influyó en la teoría literaria occidental.
(BAREFOOTJOURNAL.COM) 15 Travel Destinations that will Stir Your Spirit in 2015barefootjournal
(BAREFOOTJOURNAL.COM) 15 Travel Destinations that will Stir Your Spirit in 2015
Need to recharge your spirit? Need answers to some bigger questions? Well, maybe these destinations will give you the inspiration and energy you are looking for.
El documento resume la evolución del castellano desde las lenguas prerromanas habladas en la península ibérica hasta la dominación romana y la extensión del latín. Luego, con las invasiones germánicas y árabes surgieron nuevas lenguas que dieron origen al castellano, absorbiendo vocablos de esas lenguas. Finalmente, el documento describe la difusión mundial del castellano en el presente.
El documento describe las diferentes funciones del lenguaje, incluyendo las funciones básicas de referencia, emotiva y conativa propuestas por Karl Bühler, así como funciones secundarias como la metalingüística, fática y poética. También explica la diferencia entre lengua y habla, y cómo existen variaciones en las lenguas como dialectos, sociolectos e idiolectos.
ProjectPurposeThe purpose of this project is to provide an o.docxwoodruffeloisa
Project
Purpose
The purpose of this project is to provide an opportunity for students to apply network administration and design competencies gained throughout this course.
Deliverables
Please choose ANY FOUR options from the following five options and complete the report for your chosen four options (OPTION 1 is MANDATORY).
Option 1: Network Design Case (100 points)
Option 2: Windows Security Firewall (33.33 points)
Option 3: Configuring OSPF Routing (33.33 points)
Option 4: Configuring EIGRP Routing (33.33 points)
Option 5: IPv6 Address Configuration (33.33 points)
Option 1: Network Design Case
Scenario
Consider that the prevailing market conditions have made it possible for our firm to expand our current operations. I have presented several options to our board of directors and they are eager to proceed with an expansion except for one condition. The board feels that our current telecommunications infrastructure hinders our business operations and that it is imperative to design a new voice and data infrastructure to facilitate the planned expansion. The board is prepared to advocate any prudent expenditure necessary to implement a new infrastructure at the upcoming stockholder’s meeting.
As you know, our firm is headquartered in San Antonio where we occupy the first and third floor of a large, but somewhat antiquated building. Each floor of the building measures 400 ft. by 250 ft. We currently have 52 Pentium-based PC’s located on the third floor to meet the needs of our accounting, billing, and phone sales departments. The first floor contains 17 Pentium-based computers and six Apple PowerMacs used by management, our receptionist, walk-in sales staff, and our adjusters. We currently have a 10Base2 network that is used to connect some, but not all, of our existing systems. The previous network manager told us the remaining systems could not be networked due to the 10Base2 architecture. We also have smaller offices in Austin, Houston, and Corpus Christi. These offices generally have 4 to 6 Pentium or Apple-based computers. The computers in these locations are not currently networked.
Our immediate expansion plans, if approved by the shareholders, include opening a second office in Houston, two offices in Dallas and an office in El Paso. These offices will be similar to the existing small offices operated in Austin, Houston and Corpus Christi. My vision for the new telecommunications network includes having all of the existing and proposed offices connected together in a seamless, secure manner. All of the computers in all of the offices should be connected.
Deliverables:
· I need to understand whether or not we can continue to build on our current network and why. I also need to know what we should use to replace it if we need to do so.
· I see the network as consisting of two primary parts, the networks within each facility and the network that connects the various facilities together. Please provide diagrams that illustrate h ...
- The document provides lab exercises for CCNA/ICND2 exam preparation over 7 days, with topology diagrams and tasks to complete for each day including implementing routing protocols and troubleshooting scenarios.
- Day 1 requires implementing the given topology within 20 minutes, configuring routing to allow ping from a test PC to router R2.
- Additional tasks and topologies are provided for subsequent days covering topics like VLANs, OSPF, EIGRP, IPv6 routing, and troubleshooting L2 issues.
- Configuration files are included for some devices as examples.
