The document provides setup guides for MikroTik AP1/AP2 access points, including instructions for accessing the AP, configuring bridged and routed setups, adding WPA/WPA2 security, setting up a WDS bridge, backing up configurations, and troubleshooting issues. It recommends downloading applications like Winbox, Neighbor Viewer, Dude, and PuTTy to access and configure the AP. Detailed steps are provided for various wireless configurations and settings. Appendices provide information on link distances, IP subnets, and additional troubleshooting actions.
The document describes MikroTik's proprietary nstreme and nstreme2 wireless protocols. Nstreme2 uses two wireless cards, one for transmitting and one for receiving, to achieve high data rates for point-to-point or point-to-multipoint connections. The document provides specifications for the protocols and explains how to configure interfaces and groups for nstreme and nstreme2 modes.
This document provides guidance on connecting a WHA-5500CPE/WHA-5500CPE-NT device to a Mikrotik Router Board RB-433 using either client infrastructure mode or WDS bridge pure MAC mode. It outlines the necessary configurations on the Mikrotik router, including setting the wireless interface to AP bridge mode and adding the WHA device's MAC address as a WDS interface. It also describes changing the WHA device to the corresponding client or WDS bridge mode and completing the connection. Security configurations for WEP, WPA, and WPA2 are briefly addressed as well.
The document discusses static routing, OSPF, and BGP routing protocols. It provides an overview of how each protocol works, including that static routes should be used for small networks or networks with a single ISP connection. OSPF is an alternative to RIP that uses link state routing and has features like classlessness and fast convergence. BGP exchanges routing information between autonomous systems and can be used to configure iBGP between internal routers and eBGP with external peers. The document also provides examples of configuring these protocols on MikroTik routers.
This document provides an overview of switching concepts in computer networking, including:
- How switches operate at the data link layer to segment networks and improve performance through dedicated bandwidth on each port.
- Key switch functions like reading MAC addresses to populate the MAC address table and make forwarding decisions.
- VLANs and how they logically segment networks for improved management and security.
- Spanning Tree Protocol which prevents switching loops by blocking certain ports.
- Port aggregation technologies like EtherChannel that bundle multiple physical ports into a single logical port for redundancy and increased bandwidth.
An internetwork is a collection of two or more computer networks (typically Local Area
Networks or LANs) which are interconnected to form a bigger network. All networks in an
Internetwork have a unique network address. Routers interconnect the networks
Cisco Packet Tracer is a network simulation program that allows students to experiment with network behavior and concepts like switching and routing. The document demonstrates how to set up a virtual network in Packet Tracer with PCs, switches, routers and servers and configure IP addresses and static routing. It shows how to assign IP addresses to devices, connect the devices with cables, and use the ping command to test connectivity between PCs across the routed network.
This document describes configuring PVST+ spanning tree protocol on a network topology. It involves:
1. Configuring VLANs, trunk ports between switches, and IP addresses for switch management.
2. Optimizing the spanning tree configuration by making one switch the primary root for certain VLANs and another the secondary root to load balance traffic across trunks.
3. Enabling PortFast on end-user ports to quickly forward traffic and BPDU guard to protect against devices connected to those ports influencing the spanning tree.
This document provides an overview of Spanning Tree Protocol (STP) and its various implementations. It defines key STP concepts like root bridge, BPDUs, port states, path cost, and port types. STP builds a loop-free Layer 2 topology by selecting a root bridge and placing redundant ports in blocking state. The document also covers STP variants like 802.1D, PVST+, RSTP, and MSTP.
The document describes MikroTik's proprietary nstreme and nstreme2 wireless protocols. Nstreme2 uses two wireless cards, one for transmitting and one for receiving, to achieve high data rates for point-to-point or point-to-multipoint connections. The document provides specifications for the protocols and explains how to configure interfaces and groups for nstreme and nstreme2 modes.
This document provides guidance on connecting a WHA-5500CPE/WHA-5500CPE-NT device to a Mikrotik Router Board RB-433 using either client infrastructure mode or WDS bridge pure MAC mode. It outlines the necessary configurations on the Mikrotik router, including setting the wireless interface to AP bridge mode and adding the WHA device's MAC address as a WDS interface. It also describes changing the WHA device to the corresponding client or WDS bridge mode and completing the connection. Security configurations for WEP, WPA, and WPA2 are briefly addressed as well.
The document discusses static routing, OSPF, and BGP routing protocols. It provides an overview of how each protocol works, including that static routes should be used for small networks or networks with a single ISP connection. OSPF is an alternative to RIP that uses link state routing and has features like classlessness and fast convergence. BGP exchanges routing information between autonomous systems and can be used to configure iBGP between internal routers and eBGP with external peers. The document also provides examples of configuring these protocols on MikroTik routers.
This document provides an overview of switching concepts in computer networking, including:
- How switches operate at the data link layer to segment networks and improve performance through dedicated bandwidth on each port.
- Key switch functions like reading MAC addresses to populate the MAC address table and make forwarding decisions.
- VLANs and how they logically segment networks for improved management and security.
- Spanning Tree Protocol which prevents switching loops by blocking certain ports.
- Port aggregation technologies like EtherChannel that bundle multiple physical ports into a single logical port for redundancy and increased bandwidth.
An internetwork is a collection of two or more computer networks (typically Local Area
Networks or LANs) which are interconnected to form a bigger network. All networks in an
Internetwork have a unique network address. Routers interconnect the networks
Cisco Packet Tracer is a network simulation program that allows students to experiment with network behavior and concepts like switching and routing. The document demonstrates how to set up a virtual network in Packet Tracer with PCs, switches, routers and servers and configure IP addresses and static routing. It shows how to assign IP addresses to devices, connect the devices with cables, and use the ping command to test connectivity between PCs across the routed network.
This document describes configuring PVST+ spanning tree protocol on a network topology. It involves:
1. Configuring VLANs, trunk ports between switches, and IP addresses for switch management.
2. Optimizing the spanning tree configuration by making one switch the primary root for certain VLANs and another the secondary root to load balance traffic across trunks.
3. Enabling PortFast on end-user ports to quickly forward traffic and BPDU guard to protect against devices connected to those ports influencing the spanning tree.
This document provides an overview of Spanning Tree Protocol (STP) and its various implementations. It defines key STP concepts like root bridge, BPDUs, port states, path cost, and port types. STP builds a loop-free Layer 2 topology by selecting a root bridge and placing redundant ports in blocking state. The document also covers STP variants like 802.1D, PVST+, RSTP, and MSTP.
- The document discusses troubleshooting EIGRP neighbor establishment and load balancing failures between routers. It provides background on EIGRP neighbor discovery and describes a scenario where load balancing is not occurring across two routers as expected.
- Showing route outputs from involved routers reveals the default network route is only available through one router's LAN interface, rather than being load balanced across the WAN links as intended. Interface counters on one router also show inbound traffic but no outbound on its WAN link.
- This points to a problem preventing the router from using its WAN link for routing, likely related to EIGRP neighbor establishment over the link, which the document proceeds to troubleshoot further.
Routers R1 and R2 were configured with OSPF routing and subnets were created for different departments on each router. Router R0 was configured as the central router to connect R1 and R2 along with providing DHCP and DNS services. Ping tests verified connectivity between devices on different subnets routing through the OSPF configured routers.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
The document provides instructions for a Packet Tracer activity to configure AAA authentication on Cisco routers. It includes the topology diagram and addressing tables. The objectives are to configure local authentication on R1 for the console and VTY lines, and configure server-based authentication using TACACS+ on R2 and RADIUS on R3. The tasks include verifying the configurations by logging in from PCs locally on R1 and remotely on R2 and R3 using the respective protocols.
Free CCNP switching workbook by networkershome pdfNetworkershome
This document provides instructions for configuring various networking features like VLANs, trunking, routing, spanning tree, port security, and macros on Cisco switches and routers. The tasks include:
1. Configuring VLANs, trunking between switches, and IP addresses on switches and routers according to a logical diagram.
2. Configuring EtherChannel between switches and verifying the EtherChannel status.
3. Configuring MSTP on switches to have two STP instances, with one switch as the root bridge for each instance.
4. Configuring SPAN/RSPAN between switches to monitor traffic on one switch port and send it to an analyzer connected to another switch port.
- The document is a lab manual for configuring and observing RIP routing between two routers, R1 and R2.
- In the first lab, RIP v1 is configured on both routers to exchange routes. The loopback and connected networks of each router are observed in their routing tables.
- The second lab examines RIP v1 updates, including that periodic updates are not sent at constant intervals. Disabling and enabling interfaces is used to observe triggered updates.
- The third lab configures unicast RIP updates between the routers instead of broadcast, by using the passive and neighbor commands.
The document discusses Olive, which is the codename for JUNOS software running on a PC rather than a Juniper router. It was originally developed by Juniper as a software development platform before their hardware was fully implemented. The document also discusses logical routers, which allow a single physical router to be partitioned into multiple virtual routers. It provides instructions on configuring logical routers in the Olive VM, including assigning interfaces, enabling OSPF and BGP between the logical routers, and restricting configuration access based on logical router.
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionIPMAX s.r.l.
This document discusses troubleshooting an OSPF routing protocol configuration issue where routers have an incorrect router ID. It describes checking connectivity and routing tables between routers, which reveal inconsistencies. The root cause is identified as Router A having the wrong router ID of 2.2.2.2 instead of its interface IP 1.1.1.1. The configuration is corrected by changing Router A's router ID, saving the changes, and rebooting Router A. Verification shows routing tables on Router C are now updated correctly.
Packet Tracer Simulation Lab Layer 2 SwitchingJohnson Liu
The document discusses configuring layer 2 switching and inter-VLAN routing. It describes powering on switches, assigning ports to VLANs, setting up trunk links between switches, and enabling inter-VLAN routing by adding a router with subinterfaces for each VLAN to allow communication between the VLANs.
The document provides an overview and instructions for setting up and using a Linksys 10/100 8-Port VPN Router. It includes chapters on networking basics, an introduction to the router's features and hardware, instructions for connecting the router, and setting up and configuring the router through its web-based utility. Appendices provide additional information on troubleshooting, installing the Linksys VPN client software, finding device addresses, the router's physical setup, firmware upgrades, and specifications.