An internetwork is a collection of two or more computer networks (typically Local Area
Networks or LANs) which are interconnected to form a bigger network. All networks in an
Internetwork have a unique network address. Routers interconnect the networks
This document provides a reference manual for troubleshooting network connectivity issues in Lab 1. It contains contents and explanations for various troubleshooting commands and approaches, including extended traceroute, the terminal monitor command, basic troubleshooting methodology, resolving or escalating issues, verification tools like ping and traceroute, duplex operation and mismatch troubleshooting, and addressing issues on IOS devices. The manual is intended solely for use in DCN330.
This document provides instructions for connecting a router to a workstation using HyperTerminal and establishing a console session. The steps include connecting a rollover cable from the router's console port to the workstation's COM1 port, launching HyperTerminal on the workstation, naming and configuring the HyperTerminal session, and connecting to view the router's response. Additional steps cover closing the session, reopening saved sessions, and shutting down connections.
You can create and test your OFC with Trema.
You can create tests effectively with test frameworks.
You can run common tests for both environment of a testing network and a real network.
This document provides instructions and configuration examples for practicing CCNA exam simulations. It includes 15 practice exam simulations focused on configuring and troubleshooting routing protocols, VLANs, ACLs, and other networking topics. For each simulation, the document describes the network topology and objectives that must be met to complete the simulation successfully. It stresses the importance of fully understanding configuration topics in the author's CCNA study guide before attempting the practice exams.
This lab manual provides instructions for a Computer Network lab course. The course aims to provide hands-on networking experience. Students will experiment with networking topics like IP addressing, routing protocols, and network troubleshooting using tools like ping and traceroute. Students will also learn network modeling and simulation using software like Packet Tracer. The manual outlines 9 experiments that cover topics such as network cabling, network devices, IP configuration, basic network commands, and configuring network topologies in Packet Tracer using different routing protocols.
This lab manual provides instructions for a Computer Network lab course. The course aims to provide hands-on networking experience. Students will experiment with networking topics like IP addressing, routing protocols, and network troubleshooting using tools like ping and traceroute. Students will also learn about network modeling and simulation using software like Packet Tracer. The manual outlines 9 experiments that involve studying network devices, IP addressing, connecting computers to a LAN, networking commands, and configuring network topologies using Packet Tracer.
This chapter focuses on IP routing, which is the process of moving packets between networks using routers. It discusses the key components of a routing table that allow routers to determine the best path for packets. It also explains the step-by-step IP routing process that occurs when a host on one network attempts to communicate with a host on another network, including how the routing table is used to determine the appropriate interface to forward the packet out of. The chapter aims to provide readers with a firm understanding of the fundamentals of IP routing.
This chapter covers IP routing and routing basics. It discusses the components of a routing table and how a router makes forwarding decisions. It also explains static and dynamic routing configuration. The document then details the IP routing process, describing how a packet travels from one host to another on different networks, including the roles of ARP, switching, routing tables, and protocols like ICMP and IP. It uses diagrams and examples to illustrate routing concepts.
Here are the key steps to configure RIPv2 on Router1:
1. Enter configuration mode:
Router1> enable
Router1# configure terminal
2. Configure the FastEthernet 0/0 interface:
Router1(config)# interface FastEthernet 0/0
Router1(config-if)# ip address 192.168.12.1 255.255.255.0
Router1(config-if)# no shutdown
3. Configure the Serial 0/0 interface:
Router1(config-if)# interface Serial 0/0
Router1(config-if)# ip address 192.168.23.1 255.255.255.252
Router1(config-if
This document provides instructions for configuring OSPF routing between routers. Key steps include:
1. Configure IP addresses and interfaces on the routers.
2. Configure OSPF routing process on each router to advertise networks in area 0. This includes adding loopback interfaces for stability.
3. Test connectivity between routers and hosts by pinging interfaces. Troubleshoot any issues until connectivity is established across the network.
1) The document provides instructions for setting up networks using Packet Tracer, including how to connect devices, configure IP addresses, and set up routing.
2) It gives step-by-step explanations for creating different network scenarios with one, two, and three networks connected by switches and routers.
3) For networks with multiple routers, it emphasizes that a routing protocol like RIP must be configured so the routers know how to direct traffic between networks.
The document is a sample exam for CCNA certification that contains multiple choice questions about networking concepts. Some of the questions test knowledge of protocols like TCP, UDP, HTTP, SNMP, and protocols used for routing like OSPF, EIGRP, RIP. Other questions cover topics like VLANs, trunking, STP, and IP addressing schemes.