The document discusses setting up an ISP using MikroTik. It describes installing VMware on a PC to run a MikroTik virtual machine. It then covers configuring the MikroTik virtual router by adding interfaces, IP addresses, a default route, and source NAT to allow connectivity to the internet from a client PC. DNS is also configured on the MikroTik router.
Virtual LANs (VLANs) logically segment a network to increase performance and security. VLANs can be static or dynamic and identify devices using frame tagging. VLAN trunking protocol (VTP) manages VLAN configurations across switches and has different modes like server, client, and transparent. VLANs are configured by creating them, assigning ports, setting up trunks, and configuring inter-VLAN routing. Troubleshooting involves checking the VTP status to ensure all switches are in the same domain and have the correct configuration revision.
This document describes how to build a simple packet tracer application using two star network topologies. It involves using devices like routers, switches, and PCs connected in a star configuration with a central router/server. The networks are built in Packet Tracer by dragging and dropping devices, connecting them with cables, and configuring the routers and PCs with IP addresses. Finally, the two networks are connected by linking the two routers with a fiber cable and configuring routing protocols between the routers.
This document discusses configuring VLAN trunking and routing on a stick between two switches and a router. It explains that VLAN trunking is used to separate broadcast domains and transmit VLAN traffic between switches and routers. The trunk ports between the switches and the switch to router link are configured, as well as subinterfaces on the router with different IP addresses for each VLAN. The configuration of the switches and router is shown, along with ping tests verifying connectivity between hosts in different VLANs works after routing is configured.
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
This document discusses computer networks and networking concepts. It covers topics like network components, network types, network topologies, network media, network protocols, network standards including Ethernet, token ring, ATM and WiFi. It also discusses wide area network technologies like X.25, frame relay, ATM. The last section discusses network services provided at Dusit University like SDU hosting, identity management, kiosks, email, WiFi and VPN access.
This document provides guidance on connecting a WHA-5500CPE/WHA-5500CPE-NT device to a Mikrotik Router Board RB-433 using either client infrastructure mode or WDS bridge pure MAC mode. It outlines the necessary configurations on the Mikrotik router, including setting the wireless interface to AP bridge mode and adding the WHA device's MAC address as a WDS interface. It also describes changing the WHA device to the corresponding client or WDS bridge mode and completing the connection. Security configurations for WEP, WPA, and WPA2 are briefly addressed as well.
This document discusses large gatherings of young people drinking in public spaces and proposes finding adequate areas away from neighbors for such activities to prevent streets from becoming dirty. It focuses on new forms of entertainment for crowds of youth and hosting bigger meets at a local level in places designed for this activity.
This document discusses the stages and effects of anorexia. It notes that the early stages involve not feeling hungry, obsession with mirrors, nausea, sadness and frustration over not losing weight. It states anorexia takes an average of five years to heal for those who recover. It lists common phrases used by those with anorexia and long term side effects like inability to have children, bone and heart problems, mood issues and loneliness. The document conveys that anorexia can permanently impact one's health, relationships and life if not addressed.
The document provides setup guides for MikroTik AP1/AP2 access points, including instructions for bridged, routed, and WDS bridge configurations. It also includes information on adding security, backing up configurations, and troubleshooting issues like the AP not being found or rebooting erratically. Appendices provide details on link distances, IP subnets, and further troubleshooting steps.
- The document discusses troubleshooting EIGRP neighbor establishment and load balancing failures between routers. It provides background on EIGRP neighbor discovery and describes a scenario where load balancing is not occurring across two routers as expected.
- Showing route outputs from involved routers reveals the default network route is only available through one router's LAN interface, rather than being load balanced across the WAN links as intended. Interface counters on one router also show inbound traffic but no outbound on its WAN link.
- This points to a problem preventing the router from using its WAN link for routing, likely related to EIGRP neighbor establishment over the link, which the document proceeds to troubleshoot further.
Routers R1 and R2 were configured with OSPF routing and subnets were created for different departments on each router. Router R0 was configured as the central router to connect R1 and R2 along with providing DHCP and DNS services. Ping tests verified connectivity between devices on different subnets routing through the OSPF configured routers.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
The document provides instructions for a Packet Tracer activity to configure AAA authentication on Cisco routers. It includes the topology diagram and addressing tables. The objectives are to configure local authentication on R1 for the console and VTY lines, and configure server-based authentication using TACACS+ on R2 and RADIUS on R3. The tasks include verifying the configurations by logging in from PCs locally on R1 and remotely on R2 and R3 using the respective protocols.
Free CCNP switching workbook by networkershome pdfNetworkershome
This document provides instructions for configuring various networking features like VLANs, trunking, routing, spanning tree, port security, and macros on Cisco switches and routers. The tasks include:
1. Configuring VLANs, trunking between switches, and IP addresses on switches and routers according to a logical diagram.
2. Configuring EtherChannel between switches and verifying the EtherChannel status.
3. Configuring MSTP on switches to have two STP instances, with one switch as the root bridge for each instance.
4. Configuring SPAN/RSPAN between switches to monitor traffic on one switch port and send it to an analyzer connected to another switch port.
- The document is a lab manual for configuring and observing RIP routing between two routers, R1 and R2.
- In the first lab, RIP v1 is configured on both routers to exchange routes. The loopback and connected networks of each router are observed in their routing tables.
- The second lab examines RIP v1 updates, including that periodic updates are not sent at constant intervals. Disabling and enabling interfaces is used to observe triggered updates.
- The third lab configures unicast RIP updates between the routers instead of broadcast, by using the passive and neighbor commands.
The document discusses Olive, which is the codename for JUNOS software running on a PC rather than a Juniper router. It was originally developed by Juniper as a software development platform before their hardware was fully implemented. The document also discusses logical routers, which allow a single physical router to be partitioned into multiple virtual routers. It provides instructions on configuring logical routers in the Olive VM, including assigning interfaces, enabling OSPF and BGP between the logical routers, and restricting configuration access based on logical router.
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionIPMAX s.r.l.
This document discusses troubleshooting an OSPF routing protocol configuration issue where routers have an incorrect router ID. It describes checking connectivity and routing tables between routers, which reveal inconsistencies. The root cause is identified as Router A having the wrong router ID of 2.2.2.2 instead of its interface IP 1.1.1.1. The configuration is corrected by changing Router A's router ID, saving the changes, and rebooting Router A. Verification shows routing tables on Router C are now updated correctly.
Packet Tracer Simulation Lab Layer 2 SwitchingJohnson Liu
The document discusses configuring layer 2 switching and inter-VLAN routing. It describes powering on switches, assigning ports to VLANs, setting up trunk links between switches, and enabling inter-VLAN routing by adding a router with subinterfaces for each VLAN to allow communication between the VLANs.
The document provides an overview and instructions for setting up and using a Linksys 10/100 8-Port VPN Router. It includes chapters on networking basics, an introduction to the router's features and hardware, instructions for connecting the router, and setting up and configuring the router through its web-based utility. Appendices provide additional information on troubleshooting, installing the Linksys VPN client software, finding device addresses, the router's physical setup, firmware upgrades, and specifications.
The document discusses setting up an ISP using MikroTik. It describes installing VMware on a PC to run a MikroTik virtual machine. It then covers configuring the MikroTik virtual router by adding interfaces, IP addresses, a default route, and source NAT to allow connectivity to the internet from a client PC. DNS is also configured on the MikroTik router.
Virtual LANs (VLANs) logically segment a network to increase performance and security. VLANs can be static or dynamic and identify devices using frame tagging. VLAN trunking protocol (VTP) manages VLAN configurations across switches and has different modes like server, client, and transparent. VLANs are configured by creating them, assigning ports, setting up trunks, and configuring inter-VLAN routing. Troubleshooting involves checking the VTP status to ensure all switches are in the same domain and have the correct configuration revision.
This document describes how to build a simple packet tracer application using two star network topologies. It involves using devices like routers, switches, and PCs connected in a star configuration with a central router/server. The networks are built in Packet Tracer by dragging and dropping devices, connecting them with cables, and configuring the routers and PCs with IP addresses. Finally, the two networks are connected by linking the two routers with a fiber cable and configuring routing protocols between the routers.
This document discusses configuring VLAN trunking and routing on a stick between two switches and a router. It explains that VLAN trunking is used to separate broadcast domains and transmit VLAN traffic between switches and routers. The trunk ports between the switches and the switch to router link are configured, as well as subinterfaces on the router with different IP addresses for each VLAN. The configuration of the switches and router is shown, along with ping tests verifying connectivity between hosts in different VLANs works after routing is configured.
ccna workbook and lab manual by NETWORKERS HOME. NETWORKERS HOME understand the importance of CCNA workbook when it comes Cisco certification which is why we offered free CCNA workbook.
This document discusses computer networks and networking concepts. It covers topics like network components, network types, network topologies, network media, network protocols, network standards including Ethernet, token ring, ATM and WiFi. It also discusses wide area network technologies like X.25, frame relay, ATM. The last section discusses network services provided at Dusit University like SDU hosting, identity management, kiosks, email, WiFi and VPN access.
This document provides guidance on connecting a WHA-5500CPE/WHA-5500CPE-NT device to a Mikrotik Router Board RB-433 using either client infrastructure mode or WDS bridge pure MAC mode. It outlines the necessary configurations on the Mikrotik router, including setting the wireless interface to AP bridge mode and adding the WHA device's MAC address as a WDS interface. It also describes changing the WHA device to the corresponding client or WDS bridge mode and completing the connection. Security configurations for WEP, WPA, and WPA2 are briefly addressed as well.
This document discusses large gatherings of young people drinking in public spaces and proposes finding adequate areas away from neighbors for such activities to prevent streets from becoming dirty. It focuses on new forms of entertainment for crowds of youth and hosting bigger meets at a local level in places designed for this activity.
This document discusses the stages and effects of anorexia. It notes that the early stages involve not feeling hungry, obsession with mirrors, nausea, sadness and frustration over not losing weight. It states anorexia takes an average of five years to heal for those who recover. It lists common phrases used by those with anorexia and long term side effects like inability to have children, bone and heart problems, mood issues and loneliness. The document conveys that anorexia can permanently impact one's health, relationships and life if not addressed.