The document describes how to configure a Linux machine as a router to connect two subnets. It provides instructions to enable IP forwarding and configure the network interfaces using temporary and permanent methods.
The summary is:
- Enable IP forwarding and configure the network interfaces of two Ethernet cards using ifconfig to set up routing temporarily
- Use netconf to configure the interfaces and routing permanently by editing settings, accepting changes, and rebooting to confirm the configuration persists
- Install traffic generator programs on end stations to test routing of UDP and TCP packets between subnets going through the router
LAB3/Lab 3 Answer Sheet(1).docx
Liberty University
CSIS331
Lab 3 Answer Sheet
Submit this completed document with your completed and saved packet tracer in the link provided in Blackboard.
Part 1: Questions.
Step 1:
a. Which command displays the statistics for all interfaces configured on a router?
b. Which command displays the information about the Serial 0/0/0 interface only?
c. 1) What is the IP address configured on R1?
c. 2) What is the bandwidth on the Serial 0/0/0 interface?
d. 1) What is the IP address on R1?
d. 2) What is the MAC address of the GigabitEthernet 0/0 interface?
d. 3) What is the bandwidth on the GigabitEthernet 0/0 interface?
Step 2. Questions.
a. Which command displays a brief summary of the current interfaces, statuses, and IP addresses assigned to them?
b. 1) How many serial interfaces are there on R1 and R2?
b. 2) How many Ethernet interfaces are there on R1 and R2?
b. 3) Are all the Ethernet interfaces on R1 the same? If no, explain the difference(s).
Step 3: Display the routing table on R1.
a. What command displays the content of the routing table?
b. 1) How many connected routes are there (uses the C code)?
b. 2) Which route is listed?
b. 3) How does a router handle a packet destined for a network that is not listed in the routing table?
Part 2 Step 3
a. What command did you use?
Part 3 Step 1
a. 1) How many interfaces on R1 and R2 are configured with IP addresses and in the “up” and “up” state?
a. 2) What part of the interface configuration is NOT displayed in the command output?
a. 3) What commands can you use to verify this part of the configuration?
b. 1) How many connected routes (uses the C code) do you see on each router?
b. 2) How many EIGRP routes (uses the D code) do you see on each router?
b. 3) If the router knows all the routes in the network, then the number of connected routes and dynamically learned routes (EIGRP) should equal the total number of LANs and WANs. How many LANs and WANs are in the topology?
b. 4) Does this number match the number of C and D routes shown in the routing table?
Ping Table:
Ping From Device IP
Ping to Device IP
Results
PC1
PC4
R2
PC2
__MACOSX/LAB3/._Lab 3 Answer Sheet(1).docx
LAB3/Lab 3.pka
__MACOSX/LAB3/._Lab 3.pka
LAB3/Lab 3 Instructions(1).docx
Liberty University CSIS331
Liberty University
CSIS 331
Lab 3 Instructions
Packet Tracer:
[Adapted from Cisco Networking Academy Intro to Networking 6.4.3.3]
Overview
In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations.
Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands.
Part 1: Display Router Information
Step 1: Display interface information on R1. ...
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Eee3080 lab031
1. EEEEEE33008800FF LLaabb 33
HHuuaawweeii RRoouutteerrss
SSttuuddeenntt LLaabb MMaannuuaall
• Before you start the lab exercises see the
lab administrator or EEE3080F tutor to get
assigned to your routers.
4. 4
Explanation of this Manual
Attention please: when you log on the computer for LAB 3, make sure
you ask the tutor to configure the cables for you, do not do it
yourself!!!
(1) We only prepare the manuals for compulsory labs, yet if you still have extra
time, please get the manuals for other labs from the tutors.
(2) Lab 3.2 and 3.3 are compulsory. The tutor will introduce 3.1, which is the
basic lab of this manual. Remember the commands of the lab; try to answer the
question asked. This will give you useful practice for the end of semester lab test.
(3) Lab 3.4, 3.5 and 3.6 are optional.
For this experiment you will need to work in pairs. The first pair will use PCs 1
and 2, second pair PCs 3 and 4, third pair PCs 5 and 6, and the fourth pair PCs 7
and 8.