The document provides setup guides for MikroTik AP1/AP2 access points, including instructions for bridged, routed, and WDS bridge configurations. It also includes information on adding security, backing up configurations, and troubleshooting issues like the AP not being found or rebooting erratically. Appendices provide details on link distances, IP subnets, and further troubleshooting steps.
The document provides information about various aspects of culture and history in the United Kingdom, including famous landmarks in London, popular sports and music, traditional British food and drink, and the components that make up the United Kingdom. It tests knowledge through multiple choice questions on topics like the British flag, the royal family, national symbols of the UK countries, and famous television shows. The quiz-style document covers a wide range of facts about life and culture in the UK.
This document provides guidance on configuring Mikrotik Router OS to work with the Aradial radius server and Spotngo payment module for centralized and localized wireless network deployments. It covers initial Mikrotik configuration, hotspot configuration including radius server settings and captive portal redirection. The goal is to enable centralized authentication, authorization and accounting via the Aradial server located at a network operations center.
HSNM is a Linux-based carrier class all-in-one network appliance or VMware player that provides radius, syslog, and SMS services for authentication and management of Mikrotik hotspots and PPOE servers. It includes a web administration panel for customizing hotspot login pages and generating configuration files. HSNM allows multi-level access for administrators, resellers, network managers and users.
5G transport networks require re-architecting to meet new bandwidth, delay, synchronization, infrastructure, and architecture requirements for 5G services like eMBB, uRLLC, and mMTC. Key technologies for 5G transport include IP routing, MPLS VPN, FlexE, and segment routing to provide the necessary slicing, bandwidth, and latency while supporting a flexible, cloud-based architecture.
This document provides information about networking concepts for the CCNA exam, including transmission media, network interface cards, protocols, addresses, hubs, switches, routers, and the OSI model. It defines common networking cable types and standards like Ethernet and their associated bandwidths. It also covers IP addressing schemes including public/private IP ranges, subnetting of IP classes A, B and C, and default subnet masks. Network communication methods like unicast, broadcast and multicast are defined.
The document provides an overview of Mimosa Networks' backhaul product line. It summarizes the key products - the B5, B5c, and B11 point-to-point radios. It also reviews how to set up and configure the B5 radio, including downloading firmware, obtaining an unlock code from the cloud portal, and configuring settings like the IP address, SSID, and operating frequencies/power through the radio's web interface. Additionally, it discusses topics like calculating throughput, latency, collocating radios, and the auto-optimization features.
This document contains a 20 question quiz about wireless networks and 4G LTE. It covers topics like average upload/download speeds of 4G LTE networks, how 4G LTE compares to 3G, characteristics of 4G, acronyms related to wireless networks, expected data rates of 4G, and applications that use Bluetooth. It also contains a 20 question quiz on wireless local area networks, characteristics of HSDPA, features of cellular networks, standards related to 3G networks, and applications of 3G mobile networks.
This document contains a 20 question quiz about wireless networks and 4G LTE. It covers topics like average upload/download speeds of 4G LTE networks, the speed increase from 3G to 4G, characteristics of 4G networks, acronyms like SGSN and MSC, expected data rates and applications of 4G, architectural differences between 3G and 4G, and technologies like MIMO and LTE. The second half of the document contains another 20 question quiz about wireless local area networks, covering topics such as the function of access points, network modes, multiple access techniques, wireless distribution systems, and extended service sets.
1. Serial0 is up but the line protocol is down, indicating a potential issue with the cable or configuration settings not matching on both ends.
2. Static IP addresses are manually assigned while dynamic IP addresses are assigned by a DHCP server from its IP range, and have a lease duration after which the address may change.
3. Protocols establish rules and standards for moving data across a network, such as routing protocols like RIP, IGRP, and EIGRP that determine the best path between networks.
This document provides information about networking concepts relevant to the CCNA exam, including:
- Network components like transmission media, connectors, NICs, protocols, and addresses.
- Details on common transmission media types like Ethernet cabling standards and fiber optics.
- Explanations of networking protocols, ports, and the OSI model layers.
- Descriptions of networking addressing schemes including MAC addresses, IP addressing, and subnetting techniques.
The document contains sample exam questions for the CompTIA certification. It includes multiple choice questions covering a wide range of networking topics such as networking standards, protocols, devices, network topologies, OSI model layers and more. The questions are designed to test knowledge of fundamental networking concepts.
This document discusses how to simulate Mikrotik routers using GNS3 for network study and design. It begins by explaining the objectives of network simulation and concepts of simulation tools. It then provides step-by-step instructions on downloading and installing GNS3 and Mikrotik's Cloud Hosted Router (CHR) image. The document demonstrates how to add the Mikrotik router to GNS3 and manage it via Winbox. It also covers suggestions like connecting the cloud to a network and using RoMON features. Finally, it shows examples of static and dynamic routing configurations and provides a live demo.
1) The document provides instructions for setting up networks using Packet Tracer, including how to connect devices, configure IP addresses, and set up routing.
2) It gives step-by-step explanations for creating different network scenarios with one, two, and three networks connected by switches and routers.
3) For networks with multiple routers, it emphasizes that a routing protocol like RIP must be configured so the routers know how to direct traffic between networks.