Before you telnet into the router you need to configure an IP address, subnet
mask and default gateway for your PC.
If you are using PC 1, 3, 5 or 7 configure the following:
1. IP address of PC - 10.128.0.2, subnet mask – 255.255.255.0, and default
gateway – 10.128.0.1 (which is the IP address of the router port that you are
connected to).
If you are using PC 2, 4, 6 or 8 configure the following:
2. IP address of PC - 10.128.1.2, subnet mask – 255.255.255.0, and default
gateway – 10.128.1.1 (which is the IP address of the router port that you are
connected to).
The configuration of the TCP/IP settings described above (these are the IP
address, subnet mask and default gateway), is illustrated below:
(N.B: Ignore the fact that the IP address is 202.0.0.2, it should actually be
10.128.0.2, and the gateway should be 10.128.0.1, instead of 202.0.0.1).
We will give an example of the 10.128.0.2 IP address for PCs 1, 3, 5 and 7. A
similar method can be used for PCs 2, 4, 6 and 8.
5. 5
Steps: ( “start”-“control panel”)/ at the right bottom on your computer you will find
the icon of- “network connections”-select “properties” of “local area connections”-
“general”-“internet protocol (TCP/IP)-“using the following IP address”
(Question: Why should we configure the default gateway as “10.128.0.1”?)
6. 6
(4) We use “telnet” to configure the routers (“start”→ “run”):
The telnet password for this lab is “huawei”. The IP address of the router port has
already been configured so you do not need to worry about it.
7. 7
(5) Abbreviation list (command can be abbreviated when typing if it does not
conflict with another command):
Normal Command Abbreviated
Command
Normal Command Abbreviated
Command
display disp Ethernet e
Interface Int
Serial s
(6) When you finish the configuration, you can check the configuration by:
[RTA] display current-configuration
You can check the configuration of ports by:
[RTA] display interface
There are many more commands you can use which are not listed in this
manual.
(7) Type the first two/three letters of a command, the rest will be automatically
completed by pressing “Tab” button on the keyboard.
If you need help, then just type “?”, you may get the information you need.
8. 8
3.1 Introduction to Huawei routers
3.1.1 Objective
Users will learn how to use Huawei routers, how to configure the IP address of
router ports, the IP address of the computer, and how to implement a network.
Users will also realize communication between two routers and two PCs.
3.1.2 Introduction
This lab will introduce you to the configuration of Huawei routers. In this
experiment, two routers are connected by a serial cable. Each router connects to
a PC.
This lab will use the default protocol configurations. We only configure the IP
address of the serial ports of Huawei routers and the IP address of PCs.
To enable the 2 PCs to communicate with each other:
1. Enter the configuration mode of each router’s serial port and set the IP
address.
2. Set the IP address of PCs 1, 3, 5 or 7, to 10.128.0.2 for the PCs 2, 4, 6 or 8 to
10.128.1.2.
3. You will telnet into the router IP address which will be 10.128.0.1 for PCs 1, 3,
5 or 7, and 10.128.1.1 for PCs 2, 4, 6 or 8, and use the login password “huawei”.
3.1.3 Preparation
Two PCs with 10/100M NIC installed
Two Routers (Quidway AR 28-31) with 100/1000M Ethernet ports, Serial
ports.
Console cable, Cross cables.
9. 9
3.1.4 Diagram
3.1.5 Experiment
1. Log in to the Router using:
• “telnet 10.128.0.1” for connections to routers 1, 3, 5 or 7. The login
password is “huawei”.
• “telnet 10.128.1.1” for connections to routers 2, 4, 6 or 8. The login
password is “huawei”.
RTA RTB
PC 1,3,5 or 7
E 0/0 E 0/0
S 1/1 S 1/1
255.255.255.0
192.0.0.1
255.255.255.0
192.0.0.2
255.255.255.0
255.255.255.0
255.255.255.0 255.255.255.0
RTA RTB
PC
E 0/0 E 0/0
S 1/1 S 1/1
255.255.255.0
192.0.0.1
255.255.255.0
192.0.0.2
255.255.255.0
255.255.255.0
255.255.255.0 255.255.255.0
10.128.0.2 10.128.1.2
PC 2,4,6 or 8
10.128.0.1 10.128.0.2
10. 10
2. Log in to the system and change the name of the router to RTA (if you are
accessing router 1, 3, 5 or 7). If you are accessing routers 2, 4, 6 or 8, change
the router name to RTB.