The document discusses delivery, forwarding, and routing in computer networks. It defines delivery as handling packets by underlying physical networks based on supervision from the network and data link layers. Forwarding is placing a packet in its route to the destination by using a routing table. Routing refers to how routing tables are created to help with forwarding. Common routing protocols discussed include distance-vector protocols like RIP and IGRP, link-state protocols like OSPF and IS-IS, and BGP for routing between autonomous systems.
This document provides an overview and table of contents for a book titled "CCNA Practice Questions (Exam 640-802) Third Edition" by Jeremy Cioara. The book contains practice questions and answers to help readers study and prepare for the CCNA certification exam. It is divided into two parts that cover the ICND1 and ICND2 exam objectives. Each part contains multiple chapters that review topics like networking fundamentals, routing, switching, WAN technologies and network security. The document lists the chapter titles and topics covered in each one to help readers understand the scope of the material in the book.
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)keiko277
Router1 will forward the data packet out interface FastEthernet0/1 after replacing the source MAC address with its own MAC address 0000.0c36.6965 and the destination MAC address with the MAC address 0000.0c07.4320 of the next hop towards 192.168.40.5. The router performs these actions when it receives the data frame shown in the exhibit, as it must remove and replace the MAC addresses when routing traffic between different network segments.
This document contains a Cisco CCNA exam with 18 sections and 338 questions. It covers topics like TCP/IP, IP addressing, Cisco IOS, routing, security, switching, VLANs, IPv6, and WAN technologies. Sample questions test knowledge of routing protocols, encapsulation and addressing at different OSI layers, and configuration of routers, switches, and other network devices.
This document contains a Cisco CCNA exam with 18 sections and 338 questions. It covers topics like TCP/IP, IP addressing, Cisco IOS, routing, security, switching, VLANs, IPv6, and WAN technologies. Sample questions test knowledge of routing protocols, encapsulation and addressing at different OSI layers, and configuration of routers, switches, and other network devices.
VLSM allows a network administrator to utilize multiple subnet masks in the same IP address space. A /29 mask must be used to create eight smaller subnetworks from a /28 subnet, each having two usable host addresses. The most efficient route summary that can be configured on Router3 to advertise the internal networks to the cloud is 192.1.1.0/23 and 192.1.1.64/23.
Router1 will forward the data packet out interface FastEthernet0/1. The document provides a Cisco CCNA exam questions and answers about networking fundamentals like TCP/IP, IP addressing, routing, switching, and WAN technologies. It contains 17 sections with multiple choice questions to help students study and prepare for the CCNA certification exam.
The document contains sample questions and answers from a CCNA 2 Chapter 2 exam. It lists multiple choice questions about static routing concepts like administrative distance, route summarization, next hop addresses, and troubleshooting routing issues. It also includes exhibits of network diagrams and configuration outputs to aid in understanding the routing scenarios described in each question.
And first-class of all, a threat to hone your competencies. It’s adequate if you experience in over your head. We all did sooner or later, this subsequent step is about pushing thru that worry and on the point of address something as hard because the 200-301. In case you get caught, reach out. In case you see others caught, assist them.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
Mikro tik ap setup
1. MikroTik AP1 / AP2 Quick Setup Guide
To access your MikroTik AP, download the following applications:
Winbox : http://www.mikrotik.com/download/winbox.exe
Neighbour Viewer : http://www.mikrotik.com/download/neighbour.zip
Dude : http://www.mikrotik.com/dude/
PuTTy : http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe
** READ THIS FIRST **
The full version of this document can be downloaded from the MikroTik section of
www.wi-pipe.com. It contains important information, setup guides and support for
this AP. If contacting Wi-Pipe for support please indicate which of the provided
setups you are using and confirm you have completed the appropriate
Troubleshooting actions.
*NOTE* : Wi-Pipe strongly recommend users configure and test their setup
before installing this equipment.
The full version of this document contains the following sections:
1. ACCESSING THE MIKROTIK AP 3
1. MIKROTIK BRIDGED AP SETUP 5
2. MIKROTIK ROUTED SETUP 12
3. ADDING WPA / WPA2 SECURITY TO YOUR AP 15
4. SETTING UP A WDS BRIDGE 17
5. BACKING UP AND RESTORING AP CONFIGURATIONS 18
6. APPENDIX A: LINK DISTANCES 19
7. APPENDIX B: IP SUBNETS 20
8. APPENDIX C: TROUBLE SHOOTING 21
9. APPENDIX D: FURTHER INFORMATION 23
2.
3. 1. Accessing the MikroTik AP
1) Power up your MikroTik AP
2) Connect the AP directly to a PC using a cross over cable, or directly to a hub / switch
3) Run Winbox
4) Click on the ‘…’ button to view connected MikroTik devices
5) Select the device and click on connect
6) You are now connected to your MikroTik AP
4. Once you have assigned the AP an ip address it can also be accessed using PuTTY.
5. 1. MikroTik Bridged AP setup
In this, the simplest setup we will create a dual access point (i.e. two radios, both set as an AP)
and bridge all the interfaces. The internet is accessed through a server connected to the wired
interface.
1) Select Bridge
2) Click on the red ‘+’ to add a new bridge
3) Accept all defaults and click on ok
6. 4) Click on the Ports tab
5) Click on the red ‘+’ to add a new port
6) Select Interface -> ether1, Bridge -> bridge1
7. 7) Click on the red ‘+’ again. This time select Interface -> wlan1, Bridge -> bridge1
8) Click on the red ‘+’ again. This time select Interface -> wlan2, Bridge -> bridge1
9) Close the Brige window
10) Click on IP - > Addresses
8. 11) Click on the red’+’ to add an address
12) Enter the ip adderss 192.168.1.10/24 in the address field
13) In the interface drop down list box select bridge 1, the click on ok
*NOTE* All address formats in MikroTik are in address/subnet format, i.e. 192.168..1.1/24. For a more
detailed explanation of this notation please see the appendix at the end of this document.
14) Close the Address List dialog box
15) Select Interfaces
16) Double click on wlan1 to configure
9. 17) Click on the wireless tab
18) In the Mode drop down select ap bridge
19) Enter the desired SSID in the SSID field
20) In the Band drop down select either 5GHz or 2.4GHz-B
*NOTE* Wi-Pipe recommends using 802.11b only at 2.4 GHz as this standard has more robust
signals
*NOTE* Wi-Pipe recommends not using the same SSID on multiple AP’s as this can cause circular
networks. These will cause error’s in your network and may prevent you from accessing your AP
remotely.
21) In the Frequency field enter the desired frequency
22) Click on ok to save changes
10. 23) Repeat for wlan2 (remember not to use the same SSID on both radio’s)
24) Select wlan1 and click on the blue to enable the interface
25) Select wlan2 and click on the blue to enable the interface
26) Close the Interface List window
11. 27) Select IP -> Routes
28) Click on the red ‘+’ to add the default route
29) In the destination field enter the address 0.0.0.0/0 (this is the notation for the default
route)
30) In the gateway field in the ip address 192.168.1.1
31) Click on ok to save changes
12. 2. MikroTik Routed Setup
This guide highlights the differences between a bridged and a routed setup. Note this assumes
you have not created the bridge and have not yet assigned an ip address to any interface.
1) Click on IP -> Address
2) Click on the red ‘+’ to add an address
3) Enter the ip address 192.168.1.10/24, Interface -> ether1
4) Click on the red ‘+’ to add another address
5) Enter the ip address 10.0.10.1/24, Interface -> wlan1
6) Click on the red ‘+’ to add another address
7) Enter the ip address 10.0.20.1/24, Interface -> wlan2
8) Click on IP -> Routes and add 192.168.1.1 as the default route as per steps 27 to 31
above.
13. 9) Click on IP -> Firewall
10) Click on the NAT tab
11) Click on the red ‘+’ to add a new NAT rule
12) Select Chain -> srcnat, Out Interface -> ether1
14. 13) Click on the action tab
14) Select masquerade from the Action list box
15) Click on ok to save
15. 3. Adding WPA / WPA2 Security to your AP
1) Click on the wireless button
2) Click on the Security Profiles tab
3) Click on the red ‘+’ to add a new profile
4) Enter a name for the profile in the name field
5) Enter the WPA pass phrase in the WPA pre-shared key field
6) Enter the WPA2 pass phrase in the WPA2 pre-shared key field
16. 7) Click on ok to save
8) Click on the Interfaces tab
9) Double click on wlan1 to configure
10) Click on the wireless tab
11) In the security drop down select the new security profile
12) Click on ok to save
17. 4. Setting up a WDS Bridge
1) Click on Bridge
2) Click on the red ‘+’ to add a new bridge
3) Enter details and click on ok
4) Click on Wireless
5) Double click on the wireless interface to configure
6) Select the wireless tab
7) In the mode drop down select bridge
8) In the band drop down select 5GHz or 2.4GHz-b as appropriate
9) In the Frequency enter the desired frequency
10) Click on the WDS tab
11) In the WDS mode tab select static
12) In the WDS default bridge drop down select the bridge created in step 2 above
13) Check the WDS Ignore SSID check box
14) Click on ok to save changes
15) Click on the red ‘+’ and select WDS to add a new WDS interface
16) Click on the WDS tab
17) From the Master Interface tab select the desired wireless interface
18) Enter the MAC address of the other side of the link in the WDS address field
19) Click on ok to save
20) Repeat steps on second AP to create the bridge connection.
18. 5. Backing up and Restoring AP configurations
To backup your configuration:
1) Click on files
2) Click on backup
3) The system configuration will automatically be saved
4) To download the file, ftp to the router and download the file
To restore your configuration:
1) Open an ftp connection to the router and upload the configuration file
2) Click on files
3) Select the backup file and click on restore
19. 6. Appendix A: Link Distances
The graph below details the distances at which you should get a link quality (signal to noise,
SNR) of 10dB. The combined gain is the sum of the antenna gain at the access point and CPE.
This graph assumes the use of MikroTik R52 radio cards at both ends of the link, and perfect line
of sight.