If you get informational (logging) messages on your console screen, such as the
ones shown below, ignore them and press “enter”, and continue with the lab.
11. 11
3. Enter the serial port S 1/1 of RTA, interface configuration mode
4. Set the IP address of S 1/1 of RTA: 192.0.0.1 255.255.255.0 and if you are
accessing RTB, set the IP address of its serial interface, S 1/1 to 192.0.0.2
255.255.255.0.
If you get the following log messages:
“Shutdown”
and “Undo
Shutdown” are
to refresh the
states of the
ports.
12. 12
Type “shutdown” then “enter”, followed by “undo shutdown” then “enter”.
5. The IP addresses of the E 0/0 ethernet ports were set before you began the
lab. This was done to enable you to access the router using the telnet program.
However for your own knowledge, the configuration of the IP address of an
Ethernet port (in this case E 0/0) is shown below:
Enter Ethernet port E 0/0 of RTA, interface configuration mode
Set the IP address of Ethernet port E 0/0 of RTA as: 202.0.0.1 255.255.255.0.
(N.B: In this case the IP address was set to 202.0.0.1, while in the actual lab
experiment, router RTA, was set to 10.128.0.1. The subnet mask is
255.255.255.0 in both cases).
13. 13
(Question: can we set the IP address here as 192.0.0.5 255.255.255.0? Why?)
The same steps can be carried out to configure the IP address of router RTB, to
10.128.1.1, and the subnet mask to 255.255.255.0.
6. Log in to RTB using the same step as RTA.
7. Set the IP address of S 1/1 of RTB to 192.0.0.2 255.255.255.0
8. Check the communication between the computers and the routers.
Using: “start”-“run”-“cmd”-“ on PCs 1, 3, 5 or 7:
ping 10.128.0.1
ping 192.0.0.1
14. 14
ping 192.0.0.2
From PCs 2, 4, 6 or 8:
ping 10.128.1.1, 192.0.0.2 and 192.0.0.1.
(Question: Why do we ping the IP addresses in this order from both PCs?)
3.1.6 Conclusion
When you check the configuration of RTA and RTB by:
[RTA]display interfaces
You will find that PPP encapsulation has automatically been selected for the
serial interfaces. That means the default protocol of the serial interface on a
Huawei router is PPP.
From this experiment we learn how to set the IP address of serial ports and
Ethernet ports, how to set the IP address of PCs, and how to check the
communication between the PCs.
15. 15
The steps are summarized:
(1) Log in to the routers.
(2) Set the IP address of serial port and Ethernet port of RTA and RTB.
(2) Set the IP address of the PCs.
(3) Check the result of this experiment whether PCA and PCB can communicate.
3.1.7 Commands
RTA:
[RTA] interface S 1/1
[RTA-s 1/1] IP address 192.0.0.1 255.255.255.0
[RTA] display current-configuration
[RTB]:
[RTB] interface S 1/1
[RTB-s 1/1] IP address 192.0.0.2 255.255.255.0
[RTB] display current-configuration
3.2 PAP (Password Authentication Protocol)
3.2.1 Objective
Learn to configure PPP PAP authentication protocol.
Realize the communication between two routes with PAP authentication protocol.
3.2.2 Introduction
PAP is a 2-handshake authentication and the password is transmitted in plain
text.
In the first lab of this chapter, we know that if we do not configure any protocol,
PPP will be automatically encapsulated.
This lab wants to configure PAP protocol to realize the communication between
two Huawei routers. Serial ports s 1/1 are selected to configure PAP protocol.
This lab wants to realize the communication between two s 1/1 with PAP
16. 16
authentication protocol; therefore, the step for configuring the IP address of PCs
in the first lab is unnecessary.
It has the following steps.
1. Set the IP address of the selected serial port interface of the Router
Authentication Party RTA:
2. Configure the user list.
3. Authorize PAP authentication.
Authenticated Party RTB:
4. Configure PAP user.
3.2.3 Preparation
One PC with 10/100M NIC installed
Two Routers (Quidway AR 28-31) with 100/1000M Ethernet ports, Serial ports.