5Ghz 10dB Distances
25
20
Distance (km)
15
Distance km (6 Mbps)
Distance km (54 Mbps)
10
5
0
10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50
Combinted Gain (dB)
Combined Gain 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50
Distance km (6
Mbps) 1.9 2.5 3.1 3.9 4.9 6.2 7.8 9.8 12.3 15.5 19.5 24.5 30.9 38.9 49 69.2 87.1
Distance km (54
Mbps) 0.3 0.4 0.4 0.6 0.7 0.9 1.1 1.4 1.7 2.2 2.8 3.5 4.4 5.5 7 8.7 11
2.4Ghz 10dB Distances
25
20
Distance (km)
15
Distance km (1 Mbps)
Distance km (11 Mbps)
10
5
0
10 12 14 16 18 20 22 24 26 28 30 32 34 36 38
Combined Gain (dB)
Combined Gain 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38
Distance km (1 Mbps) 1.5 1.9 2.4 3 3.8 4.8 6 7.6 9.5 12 15 19
Distance km (11 Mbps) 0.85 1.1 1.5 1.7 2.1 2.7 3.4 4.3 5.4 6.7 8.5 11 13.5 17 21.3
20. 7. Appendix B: IP Subnets
Class C
Network Bits Subnet Mask Number of Subnets Number of IP’s
/24 255.255.255.0 0 254
/25 255.255.255.128 2 126
/26 255.255.255.192 4 62
/27 255.255.255.224 8 30
/28 255.255.255.240 16 14
/29 255.255.255.248 32 6
/30 255.255.255.252 64 2
Class B
Network Bits Subnet Mask Number of Subnets Number of IP’s
/16 255.255.0.0 0 65534
/17 255.255.128.0 2 32766
/18 255.255.192.0 4 16382
/19 255.255.224.0 8 8190
/20 255.255.240.0 16 4094
/21 255.255.248.0 32 2046
/22 255.255.252.0 64 1022
/23 255.255.254.0 128 510
/24 255.255.255.0 256 254
/25 255.255.255.128 512 126
/26 255.255.255.192 1024 62
/27 255.255.255.224 2048 30
/28 255.255.255.240 4096 14
/29 255.255.255.248 8192 6
/30 255.255.255.252 16384 2
21. 8. Appendix C: Trouble Shooting
Winbox unable to find router locally connected to PC
Remedial steps:
- Ensure router is powered up
- Ensure router has fully booted, this can take more than 60 seconds
- If router has ip address ensure PC has an ip address on same subnet
- Ensure cross over cable is used from PoE injector to PC
- Ensure the cross over cable is not damaged
- Check the PC shows the Ethernet port has a connection. To do this start a
command prompt. At the command prompt enter the command ‘ipconfig’. If
‘Media Disconnected’ is displayed, check all cables for damage.
- Ensure no firewalls etc. are running on the PC which would prevent it from
accessing the router on all ports
- Attempt the same operation on a separate PC
If after performing all of the above steps you still cannot access the AP, fill out the RMA form
http://www.wi-pipe.com/docs/Returns%20Form.pdf and return to Wi-Pipe for further investigation.
Wi-Pipe will check the unit once received and report on whether the unit is faulty or not.
Winbox connects to router, and then immediately disconnects
Remedial steps:
- Try to connect by entering the ip address rather than the MAC address of the
router into the Winbox connection screen
- Deselect the secure mode check box before connecting to the router
- Ensure the PC does not have an enabled wireless interface. If it does, disable the
wireless interface and attempt to connect again
- Attempt the same operation of a separate PC
If after performing the above steps you still cannot access the AP perform either of the following
steps:
- Download and start PuTTy
(http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe)
- Enter the AP’s ip address and click on open
- Enter login of admin and press enter
- If asked for a password leave blank and hit enter
- Reset the system by entering the command /system reset at the command
prompt
- When asked are you sure, select y and hit enter
- When the system has been reset, try and access it using Winbox again
If after performing all of the above steps you still cannot access the AP, fill out the RMA form
http://www.wi-pipe.com/docs/Returns%20Form.pdf and return to Wi-Pipe for further investigation.
Wi-Pipe will check the unit once received and report on whether the unit is faulty or not.
22. AP Reboots erratically
This can be cause by many wireless interfaces having the same SSID causing many circular
networks, poor power supply or board malfunction.
Remedial actions:
- Select Wireless
- Select each of the wireless interfaces and click on the red ‘x’ to disable them
- Wait to see if router reboots. If not, amend the SSID’s so they are not all the
same
If after performing all of the above steps you still cannot access the AP, fill out the RMA form
http://www.wi-pipe.com/docs/Returns%20Form.pdf and return to Wi-Pipe for further investigation.
Wi-Pipe will check the unit once received and report on whether the unit is faulty or not.
Other Issues
If you have any other problems with you AP, please main details of the problem to info@wi-
pipe.com. Include in the mail which of the setup’s above you were attempting, symptoms and as
many screen shots as possible, especially the Status tab from the wireless configuration menu.
23. 9. Appendix D: Further Information
If you require further assistance it can be found at:
Manuals
http://www.mikrotik.com/testdocs/ros/2.9/
MikroTik FAQ
http://wiki.mikrotik.com/wiki/MikroTik_RouterOS_Frequently_Asked_Questions_-_FAQ
MikroTik Forum
http://forum.mikrotik.com/
MikroTik Support
Support@mikrotik.com
If you would like guidance on more complicated setups please contact Wi-Pipe at + (0) 51 387
753 or info@wi-pipe.com