Console cable, Cross cables
3.2.4 Diagram
RTA RTB
PC A
Console
S 1/1
11.22.33.44
255.255.255.0
S 1/0
11.22.33.40
255.255.255.0
RTA RTB
PC A
Console
S 1/1
11.22.33.44
255.255.255.0
S 1/0
11.22.33.40
255.255.255.0
3.2.5 Experiment
Configure RTA
17. 17
1. Log in
2. Set the IP address of s1/1 of RTA
3. Add user RTB and set the password.
4. Authorize the PAP authentication mode.
18. 18
Configure RTB
5. Log in and configure IP address of S 1/1
6. Configure PAP user and the password.
7. Check the communication between both PCs, and RTA and RTB
19. 19
3.2.6 Conclusion
This lab wants to realize the communication between two PCs with PAP
authentication.
There are two parts of PAP, authenticating party and authenticated party.
In authenticating party we should:
(1) Configure user list with the password and
(2) Configure PAP authentication.
In authenticated party we should
(1) Configure PAP send user.
3.2.7 Commands
RTA
[RTA] local-user RTB
[RTA-luser-RTB] password simple hello
[RTA-luser-RTB] quit
[RTA] int s 1/1
[RTA-s 1/1] IP address 11.22.33.44 255.255.255.0
[RTA-s 1/1] PPP authentication-mode pap
RTB
[RTB] int s 1/1
[RTB-s1/1] IP address 11.22.33.40 255.255.255.0
[RTB-s1/1] PPP pap local-user RTB
20. 20
[RTB-luser-RTA] password simple hello
3.3 FRP (Frame Relay Protocol)
3.3.1 Objective
Learn to configure FRP.
Realize the communication of two routers with FRP protocol.
3.3.2 Introduction
The frame relay protocol is a kind of fast packet switching technology based on
X.25 protocol. FRP only implements the function of the core of the link layer;
therefore it is simpler and more efficient to forward or switch data units in the
data link layer.
This experiment has the following steps:
1. Encapsulate interface.
2. Configure the terminal type of frame relay interface.
3. Allocate DLCI on DCE.
3.3.3 Preparation
One PC with 10/100M NIC installed
Two Routers (Quidway AR 28-31) with 100/1000M Ethernet ports, Serial ports.
Console cable, Cross cables
21. 21
3.3.4 Diagram
3.3.5 Experiment
RTA
1. Enable frame relay switching
2. Configure the IP address of the interface
RTA RTB
PC A
Console
S 1/1 S 1/1
202.38.7.1
255.0.0.0
202.38.7.56
255.0.0.0
DCE DTE
DLCI=100
RTA RTB
PC A
Console
S 1/1 S 1/1
202.38.7.21
255.0.0.0
202.38.7.56
255.0.0.0
DCE DTE
DLCI=100
22. 22
3. Configure the interface encapsulation as frame relay
4. Configure local virtual circuit
5. Configure static address mapping
23. 23
RTB
6. Configure the IP address of the interface
7. Configure the interface encapsulation as frame relay
8. Configure static address mapping
24. 24
9. Check the communication between both PCs, and RTA and RTB
(Question: Change the DLCI for R1 S 2/1 as 200:
[RTA -S 1/1] fr dlci 200
Ping the address 202.38.7.21, succeed or not?
Then change the command as:
[R1-S 2/1] fr inarp
Ping the address 202.38.7.21, succeed or not?)
3.3.6 Conclusion
FRP is an important lab. In this lab, the following job should be completed to
realize the communication between two Huawei routers:
(1) Encapsulate the frame relay protocol
Link-protocol frame-relay
(2) Configure the terminal type of the frame relay interface
Fr interface {dce / dte}
25. 25
3.3.7 Commands:
RTA
[RTA] fr switching
[RTA] interface S 1/1
[RTA-S 1/1] IP address 202.38.7.21 255.0.0.0
[RTA-S 1/1] link-protocol fr
[RTA-S 1/1] fr interface-type dce
[RTA-S 1/1] fr dlci 100
[RTA-fr-dlci-S 1/1-100] fr map ip 202.38.7.56 dlci 100
RTB
[RTB] interface S 1/1
[RTB-S 1/1] IP address 202.38.7.56 255.0.0.0
[RTB-S 1/1] link-protocol fr
[RTB-S 1/1] fr interface-type dte
[RTB-S 1/1] fr map IP 202.38.7.21 dlci 100
3.4 CHAP (Challenge Handshake Authentication
Protocol)
3.4.1 Objective
Learn to configure CHAP protocol.
Realize the communication between two Huawei routers using CHAP
authentication protocol.
3.4.2 Introduction
CHAP is a 3-handshake protocol. The authentication is originated by the
authenticating part.
Like PAP authentication protocol, there are two parts in CHAP, authenticating
party and authenticated party.
1. Set the IP address of the selected serial port interface of the Router
Authentication Party:
2. Configure authentication method.
3. Configure local host name.
4. Add the remote user name and password to the local user list.
26. 26
Authenticated Party:
5. Configure the local host name and the remote user name and password.
3.4.3 Preparation
One PC with 10/100M NIC installed
Two Routers (Quidway AR 28-31) with 100/1000M Ethernet ports, Serial ports.
Console cable, Cross cables
3.4.4 Diagram
RTA RTB
PC A
Console
S 1/1
10.0.0.8
255.0.0.0
S 1/1
10.0.0.23
255.255.255.0
RTA RTB
PC A
Console
S 1/1
10.0.0.8
255.0.0.0
S 1/1
10.0.0.23
255.255.255.0
3.4.5 Experiment
RTA
29. 29
Check the communication between both PC, and RTA and RTB.
3.4.6 Conclusion
In CHAP authentication protocol, we have the following things to do:
(1) Authenticating party configuration:
Configure authentication method
ppp authentication-mode chap
Configure local host name
ppp CHAP user username
Add the remote user name and password to the local user list.
local-user username password simple password
(2) Authenticated party configuration:
Configure the local host name and the remote user name and the
password.
ppp CHAP user username
local-user username password simple password
3.4.7 Commands
RTA
[RTA] local-user RTB
[RTA-luser-RTB] password simple hello
[RTA] int s 1/1
[RTA-s 1/1] PPP chap user RTA
[RTA-s 1/1]PPP authentication-mode chap
30. 30
RTB
[RTB] local-user RTA
[RTA-luser-RTB] password simple hello
[RTA] int s 1/1
[RTA-s1/1] PPP chap user RTB
3.5 X.25
3.5.1 Objective
Learn to configure X.25 protocol.
Realize the communication of two computer use X.25 protocol.
3.5.2 Introduction
The X.25 recommendation is the interface specification between the DTE and the
DCE. Its main function is to describe how to set up virtual circuit, transmission
packets, set up links, transmit data, release links and to clear the virtual circuits
between the DTE and the DCE, and in the meantime, it will implement the error
control, flow control, statistics, etc. And also it provides users with some optional
services and configuration functions. (Note: The DTE and DCE here are different
form the DTE and DCE of the physical interface. Here DTE means the user
equipment such as routers, etc; DCE means equipments such as packet switch,
etc. Route can also sever as the DCE.)
In the first experiment of this chapter, we know that if we do not configure any
protocol, PPP will be automatically encapsulated. That means this experiment
should configure X.25 by hand.
It has the following steps.
1. Set the IP address of the selected interface of the Router
2. Configure the interface to encapsulate it as the X. 25.
3. Specify its work model: DTE or DCE.
4. Specify the address mapping.
5. Set the flow control parameter.
31. 31
3.5.3 Preparation
One PC with 10/100M NIC installed
Two Routers (Quidway AR 28-31) with 100/1000M Ethernet ports, Serial ports.
Console cable, Cross cables
3.5.4 Diagram
RTA (DTE) RTB (DCE)
PC A
Console
S 1/1 S 1/1
202.38.160.1
255.255.255.0
202.38.1600.2
255.255.255.020112451 20112452
RTA (DTE) RTB (DCE)
PC A
Console
S 1/1 S 1/1
202.38.160.1
255.255.255.0
202.38.1600.2
255.255.255.020112451 20112452
3.5.5 Experiment
RTA:
1. Configure the IP address of S 1/1 of RTA
32. 32
2. Encapsulate this interface as the X.25 interface and specify that it works in the
DTE mode.
3. Specify the X.121 address in this interface
33. 33
4. Specify the address mapping to the remote end
5. Set the flow control parameter
RTB:
6. Configure the IP address of S 1/1 of RTB
34. 34
7. Encapsulate this interface as the X.25 interface and specify that it works in the
DTE mode.
8. Specify the X.121 address in this interface
35. 35
9. Specify the address mapping to the remote end
10. Set the flow control parameter
11. Check the communication between both PCs, and RTA and RTB
36. 36
(Question: Please change the command of step 9 as:
[RTB- S 1/1] X25 map IP 202.38.160.5 X121-address 20112451
Try to ping the address 202.38.160.2, succeed or fail? Why?)
Then input:
[RTB- S 1/1] undo X25 map IP 202.38.160.1 X121-address 20112451, ping
again, succeed or fail? Why?)
3.5.6 Conclusion
In this lab, the following steps should be completed:
(1) Configure the work mode of X.25
link-protocol X. 25 [dte/dce]
(2) Congigure the X. 121 address
X25 X121-address X. 121-address
(3) Create the map between network address and X. 121 address
X25 map protocol protocol-address x121-address X.121-address [?]
3.5.7 Commands
[RTA] interface s 1/1
[RTA- S 1/1] IP address 202.38.160.1 255.255.255.0
[RTA- S 1/1] link-protocol X25 DTE
[RTA- S 1/1] X25 X121-address 20112451
[RTA- S 2/0] X25 map IP 202.38.160.2 X121-address 20112452
[RTB] interface s 1/1
[RTB- S 1/1] IP address 202.38.160.2 255.255.255.0
[RTA- S 1/1] link-protocol X25 DCE
[RTA- S 1/1] X25 X121-address 20112452
[RTA- S 1/1] X25 map IP 202.38.160.1 X121-address 20112451
37. 37
3.6 FRS (Frame Relay Sub-interface)
3.6.1 Objective
Learn to configure FRS protocol.
Realize the communication among the computers with FRS
3.6.2 Introduction
FRS aims at solving the issue of split horizon in FR, therefore it adds a function
called sutinterface. That means on each physical interface we can set several
subinterfaces, each has its own IP address. The function of the subinterface is
the same as the physical interface, therefore the problem of split horizon is
solved.
This experiment has the following steps:
1. Configure the frame relay switch, enable frame relay switching, configure
frame relay interface type, and configure PVC route.
2. Create subterface, allocate DLCI, create address mapping, and configure IP
address on one Router.
3. Allocate DLCI, create address mapping, and configure IP address on other two
Routers.
3.6.3 Preparation
One PC with 10/100M NIC installed
Three Routers (Quidway AR 28-31) with 100/1000M Ethernet ports, Serial ports.
Console cable, Cross cables.
38. 38
3.6.4 Diagram
R1
PC A
S 1/1.1
DTE DCE
DTE
DTE
S 2/0
S 2/1
R4
R2
R3
S 1/1
S 1/1.2
192.0.0.1
255.255.255.0 DLCI=300
192.0.1.1 DLCI=400
255.255.255.0
S 1/1
S 1/1
192.0.0.2
255.255.255.0
DLCI=100
192.0.1.2
255.255.255.0
DLCI=200
Frame-relay switch
Console
R1
PC A
S 1/1.1
DTE DCE
DTE
DTE
S 2/0
S 2/1
R4
R2
R3
S 1/1
S 1/1.2
192.0.0.1
255.255.255.0 DLCI=300
192.0.1.1 DLCI=400
255.255.255.0
S 1/1
S 1/1
192.0.0.2
255.255.255.0
DLCI=100
192.0.1.2
255.255.255.0
DLCI=200
Frame-relay switch
Console
3.6.5 Experiment
R1
1. Configure the interface encapsulation as FR
2. Create sub-interface of S 1/1.1, allocate DLCI, create address mapping, and
configure IP address.
39. 39
3. Create sub-interface of S 1/1.2, allocate DLCI, create address mapping, and
configure IP address.
R2:
4. Allocate DLCI, create address mapping, and configure IP address.
40. 40
R3:
5. Allocate DLCI, create address mapping, and configure IP address.
R4:
6. Enable frame relay switching