From 786b5866b2a21069482b3b75bf8e9803990c3b61 Mon Sep 17 00:00:00 2001 From: Tim Young Date: Sat, 11 Mar 2017 11:07:24 +0300 Subject: [PATCH] Add more puzzles and doc for powered off devices --- EduNetworkBuilder/EduNetworkBuilder.csproj | 2 + EduNetworkBuilder/NB.cs | 6 +- .../Properties/Resources.Designer.cs | 22 +- EduNetworkBuilder/Properties/Resources.resx | 6 + EduNetworkBuilder/Resources/Help.rtf | 946 +++++++--- EduNetworkBuilder/Resources/Level0_Power.enbx | 639 +++++++ .../Resources/Level2_CannotConnect.enbx | 1554 +++++++++++++++++ .../Resources/languages/edustrings.resx | 8 + 8 files changed, 2905 insertions(+), 278 deletions(-) create mode 100644 EduNetworkBuilder/Resources/Level0_Power.enbx create mode 100644 EduNetworkBuilder/Resources/Level2_CannotConnect.enbx diff --git a/EduNetworkBuilder/EduNetworkBuilder.csproj b/EduNetworkBuilder/EduNetworkBuilder.csproj index ec7c30d..1c50262 100644 --- a/EduNetworkBuilder/EduNetworkBuilder.csproj +++ b/EduNetworkBuilder/EduNetworkBuilder.csproj @@ -240,6 +240,7 @@ + @@ -255,6 +256,7 @@ + diff --git a/EduNetworkBuilder/NB.cs b/EduNetworkBuilder/NB.cs index 0e39688..d5cf7ee 100644 --- a/EduNetworkBuilder/NB.cs +++ b/EduNetworkBuilder/NB.cs @@ -53,18 +53,18 @@ namespace EduNetworkBuilder None, DHCP, DHCPServer, Firewall, Gateway, Help, IPAddress, Link, Subnet, Ping, VPN, Hub, Switch, ARP, StaticRoute, Subnetting, WhenToSubnet, ComparingAddresses, MACAddress, Network, Packet, NIC, Interface, Router, PacketCorruption, GeneralWireless, WirelessSSID, WirelessKey, - WirelessAP, WirelessRouter, WirelessRepeater, WirelessBridge, VLAN + WirelessAP, WirelessRouter, WirelessRepeater, WirelessBridge, VLAN, Power } public enum FirewallRuleType { Allow, Drop } public enum PuzzleNames { Level0_IP, Level1_NoGateway, Level0_NeedsLink, Level0_NoSwitch, Level1_BadDHCP, Level1_BadGateway, - Level0_SimpleDHCP, Level1_BadIP, Level0_Help, Level0_Ping, Level0_HubVsSwitch, + Level0_SimpleDHCP, Level1_BadIP, Level0_Help, Level0_Ping, Level0_HubVsSwitch, Level0_Power, Level0_PacketCorruption1, Level0_PacketCorruption2, Level1_AddingDevices, Level1_MidDHCP, Level1_OneNetTwoSubnets, Level1_DuplicateIPs, Level0_NetworkLoop, Level1_DuplicateMAC, Level2_FirewallDemo, Level1_OneNetTwoSubnets2, Level2_VPN_Demo, Level2_Bad_VPN_IP, Level2_Bad_Encryption, Level2_Bad_Route, Level2_Blast_From_Past, Level2_Not_Working, Level2_Build_A_VPN, Level2_Connect_The_Dots, - Level2_VPN_woes, Level2_FirewallTest2, + Level2_VPN_woes, Level2_FirewallTest2, Level2_CannotConnect, Level3_BlackHole, Level3_Busted, Level3_Middle_Man_Out, Level3_PhoneyNetwork, Level3_VPNify, Level3_EncryptionTroubles, Level3_NowhereToGo, Level3_GrandCentralStation, Level3_Dead, Level0_NetworkLoop2, Level0_BrokenLink, Level3_TwoDHCPServers, diff --git a/EduNetworkBuilder/Properties/Resources.Designer.cs b/EduNetworkBuilder/Properties/Resources.Designer.cs index a6b69e2..2541bfa 100644 --- a/EduNetworkBuilder/Properties/Resources.Designer.cs +++ b/EduNetworkBuilder/Properties/Resources.Designer.cs @@ -163,7 +163,7 @@ namespace EduNetworkBuilder.Properties { /// /// Looks up a localized string similar to {\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;} - ///{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f40\fb [rest of string was truncated]";. + ///{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f50\fb [rest of string was truncated]";. /// internal static string Help { get { @@ -311,6 +311,16 @@ namespace EduNetworkBuilder.Properties { } } + /// + /// Looks up a localized resource of type System.Byte[]. + /// + internal static byte[] Level0_Power { + get { + object obj = ResourceManager.GetObject("Level0_Power", resourceCulture); + return ((byte[])(obj)); + } + } + /// /// Looks up a localized resource of type System.Byte[]. /// @@ -471,6 +481,16 @@ namespace EduNetworkBuilder.Properties { } } + /// + /// Looks up a localized resource of type System.Byte[]. + /// + internal static byte[] Level2_CannotConnect { + get { + object obj = ResourceManager.GetObject("Level2_CannotConnect", resourceCulture); + return ((byte[])(obj)); + } + } + /// /// Looks up a localized resource of type System.Byte[]. /// diff --git a/EduNetworkBuilder/Properties/Resources.resx b/EduNetworkBuilder/Properties/Resources.resx index 373f77b..40f346b 100644 --- a/EduNetworkBuilder/Properties/Resources.resx +++ b/EduNetworkBuilder/Properties/Resources.resx @@ -451,4 +451,10 @@ ..\Resources\gpl.txt;System.String, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089;Windows-1252 + + ..\Resources\Level0_Power.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + + + ..\Resources\Level2_CannotConnect.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + \ No newline at end of file diff --git a/EduNetworkBuilder/Resources/Help.rtf b/EduNetworkBuilder/Resources/Help.rtf index dfbe677..5e19da3 100644 --- a/EduNetworkBuilder/Resources/Help.rtf +++ b/EduNetworkBuilder/Resources/Help.rtf @@ -1,18 +1,18 @@ {\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;} -{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f40\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;} +{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f50\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;} {\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;} {\fhimajor\f31502\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0302020204030204}Calibri Light;}{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;} {\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;} -{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f41\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} -{\f42\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f44\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f45\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f46\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);} -{\f47\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f48\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f49\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f61\fbidi \fmodern\fcharset238\fprq1 Courier New CE;} -{\f62\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f64\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f65\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f66\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);} -{\f67\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f68\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f69\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f381\fbidi \froman\fcharset238\fprq2 Cambria Math CE;} -{\f382\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f384\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f385\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f388\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;} -{\f389\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f431\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f432\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f434\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;} -{\f435\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f436\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f437\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f438\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;} -{\f439\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f441\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f442\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f444\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;} -{\f445\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f448\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f449\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} +{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f357\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} +{\f358\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f360\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f361\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f362\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);} +{\f363\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f364\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f365\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f377\fbidi \fmodern\fcharset238\fprq1 Courier New CE;} +{\f378\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f380\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f381\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f382\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);} +{\f383\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f384\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f385\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f697\fbidi \froman\fcharset238\fprq2 Cambria Math CE;} +{\f698\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f700\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f701\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f704\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;} +{\f705\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f747\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f748\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f750\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;} +{\f751\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f752\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f753\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f754\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;} +{\f755\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f857\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f858\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f860\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;} +{\f861\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f864\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f865\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} {\flomajor\f31509\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flomajor\f31511\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\flomajor\f31512\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;} {\flomajor\f31513\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flomajor\f31514\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\flomajor\f31515\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;} {\flomajor\f31516\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbmajor\f31518\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fdbmajor\f31519\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;} @@ -40,12 +40,12 @@ \fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext0 \sqformat \spriority0 Normal;}{\*\cs10 \additive \ssemihidden \sunhideused \spriority1 Default Paragraph Font;}{\* \ts11\tsrowd\trftsWidthB3\trpaddl108\trpaddr108\trpaddfl3\trpaddft3\trpaddfb3\trpaddfr3\trcbpat1\trcfpat1\tblind0\tblindtype3\tsvertalt\tsbrdrt\tsbrdrl\tsbrdrb\tsbrdrr\tsbrdrdgl\tsbrdrdgr\tsbrdrh\tsbrdrv \ql \li0\ri0\sa160\sl259\slmult1 \widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs22\alang1025 \ltrch\fcs0 \fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext11 \ssemihidden \sunhideused -Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid5375111\rsid5966121\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid8022092\rsid8342082\rsid8995041\rsid10760348 -\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0\mdispDef1\mlMargin0\mrMargin0\mdefJc1\mwrapIndent1440\mintLim0\mnaryLim1}{\info -{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo1\dy30\hr11\min54}{\version20}{\edmins1548}{\nofpages18}{\nofwords6113}{\nofchars34845}{\nofcharsws40877}{\vern89}}{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/ -office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect +Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid4603928\rsid5375111\rsid5966121\rsid6042682\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid7216714\rsid7365293\rsid8022092 +\rsid8342082\rsid8995041\rsid10760348\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0\mdispDef1\mlMargin0\mrMargin0\mdefJc1 +\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo3\dy11\hr9\min48}{\version22}{\edmins1552}{\nofpages19}{\nofwords6170}{\nofchars35171}{\nofcharsws41259}{\vern89}} +{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect \widowctrl\ftnbj\aenddoc\trackmoves0\trackformatting1\donotembedsysfont0\relyonvml0\donotembedlingdata1\grfdocevents0\validatexml0\showplaceholdtext0\ignoremixedcontent0\saveinvalidxml0\showxmlerrors0\horzdoc\dghspace120\dgvspace120\dghorigin1701 -\dgvorigin1984\dghshow0\dgvshow3\jcompress\viewkind1\viewscale110\rsidroot13008245 \nouicompat \fet0{\*\wgrffmtfilter 2450}\nofeaturethrottle1\ilfomacatclnup0\ltrpar \sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\*\pnseclvl1 +\dgvorigin1984\dghshow0\dgvshow3\jcompress\viewkind1\viewscale100\rsidroot13008245 \nouicompat \fet0{\*\wgrffmtfilter 2450}\nofeaturethrottle1\ilfomacatclnup0\ltrpar \sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\*\pnseclvl1 \pnucrm\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl2\pnucltr\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl4\pnlcltr\pnstart1\pnindent720\pnhang {\pntxta )}}{\*\pnseclvl5 \pndec\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl6\pnlcltr\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl7\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl8\pnlcltr\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl9\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}\pard\plain \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs22\alang1025 \ltrch\fcs0 @@ -66,7 +66,7 @@ office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\ \par \hich\af39\dbch\af31505\loch\f39 Each network card can have multiple IP addresses. This allows you to have one network wire coming into a computer, but have multiple IP-addresses. \hich\af39\dbch\af31505\loch\f39 This adds a little bit of complexity, to it being a "simple" network simulation tool. But it adds a lot of flexibility, as well as being closer to reality. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Building a network:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict {\pict{\*\picprop\shplid1046{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 1}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -178,7 +178,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 -\f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1045{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}} +\f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1045{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}} {\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 2}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex22\picscaley22\piccropl0\piccropr0\piccropt0\piccropb0\picw4868\pich4868\picwgoal2760\pichgoal2760\pngblip\bliptag-2029053173{\*\blipuid 870f1b0bebebc602ae30d0fca37d41f5} @@ -1069,7 +1069,7 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f 01010101010101010101010100000101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 -010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict +010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict {\pict{\*\picprop\shplid1044{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 3}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -1113,7 +1113,7 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f 11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111 11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111 111111111110111111111111111111111111111111111111111111111111111111111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111111111111110040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 -\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1043{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1043{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 4}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -1232,7 +1232,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \hich\af39\dbch\af31505\loch\f39 Use the\hich\af39\dbch\af31505\loch\f39 item list on the left to choose an item to add to the network. Click on an item to select it. Then click somewhere on the network to place it there. You may put as many of those items on the network as you want before clicking on something else. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1042{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1042{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 5}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -1931,7 +1931,7 @@ tem to the network. If you click on an item that is already on the network, you can drag it and release it to a new location. There is no visual feedback that shows that you are dragging and dropping it. When you release the button, the item will snap to \hich\af39\dbch\af31505\loch\f39 the new location. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Links:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict {\pict{\*\picprop\shplid1041{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 6}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -2638,7 +2638,7 @@ Delete, edit, ping from, arp from, dhcp request (if the device is configured to \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A packet is information that is sent from one computer to another. In this simulation, you can see the packets flowing between devices. A packet has a source and destination. Each packet looks different from the others. -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict {\pict{\*\picprop\shplid1040{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 7}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -3317,7 +3317,7 @@ c400f97f5e00fdece600fabaa7000000000000000000000000000000000000000000000000000000 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The Ping packet goes from one computer to the other. When it gets to the destination, the destination computer sends a ping response that says, "the ping made it." -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1039{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1039{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 8}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -3996,7 +3996,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The ARP packet (see the section on ARP) is used when one computer is looking for the MAC address of the other computer. You usually do not see these packets in this simulation unless you specifically ask a machine to \hich\af39\dbch\af31505\loch\f39 find the arp of another. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1038{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1038{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 9}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -4675,7 +4675,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DHCP packets contain IP address information (See the section on DHCP or DHCP Servers). They are used when a device needs to find its own IP address.\hich\af39\dbch\af31505\loch\f39 A DHCP server will respond with a packet to tell the device what IP address it should use. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1037{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1037{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 10}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -5359,7 +5359,7 @@ db00fbc1b200fa9a8000359fea00339eea00319eea00309dea00fdeae4002e9dea002d9cea002b9b 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A VPN packet is an encrypted packet (see the section on VPNs) that goes between t\hich\af39\dbch\af31505\loch\f39 wo firewalls that are configured for a VPN. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1036{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1036{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 11}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -6098,7 +6098,7 @@ The gateway is a computer on the same subnet as the IP address, where any non-lo e subnet-mask to determine if it is local or not. If the packet is local, it is sent straight out of the network card to the destination computer. If the packet is not local, it is routed to the default gateway, which sends it on towards the final desti \hich\af39\dbch\af31505\loch\f39 n\hich\af39\dbch\af31505\loch\f39 ation. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DHCP: -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict {\pict{\*\picprop\shplid1035{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 12}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -6783,7 +6783,7 @@ to have one assigned to it. DHCP is what happens. Basically the client broadca (See DHCP above) A DHCP server remembers all the clients that request IP addresses so it issues the same IP address if that particular client asks a second time. It also remembers which IP addresses it has given\hich\af39\dbch\af31505\loch\f39 out so it does not give the same IP address to different computers.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par \hich\af39\dbch\af31505\loch\f39 Ping: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1034{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1034{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 13}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -7469,7 +7469,7 @@ g packet to will usually respond. The word "Ping" comes from the concept of a s \ltrch\fcs0 \f2\insrsid6700708 \hich\af2\dbch\af31505\loch\f2 10:08:b1:73:aa:5b.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets that are being sent o\hich\af39\dbch\af31505\loch\f39 n the local network use the "Ethernet protocol", which sends the packet from one MAC Address to another. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par \hich\af39\dbch\af31505\loch\f39 ARP: -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict {\pict{\*\picprop\shplid1033{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 14}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -8160,36 +8160,439 @@ it gets a response back that says something like, "I have that IP and my MAC add \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par \hich\af39\dbch\af31505\loch\f39 Broadcast Packet: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -A broadcast packet is one that is sent out to everything that is considered local to it. Routers, firewalls, and some other devices do not pass broadcasts on.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 -\par \hich\af39\dbch\af31505\loch\f39 Static Routes: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -A static route has a network, a subnet mask, and a gateway. The gateway must be local to the computer that is sending out the packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, -\hich\af39\dbch\af31505\loch\f39 f\hich\af39\dbch\af31505\loch\f39 irewalls, and computers how to send packets when the IP addresses and gateways are not obvious. +A broadcast packet is one that is sent out to everything that is considered local to it. Routers, firewalls, and some other devices do not pass broadcasts on. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293 \hich\af39\dbch\af31505\loch\f39 Power:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293 +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft0\shptop3\shpright1490\shpbottom387\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz3\shplid1029 +{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv +{\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0\picw3450\pich889\picwgoal1956\pichgoal504\pngblip\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf} +89504e470d0a1a0a0000000d49484452000000a30000002a080200000050b17cc7000000017352474200aece1ce90000109249444154785eed5bd9935c5519ef +bbdfdb7b4ff76c992c246848022498842c24200a460838187789a0a296e583a556f9c083fe0b3ef80082e55202226008b21a212ca99028645f262bd967c8acdd +d3cbdd177fe79c9e9e21e999e92422dd95e9ba49f57cf73bdff9ceb7feceb9b7b95c2e179afa5c0516e0af82354e2d915860cad3574b1c4c797acad3578b05ae +96754ee5f4d5e269ee32b037473f0d6aa1807e2650bed15787a5555de0257b9ae77941103c7c7c3f3491c5ea2b127841e6798ee76004df75ddf194839bb1c050 +88c3fa260e887a5a1e9416f04f14907e3ef58c7fb17a97e6695841a49f81c15cb1a843683d2d781c5db8100ca1453a221131a20602e7eaba5e95156e46108b92 +a4eb662e97b72cbb015687ed93204b4a5c522299a420708e6ddb5543f9d23c2d49126cb16b4fd7731b5e3d74f88386b005fc276b4dd7adfcf5ca9b92cbaee7a7 +b778e3791a118c50ce66f3bfffe3337bf61d1a1e2e3484a7b55847eb9c35d3662d7bf0dec8ec69de957a9a156d54eb8181ec134f6d7ce3cd6ddd3de75127eadc +16a21c8b243f959ebe2a969e7fcbf5c69ad5ad0bae6bbbd8d32c9b11c7b95c61ebb61d8f3cf6e4b9eef3b6edd4f9ea50aca2c96b9ba6af4e4f5be6e6f7feea67 +ab6fbabe753c4fd78abd6108b8fac30ffb9f7f61d3d66d3bfb0786eadfcde85c5a6c7ab27571343577a87b5b7ee0a06d65c7abdb703316f5eef69d2fbffa5677 +776f03b839149294442c7343ac699e553c3fd8fdae6d0e4d109a35799a8294d0e0606efb7f76ffe92f7f3f76fc946198f51eefa11075f367c2f11985a1c37da7 +5eb7f4bef1dbb358d28d1d3bf7238eb76c7dcfb2ebbd43037f494a32d1bc309afab46be53f3cfea2593aef7b13a93db9a751d9d0c00052b6bebbe3a597370388 +350428852d5ae7ac6d9e7507c076ef89576d733008aae04706b651b1f6ec3df4e6dbdb0f1c3c5a15b8d65b580385a5da97b5cf5da768995cefcee1fe3d9e6b61 +7b75f9390d2bc8b28ccab6eddfbbfef9af770e1e3a566f6baeaa0f2f28e9e9b7aa91b65cefaeeea31bcc624f5075e34183180b04d24636bfb3e5bd62a954ff0b +e445558bcd00f8300be7ce9f781975bb169d27ca691aef0240fb4baf6c7ee1a537f61f38d210459b18223eb3a963956d6673bd7bf4dc095ad6aac43b5219db87 +835dc71f79eca95dbb0fe60bc5fa071fd8ebcb6a53aafd6641d40a83870a43475cbba63dc2b89e66451b3be6d367ba37bef8faaedd0786b2c3b5c4ce27cb2388 +6a2431bb79e6ed816fe7fbf694b2473dd7a8aa12d94a04a1debec1b7dedefedabfdee9eb1ffc6435af7176eca992ad4bc2f16b50b4f3035d8e591d635ec2c909 +7573e85c4fff5b5bdefbfd1f9e2995aa9f36d4a8dfff8d4d8db637b52fc7c6a3fbd0d3c3fdfb1d6b343abfbaeeae6f7c6ded4d0be763974536d9b27cbe2fbb75 +dbeee736bc76f4d849d76d80532094ab74c7ea64db12abd47beef0d38e950f0564a38be3bf582cf6dbdffc7ac5b29b2e793fad69dab113bdaf6cdab1f1e5ad86 +6935040ac39a01b6b1c54459eb3bf506dc3c1685553c6d1806e23808b80d2ffefba9e7de3edf37f07f0bc42b9c08483bda34d773f49ea3cfc3d995d55d91a7c3 +e1f091d3eeebdb725b77e6005f1be2889b13649c6ae7fbf79fed7aca758a14858db6e7b19e46427b81f88fcdb917360f4e700c7e858ef91f0fe7041c040df7ee +ea3db909ed39f0470f76aec8d3914864f7feb31b5fd9b1794bd7ff58e38f4d5c7afa6a25dc3adcbfefd4dec72f9ee4024fe331c79fffb6f589676b02ae1f9bca +b50a063856a2ed2db3ee404bea39f2773d7f66ecc82bf5f47fdedffbeca617de3ab5898ff91c17d8e724eba4ec1b04c4690b2cb1d5092cde3a29b97d1276aa52 +8b2bcf74c426f298c83a25db3d925fe4392950afb3c48cebebbcd32dd9dd12ee4a6dae3cc311536ee071f659096271978ff8ca4c479ae67042e00e88d659c9ed +17c10c99f2344788979ba87150757ac5c0459b0d224b0d8c8262f8d3cb0bfa5e75c6dc07e2cd0b8bd9e3b578da71dcdf3df2c49f1efd8b6292030757126c5976 +24910b42a2eb82c8a13e4892a129a411fabe62d9b2e5041ce7f33c881e9e1c0581e07a61c3e4fcc054154b9599f523254374dc10e1e48ad13086801394b04e8e +9b029eb714d95288292056d34d914204b039b2081d3c81075db61d4c8781b885b9ac48446b9e7fcda21febf9d397e7e9494e4ea45637795fbef9fb43991f64a3 +ab74215e3ee88ede524aafcfa5d60dab9fb243e4383ca45c6327d7e6c1862bbcd41093447bf823765b297d7f2e796f41fd74f90447996325eea69c0f66234b21 +9370823fbaaa94f92e191eff62015e6756d3e69b508089c5a5ccb52093d848f5535f196efe1e512cfd603671578157273a3720c7daa2081b8e051cc09ce1a291 +e9cfe24a660bf0259d33809b5343c3e9815cb450de5e0b9e1f2de8606bee1b4a66f3121c89d5058162dbe9fe1ce8f02e5318c478ae4064f60da50687e1332a32 +502d9b4d941ec86aec843108e1e96f8231d32b96d741c11d4c172e9515a3bad119277caaaeaa32ceab990e553f939d91e1919f1484a400ff23db464508012792 +0b2b2b13f16c5424cc65ce913715308a031d9cfc08274ffe646243d08d71e27fd0d9f06accec569999f21336890e619a4cb0489e8fc763994c2a1c562f80961c +7209d80ca9f391d71302461f4b2cb3317ad9a9c45b65ce317ec05218738513f9cd82a02c73440246c37e6398c7ac827cade8c626aafea1fb08e99a59d335baba +f1b0b3f0f0c30f571500ccd2ddd37b60ffd1233bcf9a4714d446e380ea9c970287cee872f61919b5d4fa40f1f33c51c90fb94382794c06a7794075fbc4c02661 +442afc29d9ec5251f9bd611a741ee70e8ae034f669a03b28fe901970beced9a7657d9f6aec57f1c52f96999d5ec93c42c412c95d1a11e253631abc794801bfbe +4f8326f65939915ea4445a71d08fbd6665513072221efdc54f1f5a73e7ad6d6dcd38ec842d90e2f8f2fece7defefedb215498fa8465843f9f5f18497f8844319 +3735d50c2b8e44ca2cccec0ba8ba12d84cc6896701d09ae75c5130c2aaa169ae44da0df11dcf99aaac473422535140814c529c25814d6486551464e23a2ad6d4 +c04ce89083e9309c4ae61d9928c66ed99a2a469b936d4bb1a1280c768ddd3d36679a3e7ffbca9ffc68fdb5b36760a6f15e1a18f7f9341019faf4df9e7f71d3bb +6f8668c6c0b270069a2bbe0be8dc8a0f8ba3c5fa16f40a714ac06b3e2bad20062687f6098d09a7ecc3bbbec1f926f13dca2ca752ce2084ae1f1844269292d708 +9d2cd206331f402c98351f74a600919c17d8742800a441303a2439a455cf9cff9d8bfb742a95587ef3a25ffefc872d2de98a2110c7e8d38ffeeec9c71fff2b2b +b0ac01132b93f61910222282e7d135593a82c8b152cc7120829fd1d1aa8962024f7c4f3fa8c0e8dc8c1371c08844267b7103de4523a6cc44ace757521fd3a1b5 +b3bece6eb1b1a004921c4d5f77719f8e44c28b16ce5bffadce95cb17e3e50184ef78e7f693546f5810998a04c5e51578e6667cf01db809b77c93da9de42ee7e5 +ca9cc062c4cdd4075e9e7266c1599e0b43ca9cfd22e1a43209aa82cc7e3a514e606e261634f88a02b855992e444b08530ca33004948b3fad2d995b562c5e77df +9ad6d60c73f3d8e246bc2bf0c8455c4832e6663229cd5442a46e66b6c677c6895bcccd8cce88153713e308642ce3aca844649689a3cc442c9da8acc34800b1b0 +1ba59767bcb07ea3322d5a38ffbe7bbfb068e18289dd0c3526f13432157818680b9798762bed504c7b0415773840bfac81f0611fa0bacc99f2484fa5e201bc81 +b4a5765788965d81218c539e658b239ce027326791890003218dd90818b0a2006ef1104255e684106667d361140472172d251e8b2e597ce3bace359ffbec0aec +4358dd1e1b0d0412bb1e80182e409e327aa29098405fdb61a8984c4738dd32a7ed2041199d7182ce329b7d208a71e256255f197a674406bb98d85166cbc6148c +9f950a99f253ddd88ca3cab3de3c73c6b4bbd7dcf6e5ce2f64d2c909b2b96cc989fbf4d1c281a1657b126b0ad1d53a2f85c8de492716051e4e75e6b5791649c4 +3e11655c5b600260273bf380e848530f495c14507b539d85c4da827aad85b68d0d15c686179aa010cea506e98803a25fe2a5162f7e47a9e96bc3c0ea62b3eb15 +48be8239ba5c4fde93073fc4e20250f006b00fe310372d3f1e8adf598cdd5a8a2c31e075fd801a4f8ef669d862d5ca25f77de9cee5372f2425c3752b6e666f98 +c0347bb6ef3abce5bdcc40365ad46171a4115a23ac1c36aca6ec702c5f827bd03ba106507a62b8d83498032790b9adc8c845ea3caba56f285628d1de4cf66318 +0ed09ecae6c1a91a968e5d164faa3164b6f40e8288bd16db6811b1ae971ecc257384395a421b0bb0af4399c174b1828e5b908c5b080e575584684ba54f076eb1 +a3a3f581f55fbeedd665d1886659931f624e96d3324935b1d545d2f0711f99540e90b82fb6b8c857d244594eab0112146cb884a807bc4d833624243c6cb5c526 +0f5e2f07b2eae34fb041020f4e0ae9512db0dd0285d0533e3651e5a409fb508089253a20d7590de303cc8eec27f4164f68f2c6e6343238918875de7bc7cae59f +c123d7f15ef48424a49764bbb8904fd8819535f47dc1f1b003c66e6724f942e89a84cd01a7379279a4fb82027aa5a732ff314ec941ee8e663f9b68b478d03b8c +99d13f2ad96792a96e238d9f2d9de763f1e8dd5fbc1dbd1970cc719c5aceaa27c1de078f1ffea0e7843b243ae724f3b06a9f9102da6ee154806ac05deb980c20 +8d9c26704c245d198721c621d5e911d162617d781a5fac3332b0374b533e1270e8ce7901c3cd232aea046472128915c0021cb098c715eba482aa006652f30352 +21c8190b24efd3d0f581ef107388004c4d0e64ce48f649c53cacc45324a725c16c4be4d67fbb73f5aa9b53c9387961f9a3efb056727ac78ebd3b77ec47e8007e +5bf4e8c31545b2dd03f822e92532228d5882c8909d38d920e71e3839a1281d3b47c4074e3c80bd2184063787a0415e524ec988006792ae0e8cc6e3f99a22a11e +00d5a378908d22aa34941385325d557017a5854d470a9e0c7e0900de0a8719f676ed7c52cb75ae5d71cf5d9f9bded18a97be6a7c437712ecfdcc4bff7863dfeb +1c0e25388a80fab177223945cead121eaa28c1507982864846a63dd247b1050311a8ca843f0274681cb1619487e1cc7909ca89060f543548c01af017af90e221 +a45cb4611f1d614844d090904245412f1fa9070838d019565766db801124c52149e7e1ef19f31e686a5f9c891b0bda8f7df3ebf760737541dd2e27287d9045b0 +f7a34ffee1b127c9791605cf0050f01fd11079465b26feb4e112d6a769cee13bf5b744fc4101394a2b503ac2021b33261f9d95a5383811160cbec1a338f32244 +06e2285883fba147b91e003002ca89c06bf44ccdf51031ac22602e4fd5c21982bd153e37a7f9f443f7df86268de71148e81a5f9299c8d307bb8ebdb6e91dbc2b +c91650ff9fb639f7643a6e9c3d4d5931bf386fdeb5aeeb547ff3997a1a2f1d3cbbe1d50d1bff59ffeb6295229c98356dee57db33c20db34b777dfe06f466acae +46371309e3fd5a07cfb2608b225eb7d1ab3fc9af4303e1518f2c6baa2a86159f19a2faef56a8a7f1e012efc40de76b7a61e3935f2c79ff4712e578242cab7862 +e7d9b56773b9928de7691802fd05ce268f2c1be5839fe3908bb4d5897f6e435e6a26cf11c63d67a8cb15138041d787d5550fe209d41e37a71bf737766cb593fe +ccae2e7d59ab52b580ed0b645ddaaf756a55648aaffe2c30d9b3acfad3784aa3cbb3c094a72fcf6e8d376acad38de7b3cbd378cad39767b7c61b35e5e9c6f3d9e569fc5f26ff178811746d230000000049454e44ae426082} +}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 26}}{\sp{\sn dhgt}{\sv 251659264}} +{\sp{\sn fLayoutInCell}{\sv 1}}{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard +\ql \li0\ri0\widctlpar\pvpara\posy2\dxfrtext180\dfrmtxtx180\dfrmtxty0\wraparound\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 {\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0 +\picw3450\pich889\picwgoal1956\pichgoal504\wmetafile8\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}010009000003a628000000007d28000000000400000003010800050000000b0200000000050000000c022b00a400030000001e00040000000701040004000000 +070104007d280000410b2000cc002a00a300000000002a00a3000000000028000000a30000002a0000000100180000000000b850000000000000000000000000 +000000000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffffffffffffffff7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7 +f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7ffff +fff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7 +f7f7f7f7f7f7fffffffff7f7fffffff7f7f7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffff7f7f7fffffff7f7f7f7f7f7f7 +f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7ffff +fff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7 +f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f7fff7f7f7f7f7fffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffff +ffffffffefefefefe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7 +e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7ef +e7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7f7e7e7fff7effff7f7fffffff7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffffffffff7efefefe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7 +e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7ef +e7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7e7efe7e7e7e7 +e7efe7e7e7e7e7efe7e7e7e7e7efe7e7efe7e7ffefeffff7f7fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffded6d69c948c63524a6b525263524a6b525263 +524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b52 +5263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a +6b525263524a6b525263524a6b525263524a6b525263524a6b525263524ab57b6bde8c7befad9cded6d6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7fffffffff7f7b5a5a563524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b52 +5263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a +6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b525263524a6b52526b524a8c635ade +8c73e7a58cd6bdb5fffffffffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffd6cece7b7b6b394a29395229395a29394221423121422921422921394221395229394a29423929 +392921422921393121394a29315229395a29394221423121392121422921394229395229394a29423929422921422921393121394a2939522939522939392142 +3121422921423129394221395229395229394a29393121422921422921423929394a29395a29395229395a29393921422921422921423121394a293952293952 +29395229394a294229219c5242d67352c67b63a59494efefe7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f79c8c8c422129 +31182939212939212942292939212142292139212139212931182939212942292142292139212139212939182939212939182942292142292142292139212139 +21293918294221293921214229214229213921293118293921293921294229213921214229213921213921293118293921293921214229213921214229213921 +293921293118293921293921294229293921214229213921213921293118293921293921294229296b3929d66b52c66b52a5847bdededefffffffffffff7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7ffffffcecec6849473318431319c39299c39397331393921422929422921397331299439318c3939522942312942292139523131843131a539299c39396b +31393929422921423121397331299439318439395229422929422921395229317b3131a542299c39396b31393921422929393929397331299c3931a542317b31 +395229422921422929395a29318c39299c3931a542299c39395a31423121422929423121318c39299c3931a542299439318439393121a55a42ce6b52b563526b +5252ada5a5efe7e7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffff7f7f79c8c943118313110392910393118393921294229214229213921 +31311031311039311831422929422921422929311831311042291039311839392129422929422921392129291039311042391831422921422921422929311831 +31103929103931183942292142292142292139213129103931103929103939213142292142292139212131183929103931103929103939183139212942292139 +21213921312910393110392910393118394221296b4231d66b52bd634a7b524aa59494deded6fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffd6cece7b9c7329b54221d64221de4a +298c31424229392121422921298c3121ce4221b539396b31392921422921315a2929ad4221d64221de4a298431394a2942292142312929943921ce4229ad3939 +6b3139212142292131632929ad4221d64221ce42298431394229392121394229298c3121d64a21d64229a539315a2942292139212131733121b53921de4a21d6 +4221de4a316b2942312939212142392921b54221d64a21d64221ce4229a5394239299c5239ce6b52a552424229294a3131bdb5b5f7f7f7fffffff7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7fffffffff7f794848c31103921004221004a21083939183142292142292131182929084221004231103939212142292139212131 +103921004221004a21083939212939212142292931182921084221004231183142292142292139212129103921004221004a2100424229294229214229213118 +2921004a21004229084231103142292142212142212929083921004a21004221084a29103139212942292142212929103121004221004221004a210839422129 +6b3931d66b52b55a426339314a39319c948cdeded6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f700 +0000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffcecec6849c7b29a53929bd4221bd4231843939392942292142292131843929b54229a5 +42315a29423129422921395a31299c3929c64221bd42317b31394229422929423121318c3929b53931a542396331422921422921396331299c3929c64221b542 +397b3939422942292139422931843929bd4229c642299439395a3142292142292131633131a54221bd4229c64221bd4239633142312142292139312131ad4229 +bd4229c64221b542319c39423121a55a42ce6b4aad5a4a4229214229297b6b63c6bdbdf7f7f7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffff7f7f79c8c +94311831290842210842311039391829422929422921392131290839291042311031422921422921422929311031290842210842311042392129422921392121 +39213129084229084231183142292942292142292929103929084221084229104239212142292942292139213121084229084229084239183142292142292939 +2129311039210842290842290842311839392129422929392129311831210842290842210842311039392129734231d66b52b5634a5a31294a31295a4a42b5a5 +a5e7e7e7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7ffffffd6cece7b736b394229394a29394a29393921422921422921422921393921394a2939422942312939292142292139312142422939422939 +4a29393921423121392121422921393921394a29394221423129422921422921393121394229394a29394a29393921423121422921423121393921394a29394a +29424229393121422921422921423929394221394a29394a29394a29393121422921422921422921394221394a29394a29394a293939214229219c5242ce6b52 +a55242422921422921523931846b6bcec6c6fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f79c8c8c42292939212939212939212142292939212142 +29213921213921293921214221294229214229213921213921293921293921293921214229214229214229213921213921293921294229293921214229214229 +21422129392129392129392129422921392121422921392121392129392129392129392121422921392121422921392121392129392129392129392121422921 +3921214229213921213921293921293921293921214229296b3929d66b52b55a426339314229214a31295a4a42b5adadfffffffffffff7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffcecec68473734229214229 +29422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921 +42292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142 +2921422929422921422921422921422929422921422921422921422929422921422921422921a55a42ce6b52ad5a424229214229294229215a423984736bcec6 +c6fff7f7fffffff7f7f7f7f7f7f7f7f7fffffff7f7f79c948c422921422921422921422929422921422921422921422929422921422921422921422929422921 +42292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142 +29214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229 +29422921734231d66b52bd634a6339294229214229214a312973635abdb5b5efefe7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffd6cece7b736b42392939392139422939312142292139212142292139312142 +42293939214231214229214229213929214239293939214242293931214229214229214229213931213939293939214231293921214229213931214239293939 +21394229393121422921392121422921393121424229393921423929392921422921392121423121393921424229393921394229393121422921392121422921 +3939214242293939213942293939214229219c5239ce6b52a552424229213921214229214229215239317b6b6be7e7e7f7f7f7fffffff7f7f7f7f7f7ffffffff +f7f7948c8c4229213921214221293921214229214229214229213921214221293921214229293921214229213921214229293921213921293921214229213921 +21422921392121422129392121422921422921422921392121422929392121422129392121422921422921422921392121392129392121422929392121422921 +4229214229213921213921293921214221293921214229214229214229213921213921293921214221293921214229216b3931d66b52b55a4263392942292142 +29213921214a313173635ac6bdbdf7efeffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7ffffffcecec6848c73316b31317b31317b31395a31423121422921422921395a31317331396b31394229423129422921424229316329 +317b39317b31395231393121422929422921395a31317331396b31394a29422921422921424a29316331317b31317331395a31423121422921393121395a3131 +7331317b31316329424229422921422921394a29396b31317b31317b31317b31424a29422921422921423121397331317331317b31317331396b31423121a55a +42ce6b4aad5a4a422921422921422921422929422921523931b5a5a5efe7e7f7f7f7fffffff7f7f7fffffff7f7f79c8c94392129311839311831392131392129 +42292942292142212931183139183139212942292142292142292939212931183131183139213139212942292142292142292931183131183139212942292942 +29214229213118293118393118313918314221214229294229214221293118313118393118313921294229214229294229213921313118313118393118313921 +31392121422929422921392131311831311839311831391831422129734231d66b52b5634a5a31294229294229214229214229215a4239847b73ded6d6f7f7f7 +fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffd6cece7b947329 +b54221d64221de4a298c31394229422921422921298c3121ce4221b542396b31392921422921315a2929ad4221d64221de4a298431394a293921214231212994 +3929ce4221ad39316b3142292142292131632929ad4221d64221d64a298431394229422921394a29298c3121d64a21d64229ad42315a29422921422921317331 +21b53921de4a21d64221de4a316b2942312142292142392921b53921d64a21d64221d64a29a5394239299c5242ce6b52a5524242292142292142292139212142 +29214229215239319c948cdededefffffff7f7f7f7f7f7f7f7f794848c31183921004221004a2908393921313921214229213118292908422100423110394229 +2142292139212131103921004221004a21083939212942292142292931182921084221004231183939212142292139212129104221004221004a210042422929 +39212142292131182921004a21004221084231103142292139212139212929083921004a21004221004a29103939212939212139212931103121084a21004221 +004a2908394221316b3931d66b52b55a426339313921214229214229214229214229214a3129735a5aded6d6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffcecec67b9c7b29b53929d64a21d642319439394229422929422921 +31943921c64229bd4231633142312942292139633129ad3921d64a21d642318c39394229422921393121319c3921c64229ad42316b3142292942292139633129 +a53929d64a21ce4231843939422942292939422931943921ce4229d64a29a53939633142292142292931733129b54221d64229d64a21d642396b313931214229 +2939392129bd4221ce4229d64a21ce4229ad42393121a55a42ce6b52ad5a4242292142292942292142292142292142292942292194847bd6d6cefffffff7f7f7 +fffffff7f7f79c8c9431103121084a21004229104239183142292142292139213129084229084229103942292942292142292929103929084a21004229084239 +212942292942292139213121004229084a31103142292142292142292929083921084a21004229084239212142292139212139213121004221084a2100423918 +3942292142292139212929104221004221084a21004231103939212942292139212931183921004221084a2100422910423921296b4231d66b52bd634a633929 +4229214229214229294229214229214229215a4239d6cecefffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffd6cece7b846b396331316b29317331395229423129392121422921395229396b313163293942294229214229213939 +21395a31316b31317331394a29423121422921423121315229316b31315a29394229392121422921394221396331316b31316b31394a29423129392121423121 +395229396b31316b31395a31393921422921392121394a29316329317331316b31317331394229423121392121423121316329397331316b31316b31315a2942 +31219c5239ce6b52a552424229213921214229214229214229213921214229218c7b73d6d6cefffffff7f7f7fffffffff7f7948c8c3921293118313118313118 +29392129422921422921392121391831311829392129392121422921392121392129311031311831311829422929392121422921392121391831311031392129 +42292142292139212139213131183139183131182942292142292142292139212131183131183139183139212942292142292142292931182931183131183139 +18313118294229294229214229293918293118313118313118313118294229296b3931d66b52b55a426339294229214229213921214229214229214229294a31 +31cecec6fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffe7d6ce +b58c84844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a3984 +4a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a +39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39c6634ad66b52ad5a4a422921422921422921 +4229294229214229214229218c7b7bd6cecefffffff7f7f7fffffffff7f7c6a59c844239844a39844a39844a39844239844a39844a39844a39844239844a3984 +4a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a +39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239844a39844a39844a39844239 +844a39844a39844a39844a39a55a42e77352b5634a5a3129422929422921422921422921422929422921523931cec6c6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffffe7dee7a58cde7352d66b52de7352d66b52de7352d66b +52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352 +d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de +7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352de7352de7352ad5a42523129422921422921392121422921422921422921847b73d6d6ceffff +fff7f7f7f7f7f7ffffffefb5a5de735ad66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352 +d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de +7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52de7352d66b52ef735ab55a +427342314229214229214229214229213921214229214a3131cecec6fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffe7ded6b5948c7342397342316b39317342316b39317342316b39317342316b39317342316b39317342316b +39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342 +316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b3931 +7342316b39317342319c5242c66b529452395a31294229214229214229214229294229218c7b7bd6cecefffffff7f7f7fffffffff7f7c6adad84524a7342316b +39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342 +316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b39317342316b3931 +7342316b39317342316b39317342316b39317342316b39317342316b39317342316b3931734231944a39bd634aad5a425a392942292142292942292142292142 +2921523931cec6c6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7fff7f7e7ded6ad9c9c5231294a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a2929 +4a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a +31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29216339319c5239de73527b42 +315231294229214229213921214229218c7b73d6d6cefffffff7f7f7f7f7f7ffffffe7e7debdada56b524a5231294a29214a29294a29214a31294a29214a2929 +4a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a +31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29214a29294a29214a31294a29 +214a29294a29214a31294a29214a29294a29215231298c4a39c6634aad5a425231294229214229214229214229294a3131cecec6fffffffffffff7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffded6d67b6b634a313142292942 +29214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229 +21422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921 +4229294229214229214229214229294229214229214229214229294229214229214a29216b4231a55a42bd634a8442395a39294229214229214229218c7b7bd6 +cecefffffff7f7f7f7f7f7f7f7f7ffffffdededea594945239394a31294229214229294229214229214229214229294229214229214229214229294229214229 +21422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921 +42292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942 +29216339318c4a39c6634a9c5242633931422921422929422921523931cec6c6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7bdb5ad7b6b634a3931422921422921422921392121422921422921422921 +39212142292142292142292139212142292142292142292139212142292142292142292139212142292142292142292139212142292142292142292139212142 +29214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229 +214229213921214229214229214229214229216b3931bd634ab5634a7b42314a2929422921422921847b73d6d6cefffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +d6cece94848452423942292139212142292142292142292139212142292142292142292139212142292142292142292139212142292142292142292139212142 +29214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229 +214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229215a39299c5239ce6b528c4a395a3129 +3921214229214a3131cecec6fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7ffffffffffffffffffbdb5b57b6b634a31294229294229214229214229214229294229214229214229214229294229214229214229214229 +29422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921 +4229214229214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214a +2921844a39c6634ab55a4a6b39314a31294229218c7b7bd6cecefffffff7f7f7f7f7f7f7f7f7ffffffffffffffffffefefef8473734a31314231294229214229 +29422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921 +42292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142 +29214229294229214229214229214229294229214229214229214229294a29216b3931c6634abd634a844239523129422921523931cec6c6fffffff7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7efef +b5adad735a5a39212142292142292142292139212142292142292142292139212142292142292142292139212142292142292142292139212142292142292142 +29213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921 +21422921422921422921392121422921422921422921392121422921422921422921392121422921422921422921422921ad5a42de7352c6634a5a3129422921 +8c7b73d6d6cefffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffc6c6bd8473734a313142292139212142292142292142292139212142292142292142 +29213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921 +21422921422921422921392121422921422921422921392121422921422921422921392121422921422921422921392121422921422921422921392121422921 +4229214229213921214229214a29218c4a39ce6b4ace6b528c4a394229294a3131cecec6fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f700 +0000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffff7f7f7efefefb5ada54a39314229214229294229214229 +21422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921 +42292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942 +2921422921422921422929422921422921422921422929422921422921633929a55a42c6634aad5a4a52312994847bd6cecefffffff7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7fffffffffffff7f7f7bdb5b57b6363422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921 +42292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942 +29214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214229214a2929523129844a +39b55a4ac6634a7342315a4239cec6c6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffffffff7e7e7de9c948c63524a42312942292142292142292139212142292142292142292139212142 +29214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229 +21422921392121422921422921422921392121422921422921422921392121422921422921422921392121422921422921422921392121422921422921422921 +3921214229214229214a29216b3929a55a42d66b529c5242a5847bd6d6cefffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffefefefbdb5ad7b +6b634229294229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229214229213921214229214229 +21422921392121422921422921422921392121422921422921422921392121422921422921422921392121422921422921422921392121422921422921422921 +392121422921422921422921392121422921422921422921392121422921422921422921392121422921523121945239ce634ac6634a6b4239d6ceceffffffff +fffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7fffffff7f7f7efefe7948c845a4a42422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921 +42292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142 +2921422929422921422921422921422929422921422921422921422929422921422921422921422929422921422921422921422929422921523129733931b563 +4ad66b52d69c94e7d6d6fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffffffffff7efefbdb5ad634a4a423129422921422921422929422921 +42292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142292142292942292142292142 +29214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229294229214229214229214229 +294229214229214229214229294229214229214229214a2929633931a55a42de7352ad6352e7d6cefffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7ffffffffffffd6cece84737363 +524a5a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42 +425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a42 +5a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a426b524aef8c73ffbdadffefe7fffffff7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffff7f7f7efefef9484846b5a525a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42 +425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a42 +5a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a4242634a425a42425a4a425a424263 +4a425a42425a4a4273524ac67b63f7947bffe7defffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffffffffff7efefe7dedee7dededededee7dedee7dedee7dedededede +e7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7 +dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7de +dedededee7dedee7dedee7dededededee7dedee7dedee7e7deffefe7fffff7fffffffffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +fffffffffffff7f7f7e7e7e7e7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7 +dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7de +dedededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededee7dedee7dedee7dededededeefe7e7f7e7e7ffefefffffff +fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7 +f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7 +f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7 +f7f7f7f7f7fff7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7 +f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7 +f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7 +f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeff7f7f7f7f7f7f7f7f7f7efeffff7f7f7f7f7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7 +f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7ffff +fff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7 +f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7ffff +fff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7 +fffffff7f7f7fffffff7f7f7fffffff7f7f7fffffff7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 +f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000040000002701ffff030000000000}\par}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293 +\hich\af39\dbch\af31505\loch\f39 Some}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293 \hich\af39\dbch\af31505\loch\f39 + devices (networking devices like switches, hubs, routers, etc.) can have their power turned on and off. This does not necessarily fix problems. But, if the power is off, that device cannot do it\hich\f39 \rquote \loch\f39 +s task. Luckily for you, the device does look like it is\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 off, when it is powered off. Look for the lights. If the lights are all dark, the device might be powered off. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid4603928\charrsid7365293 +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Static Routes: +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A static route has a network, a subnet mask, and a gateway. The gateway must be local to the computer that is sending out the +\hich\af39\dbch\af31505\loch\f39 +packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, firewalls, and computers how to send packets when the IP addresses and gateways are not obvious. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Comparing IP addresses: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 When a computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our -\hich\af39\dbch\af31505\loch\f39 face; masking tape covers a wall to keep it from being painted on. A subnet mask hides the subnet. For example, an IP address of 192.168.0.50 and netmask of 255.255.255.0 looks like: +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 When a \hich\af39\dbch\af31505\loch\f39 +computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our face; masking tape covers a wall to keep it from being painted on. A subnet mask hides the subnet. For example, an IP addre +\hich\af39\dbch\af31505\loch\f39 s\hich\af39\dbch\af31505\loch\f39 s of 192.168.0.50 and netmask of 255.255.255.0 looks like: \par }\pard \ltrpar\ql \li0\ri0\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39\afs24 \ltrch\fcs0 \f39\fs24\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 IP: \par \hich\af39\dbch\af31505\loch\f39 11000000.10101000.00000000.00110010 \par \hich\af39\dbch\af31505\loch\f39 Mask: -\par \hich\af39\dbch\af31505\loch\f39 11111111.11111111.111111\hich\af39\dbch\af31505\loch\f39 11.00000000 +\par \hich\af39\dbch\af31505\loch\f39 11111111.11111111.11111111.00000000 \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -The mask has 24 ones in a row. So it could also be represented as /24. When it is compared, the first thing that happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dro -\hich\af39\dbch\af31505\loch\f39 -pped. The resulting number is: 192.168.0.0. This is called the "Network Address." We do the same thing for both the source and destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are c -\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 nsidered to be on the same network. If they do not have the same network address, they are considered to be on different networks. +The mask has 24 ones in a row. So it could also be represented as /24. When it is compared, the first thing that \hich\af39\dbch\af31505\loch\f39 +happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dropped. The resulting number is: 192.168.0.0. This is called the "Network Address." We do the same thing for both the source +\hich\af39\dbch\af31505\loch\f39 a\hich\af39\dbch\af31505\loch\f39 +nd destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are considered to be on the same network. If they do not have the same network address, they are considered to be on different netw +\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 rks. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 VPNs: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, u -\hich\af39\dbch\af31505\loch\f39 -sually across the Internet. It is usually used in the context of either someone working from home and wanting to access printers or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc -\hich\af39\dbch\af31505\loch\f39 ). -\par \hich\af39\dbch\af31505\loch\f39 -A VPN has an IP address, which is defined like any other IP address. That IP-Address should be on a subnet that is unique to the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that -\hich\af39\dbch\af31505\loch\f39 has the other end of the VPN. -\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encryption key is supposed to be hard to guess, and it is must be the same at both ends of the VPN. The key is case-sensitive. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, usually across the Internet. It is usually used in the context of either someone working from home and wanting to access printe +\hich\af39\dbch\af31505\loch\f39 rs or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc). +\par \hich\af39\dbch\af31505\loch\f39 A VPN has an IP address, which is defined like any other IP address. That IP-Address should be on a subnet that is unique to\hich\af39\dbch\af31505\loch\f39 + the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that has the other end of the VPN. +\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encryption key is supposed to be hard to guess, and it \hich\af39\dbch\af31505\loch\f39 is must be the same at both ends of the VPN. The key is case-sensitive. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DEVICES: \par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Hubs: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1032{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1032{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 15}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -8865,7 +9268,7 @@ ee00beb6b4001fd94600766561004b352f00eceaea00b1a7a50074635e0048322c00e7e4e400aca2 \rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Switches: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1031{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1031{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 16}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -8909,15 +9312,14 @@ ee00beb6b4001fd94600766561004b352f00eceaea00b1a7a50074635e0048322c00e7e4e400aca2 11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111 11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111 111111111110111111111111111111111111111111111111111111111111111111111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111111111111110040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 -\ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A switch is like a hub, except that it has some brains to it. A packet coming into a switch is sent out only to the destination it was intended to go to. The f -\hich\af39\dbch\af31505\loch\f39 -irst time a packet comes to a particular destination, the switch needs to figure out where that destination is. So the first packet is sent everywhere. When the destination responds, the switch now knows where the destination is, so the packet is only s -\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 nt out that one port from then on. -\par \hich\af39\dbch\af31505\loch\f39 The switches in this simulation have some features of a "managed switch", in that they pretend they have spanning tree turned on. Spanning tree helps if you have a network loop (see the network loop puzzles for an exampl -\hich\af39\dbch\af31505\loch\f39 e of what happens.) Spanning-tree finds the quickest path through a series of switches from source to destination, ignoring the other paths.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 -\b\f39\lang9\langfe1033\langnp9\insrsid6700708 +\ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +A switch is like a hub, except that it has some brains to it. A packet coming into a switch is sent out only to the destination it was intended to go to. The first time a packet comes to a particular d\hich\af39\dbch\af31505\loch\f39 +estination, the switch needs to figure out where that destination is. So the first packet is sent everywhere. When the destination responds, the switch now knows where the destination is, so the packet is only sent out that one port from then on. +\par \hich\af39\dbch\af31505\loch\f39 The swi\hich\af39\dbch\af31505\loch\f39 +tches in this simulation have some features of a "managed switch", in that they pretend they have spanning tree turned on. Spanning tree helps if you have a network loop (see the network loop puzzles for an example of what happens.) Spanning-tree finds +\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 he quickest path through a series of switches from source to destination, ignoring the other paths.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par \hich\af39\dbch\af31505\loch\f39 Routers:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1030{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1030{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 17}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -9617,11 +10019,10 @@ f800e3dfde00beb6b4008d7f7b00543f3a003f272100faf9f900ddd8d700a79c9a00f4f3f200c6bf 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\hich\af39\dbch\af31505\loch\f39 A router is a network d\hich\af39\dbch\af31505\loch\f39 -evice that recieves a packet and sends it onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set based on the interfaces configured on the device. Anything -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 that is considered "local" has a basic route defined for it. +\hich\af39\dbch\af31505\loch\f39 A router is a network device that recieves a packet and sends it onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set ba +\hich\af39\dbch\af31505\loch\f39 sed on the interfaces configured on the device. Anything that is considered "local" has a basic route defined for it. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Firewall: -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict {\pict{\*\picprop\shplid1029{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 18}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -9733,14 +10134,14 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as routers, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming into the firewall that is destined for inside the firewall is blocked. In a re -\hich\af39\dbch\af31505\loch\f39 -al firewall, you would have the option to do port-forwarding, which would allow incoming traffic to go to a particular destination. We do not have any way to communicate between devices except "ping", which we usually do not port-forward for. So this si -\hich\af39\dbch\af31505\loch\f39 m\hich\af39\dbch\af31505\loch\f39 ulation does not do port-forwarding. -\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -The firewall can also do VPNs (see the help topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices behind another firewall. +\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as router\hich\af39\dbch\af31505\loch\f39 +s, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming into the firewall that is destined for inside the firewall is blocked. In a real firewall, you would have the option to do port-forwarding, which would allow +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 +incoming traffic to go to a particular destination. We do not have any way to communicate between devices except "ping", which we usually do not port-forward for. So this simulation does not do port-forwarding. +\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The firewall can also do VPNs (see the help +\hich\af39\dbch\af31505\loch\f39 topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices behind another firewall. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Router: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1028{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1028{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 19}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -9780,11 +10181,11 @@ f28b7e30bb0431d8375d59733e3f21de6bb5c57bd40c0bbab52cd857b2e0886621bf9c051561c1b0 }{\nonshppict{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag1579083670\blipupi95{\*\blipuid 5e1ee7967f7d0b879bc48aaf9c27415c} 0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000005aa120000000000000000000000000000000000000000000000000000 -000000000000022222220000000001ffffff006daa1203ffffff8000000001ff7fff4000000003ffffffe000000001ffffffc000000003ffffffc0ffffff01ff -ffffc007d31103ffffffe01ef32e01ffffffc000000001ffffffe0000000007fff7fc000000000ffffffe0005e40007fffffc0005e40002bfbaa800000000000 -d500005100000000ff000005aa120000fd00000000000000fa000000000000005700000000000000fe000051000000005e000081cd0d00006e000013e96f0000 -34000000000000003e000018020000003c000000000000003c0000ffffff00001400000000000000380000005e400000180000005e4000001800002005000000 +0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000 +0000001ef32e022222220000000001ffffff0000000003ffffff8000000001ff7fff40ff574003ffffffe0ff574001ffffffc03f000003ffffffc000000001ff +ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fff7fc000000000ffffffe0000000007fffffc0000000002bfbaa800000000000 +d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000 +34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000 10000000000000003800000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000 280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff @@ -9861,9 +10262,9 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}} -{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -The wireless router is the most complex device on the network. It functions as a firewall, as a switch (on the wired side) and as a hub (on the wireless side). It has VPN capability and can serve DHCP. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1027{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless router is the most\hich\af39\dbch\af31505\loch\f39 + complex device on the network. It functions as a firewall, as a switch (on the wired side) and as a hub (on the wireless side). It has VPN capability and can serve DHCP. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1027{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 20}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -9894,11 +10295,11 @@ a7b484ca5088dddc7d45584cb8c41acdb372a6a1ab6ddc05d8433599d30637ac5e17034310f42df8 {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag63258229\blipupi95{\*\blipuid 03c53e75d46f94b9f265aed8df7b2335} 0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000005aa120000000000000000000000000000000000001800000000000000 -100000000000000238e000000000000774c0006daa12000fffe00000000000065740000000000003bfc000000000000719c0000000000003bd8000ffffff0003 -35800007d3110003ff80001ef32e0001df80000000000003fb800000000000011100000000000001ff0000005e400001df0000005e400000ff00000000000000 -7700005100000000fa000005aa1200005e00000000000000fe000000000000007c000000000000007e000051000000005c000081cd0d00003c000013e96f0000 -3c0000000000000038000018020000001c00000000000000380000ffffff00001000000000000000380000005e4000001c0000005e4000003800002005000000 +0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000018000007d3110000 +1000001ef32e000238e000000000000774c000000000000fffe0000000000006574000ff57400003bfc000ff5740000719c0003f00000003bd80000000000003 +3580007b690d0003ff80000000000001df80000000000003fb800020260000011100000000000001ff00000000000001df00000000000000ff00000000000000 +7700000000000000fa000000000000005e00000000000000fe000000000000007c000000000000007e000000000000005c00002e690d00003c000067c80f0000 +3c0000000000000038000000000000001c000000000000003800000000000000100000000000000038000000000000001c000000000000003800000000000000 00000000000000000000000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000 280000000100080000000000000000000000000000000000000000000000000000000000ffffff00f3a28b002b2b2b0010101000ddb8ad006231230051515100 984c3600f6977d00432017002d1b1500341912002f161000f4f4f400d789770087423100803f2e007d4334006a3124005f2f220043322f00602e2300190b0800 @@ -9941,11 +10342,11 @@ bfc0c10101010101010101010101010101010101010101010101010101b2b3b401b5b6b701b80101 01010100000301010101010101010101010101010101010101010101010101010101010101010101010102030401010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}} -{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Access Point: +{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 W\hich\af39\dbch\af31505\loch\f39 ireless Access Point: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -The WAP (Wireless Access Point) is a simple device, which allows you to plug one Ethernet port into a wire, and attach multiple wireless devices to it. R\hich\af39\dbch\af31505\loch\f39 -ead up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1026{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +The WAP (Wireless Access Point) is a simple device, which allows you to plug one Ethernet port into a wire, and attach multiple wireless devices to it. Read up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39 +\ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1026{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 21}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -9979,11 +10380,11 @@ de4135480dd9de47197821ffab13f0b0cd927be1819bce11e3a15b50ccc6717e01070fdf944e0de0 {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag-1837271951\blipupi95{\*\blipuid 927d7471fcd0e3d1418850009d192cea} 0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000005aa120000000000000000000000000000000000000000000000000000 -000000000000022222220000000001fffffe006daa1203ffffff8000000001ffffff0000000003ffffff8000000001ffffffc000000003ffffffc0ffffff01ff -ffffc007d31103ffffffe01ef32e01ffffffc000000001ffffffe0000000007fffffc000000000ffffffe0005e40007fffffc0005e40002bffaa800000000000 -d500005100000000ff000005aa120000fd00000000000000fa000000000000005700000000000000fe000051000000005e000081cd0d00006e000013e96f0000 -34000000000000003e000018020000003c000000000000003c0000ffffff00001400000000000000380000005e400000180000005e4000001800002005000000 +0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000 +0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff +ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000002bffaa800000000000 +d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000 +34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000 10000000000000003800000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000 280000000100080000000000000000000000000000000000000000000000000000000000ffffff00feeeee00371b1300c5968d00c67762004b312d00b1563f00 542b1f00fccabe005d2c2100af563e000d06040041252100c3705a006a5f5e009b847e003d37360080514500321d180089716900915e4e008d4836002b141000 @@ -10027,10 +10428,10 @@ d06ad0cc6acdd06acdcbcfcdd1d2c96ad3d40101010101010101010101014ab6b76ab8b9babbbcbd 01010101010101010101010101010101010101040101010101010101010101010101010101010101010101010101010101010101010101010101020300010101 0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}} {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Bridge: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wire\hich\af39\dbch\af31505\loch\f39 -less client connection, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of a wireless link, and allows you to attach multiple wired devices. The Wireless B -\hich\af39\dbch\af31505\loch\f39 r\hich\af39\dbch\af31505\loch\f39 idge is also called Wireless Client Mode (when referring to wireless devices.) -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6178591\charrsid6178591 {\*\shppict{\pict{\*\picprop\shplid1025{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wireless client connec\hich\af39\dbch\af31505\loch\f39 +tion, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of a wireless link, and allows you to attach multiple wired devices. The Wireless Bridge is also call +\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 d Wireless Client Mode (when referring to wireless devices.) +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1025{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 22}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -10068,11 +10469,11 @@ fb970bbcdfc1741b719a247b0991bf143f59624df88b34e1b7ae56fe8e02d96fc5286432993f1a72 {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag991145542\blipupi95{\*\blipuid 3b13ae462c7cca9c1834cac9a3ab36d8} 0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000005aa120000000000000000000000000000000000000000000000000000 -000000000000022222220000000001fffffe006daa1203ffffff8000000001ffffff0000000003ffffff8000000001ffffffc000000003ffffffc0ffffff01ff -ffffc007d31103ffffffe01ef32e01ffffffc000000001ffffffe0000000007fffffc000000000ffffffe0005e40007fffffc0005e40007eebfe800000000024 -413600510000003f81be0005aa12003d815c00000000003f80fe000000000015003400000000003f80fc00510000001f00dc0081cd0d001f80fc0013e96f0017 -005000000000000f007800180200000d005800000000000e007800ffffff0006007000000000000e003800005e400004003000005e40000e0030002005000006 +0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000 +0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff +ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000007eebfe800000000024 +413600000000003f81be00000000003d815c00000000003f80fe000000000015003400000000003f80fc00000000001f00dc002e690d001f80fc0067c80f0017 +005000000000000f007800000000000d005800000000000e0078000000000006007000000000000e0038000000000004003000000000000e0030000000000006 00300000000000020020000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000 280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff @@ -10150,74 +10551,71 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}} {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Repeater: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless has a limited distance it can travel, but sometimes you would prefe\hich\af39\dbch\af31505\loch\f39 -r to stretch the wireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allows you to attach other wireless clients to it. When you are rolling out wireless +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless has a limited distance it can travel, but sometimes you would prefer to stretch the w\hich\af39\dbch\af31505\loch\f39 +ireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allows you to attach other wireless clients to it. When you are rolling out wireless in a building, it \hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 -in a building, it is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data it can transport. Adding a repeater does extend the distance and increases the n -\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 -mber of devices that works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much more bandwidth used. +is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data it can transport. Adding a repeater does extend the distance and increases the number of devices t +\hich\af39\dbch\af31505\loch\f39 h\hich\af39\dbch\af31505\loch\f39 at works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much more bandwidth used. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packet Corruption: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There are a number of things that can cause\hich\af39\dbch\af31505\loch\f39 - packets not to successfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets drop but some get through. With Internet packets, this is often due to using too mu -\hich\af39\dbch\af31505\loch\f39 c\hich\af39\dbch\af31505\loch\f39 -h bandwidth. But if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does not have error counts.) -\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though so\hich\af39\dbch\af31505\loch\f39 metimes they will only corrupt packets when you have enough traffic. -\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the cables will bleed over into the network wires, which can cause a lot of packets to \hich\af39\dbch\af31505\loch\f39 -drop on that link. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There are a number of things that can cause packets not to su\hich\af39\dbch\af31505\loch\f39 +ccessfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets drop but some get through. With Internet packets, this is often due to using too much bandwidth. But +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does not have error counts.) +\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though sometimes they will \hich\af39\dbch\af31505\loch\f39 only corrupt packets when you have enough traffic. +\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the cables will bleed over into the network wires, which can cause a lot of packets to drop on that link. \par \hich\af39\dbch\af31505\loch\f39 Network wires running too close to fluorescent lights can also get corrupted. Again, it is the pulsing of the electricity that can cause bleed-over into network cables. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 General Wireless: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A wireless connection uses an antenna in both the\hich\af39\dbch\af31505\loch\f39 - client and server to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match. -\par \hich\af39\dbch\af31505\loch\f39 Wireless works the way a hub works instead of working like a switch. A switch figures ou\hich\af39\dbch\af31505\loch\f39 -t which wire a particular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the different computers. Instead, it broadcasts out the signal on the radio channel, and -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 all the individual computers listen to the packet to determine if it is for them. -\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices connected to the network. For example, if you have a 54 MBps wireless G device with\hich\af39\dbch\af31505\loch\f39 - 10 devices connected to it, each device gets roughly 5.4 MBps. -\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of 10 devices on the one wireless, you now have 20. That divides up the signal fart -\hich\af39\dbch\af31505\loch\f39 her, breaking up the 54 MBps to 2.7 MBps per person. -\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure the device. There is some overhead in encrypting and decrypting the packet, parti +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A wireless connection uses an antenna in both the client and server\hich\af39\dbch\af31505\loch\f39 + to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match. +\par \hich\af39\dbch\af31505\loch\f39 Wireless works the way a hub works instead of working like a switch. A switch figures out which wire a par\hich\af39\dbch\af31505\loch\f39 +ticular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the different computers. Instead, it broadcasts out the signal on the radio channel, and all the individua +\hich\af39\dbch\af31505\loch\f39 l\hich\af39\dbch\af31505\loch\f39 computers listen to the packet to determine if it is for them. +\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices connected to the network. For example, if you have a 54 MBps wireless G device with 10 devices connec +\hich\af39\dbch\af31505\loch\f39 ted to it, each device gets roughly 5.4 MBps. +\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of 10 devices on the one wireless, you now have 20. That divides up the signal farther, breaking up t +\hich\af39\dbch\af31505\loch\f39 he 54 MBps to 2.7 MBps per person. +\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure the device. There is some overhead in encrypting and decrypting the packet, particularly since the \hich\af39\dbch\af31505\loch\f39 -cularly since the access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soho) equipment for their wireless networks until they realize the amount of pain tho -\hich\af39\dbch\af31505\loch\f39 s\hich\af39\dbch\af31505\loch\f39 -e can impose on a larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bulk. Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 better quality. +access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soho) equipment for their wireless networks until they realize the amount of pain those can impose on a +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 +larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bulk. Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and better quality. + \par \hich\af39\dbch\af31505\loch\f39 -Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireless device can only function on one channel at a time. What this usually means is t -\hich\af39\dbch\af31505\loch\f39 -hat, if one wireless G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas allow you to be running one network on N while the other runs on G. +Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireless device can only function on one channel at a time. What this usually means is that, if one wirel +\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 +ss G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas allow you to be running one network on N while the other runs on G. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless SSID: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -The wireless SSID (Service Set Identifier) is basically the name of the wireless connection. Advanced devices can have multiple SSIDs on one access-point (this simulator does not allow for that). The SSID is usually public information which is broadcast -\hich\af39\dbch\af31505\loch\f39 out from the device. You need to specify the key when you connect to make sure you have permission to access the network. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless SSID\hich\af39\dbch\af31505\loch\f39 + (Service Set Identifier) is basically the name of the wireless connection. Advanced devices can have multiple SSIDs on one access-point (this simulator does not allow for that). The SSID is usually public information which is broadcast out from the dev +\hich\af39\dbch\af31505\loch\f39 i\hich\af39\dbch\af31505\loch\f39 ce. You need to specify the key when you connect to make sure you have permission to access the network. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Key: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless Key is a password for accessing the particular SSID that the key is associated with. The key is used in \hich\af39\dbch\af31505\loch\f39 encrypting packets between the device and the wireless Access-point. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 ADVANCED TOPICS:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Subnetting: }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 (Based heavily off of LordFlasheart's post, "Subnetting Made Easy" here: }{\field{\*\fldinst {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-s\hich\af39\dbch\af31505\loch\f39 ubnetting-made-easy.html }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield +HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html\hich\af39\dbch\af31505\loch\f39 }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield 00d0c9ea79f9bace118c8200aa004ba90b0200000003000000e0c9ea79f9bace118c8200aa004ba90bae00000068007400740070003a002f002f007700770077002e0074006500630068006500780061006d0073002e006e00650074002f0066006f00720075006d0073002f00630063006e0061002d006300630065006e00 -74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0 +74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a0200}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of 32 bits, split into 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host. -\par \hich\af39\dbch\af31505\loch\f39 Below shows you how, for each class, the address is split in terms of network (N\hich\af39\dbch\af31505\loch\f39 ) and host (H) portions. -\par }{\rtlch\fcs1 \af40 \ltrch\fcs0 \f40\lang9\langfe1033\langnp9\insrsid6700708 \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH /8 -\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16 -\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an importa\hich\af39\dbch\af31505\loch\f39 -nt concept to remember. The first move in doing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32. -\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) \hich\af39\dbch\af31505\loch\f39 or in dotted decimal (255.255.255.0). The first thing to do is to determine the block size: how big the subnet is. +\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of\hich\af39\dbch\af31505\loch\f39 32 bits, split into 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host. +\par \hich\af39\dbch\af31505\loch\f39 Below shows you how, for each class, the address is split in terms of network (N) and host (H) portions. +\par }{\rtlch\fcs1 \af50 \ltrch\fcs0 \f50\lang9\langfe1033\langnp9\insrsid6700708 \hich\af50\dbch\af31505\loch\f50 NN\hich\af50\dbch\af31505\loch\f50 NNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH /8 +\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16 +\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24 +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember. Th +\hich\af39\dbch\af31505\loch\f39 e first move in doing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32. +\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) or in dotted decimal (255.2\hich\af39\dbch\af31505\loch\f39 55.255.0). The first thing to do is to determine the block size: how big the subnet is. -\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next \hich\af39\dbch\af31505\loch\f39 -boundary up is /24. We then subtract our subnet from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the fir -\hich\af39\dbch\af31505\loch\f39 s\hich\af39\dbch\af31505\loch\f39 t number is lost to the "network address" and the last number is the "broadcast address". -\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 25\hich\af39\dbch\af31505\loch\f39 -6. For example, if you are doing 255.255.255.240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense -. -\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 192.168.12.37/29 belong to? +\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next boundary up is /24. We the\hich\af39\dbch\af31505\loch\f39 +n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the first number is lost to the "n +\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 twork address" and the last number is the "broadcast address". +\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 256. For example, if you are +\hich\af39\dbch\af31505\loch\f39 + doing 255.255.255.240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet doe\hich\af39\dbch\af31505\loch\f39 s 192.168.12.37/29 belong to? \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 You may wonder where to begin. We always start with determining which boundary we are working with for this address. -\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which g\hich\af39\dbch\af31505\loch\f39 ives us our block size i.e. 2 to the power of 3 equals 8. +\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e.\hich\af39\dbch\af31505\loch\f39 2 to the power of 3 equals 8. \par \hich\af39\dbch\af31505\loch\f39 We have borrowed from the last octet as the 29th bit is in the last octet. We start from zero and count up in our block size. Therefore it follows that the subnets are:- \par \par \hich\af39\dbch\af31505\loch\f39 192.168.12.0 @@ -10238,21 +10636,21 @@ boundary up is /24. We then subtract our subnet from the boundary. 24 - 20 = 3 \par \hich\af39\dbch\af31505\loch\f39 172.16.96.0 \par \hich\af39\dbch\af31505\loch\f39 172.16.128.0 \par \hich\af39\dbch\af31505\loch\f39 172.16.160.0 -\par \hich\af39\dbch\af31505\loch\f39 .............etc. +\par ...........\hich\af39\dbch\af31505\loch\f39 ..etc. \par \hich\af39\dbch\af31505\loch\f39 Our address is 172.16.116.4 so it must sit on the 172.16.96.0 subnet. Easy eh? \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 10.34.67.234/12 sit on? \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is 12. Our next boundary is 16. Therefore 16 - 12 = 4. 2^4 = 16 which gives us our block size. -\par \hich\af39\dbch\af31505\loch\f39 We h\hich\af39\dbch\af31505\loch\f39 ave borrowed from the second octet as bit 12 sits in the second octet so we count up the block size in that octet. The subnets are:- +\par \hich\af39\dbch\af31505\loch\f39 We have borrowe\hich\af39\dbch\af31505\loch\f39 d from the second octet as bit 12 sits in the second octet so we count up the block size in that octet. The subnets are:- \par \hich\af39\dbch\af31505\loch\f39 10.0.0.0 \par \hich\af39\dbch\af31505\loch\f39 10.16.0.0 \par \hich\af39\dbch\af31505\loch\f39 10.32.0.0 \par \hich\af39\dbch\af31505\loch\f39 10.48.0.0 \par \hich\af39\dbch\af31505\loch\f39 .............etc. \par \hich\af39\dbch\af31505\loch\f39 Our address is 10.34.67.234 which must sit on the 10.32.0.0 subnet. -\par \hich\af39\dbch\af31505\loch\f39 Hopefully the penny is starting make sense. We will now change the type of question so that we have to give a particular host range of a subnet. +\par \hich\af39\dbch\af31505\loch\f39 Hopefully\hich\af39\dbch\af31505\loch\f39 the penny is starting make sense. We will now change the type of question so that we have to give a particular host range of a subnet. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What is the valid host range of the 4th subnet of 192.168.10.0/28? -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 1\hich\af39\dbch\af31505\loch\f39 -6 since 32 - 28 = 4 and 2^4 = 16. We need to count up in the block size in the last octet as bit 28 is in the last octet. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 16 since 32 \hich\af39\dbch\af31505\loch\f39 +- 28 = 4 and 2^4 = 16. We need to count up in the block size in the last octet as bit 28 is in the last octet. \par \hich\af39\dbch\af31505\loch\f39 192.168.10.0 \par \hich\af39\dbch\af31505\loch\f39 192.168.10.16 \par \hich\af39\dbch\af31505\loch\f39 192.168.10.32 @@ -10261,75 +10659,75 @@ boundary up is /24. We then subtract our subnet from the boundary. 24 - 20 = 3 \par \hich\af39\dbch\af31505\loch\f39 .................etc. \par \hich\af39\dbch\af31505\loch\f39 Therefore the 4th subnet is 192.168.10.48 a\hich\af39\dbch\af31505\loch\f39 nd the host range must be 192.168.10.49 to 192.168.10.62, remembering that the subnet and broadcast address cannot be used. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What is the valid host range of the 1st subnet of 172.16.0.0/17? -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 /17 tells us that the block size is 2^(24-17) = 2^7 = 128. We are borrowing in the 3rd octet as bit 17 is in the 3rd octet. Our subnets are:- - +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 /17 tells us that the block size is 2^(24-17) = 2^7 = 128\hich\af39\dbch\af31505\loch\f39 +. We are borrowing in the 3rd octet as bit 17 is in the 3rd octet. Our subnets are:- \par \hich\af39\dbch\af31505\loch\f39 172.16.0.0 \par \hich\af39\dbch\af31505\loch\f39 172.16.128.0 -\par \hich\af39\dbch\af31505\loch\f39 The first subnet is 172.16.0.0 and the valid host range is 172.16.0.1 to 172.16.127.254. Y\hich\af39\dbch\af31505\loch\f39 -ou must remember not to include the subnet address (172.16.0.0) and the broadcast address (172.16.127.255). +\par \hich\af39\dbch\af31505\loch\f39 The first subnet is 172.16.0.0 and the valid host range is 172.16.0.1 to 172.16.127.254. You must remember not to include the subnet address (172.1\hich\af39\dbch\af31505\loch\f39 +6.0.0) and the broadcast address (172.16.127.255). \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What is the valid host range of the 7th subnet of address 10.0.0.0/14? -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The block size is 4, from 16 - 14 = 2 then 22 = 4. We are borrowing\hich\af39\dbch\af31505\loch\f39 - in the second octet so count in the block size from 0 seven times to get the seventh subnet. -\par \hich\af39\dbch\af31505\loch\f39 The seventh subnet is 10.24.0.0. Our valid host range must be 10.24.0.1 to 10.27.255.254 again remembering not to include our subnet (10.24.0.0) and the broadcast\hich\af39\dbch\af31505\loch\f39 address (10.27.255.255). - -\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 What if they give me the subnet mask in dotted decimal? +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The block size is 4, from 16 - 14 = 2 then 22 = 4. We are borrowing in the second octet so count in the block size from 0 se +\hich\af39\dbch\af31505\loch\f39 ven times to get the seventh subnet. +\par \hich\af39\dbch\af31505\loch\f39 The seventh subnet is 10.24.0.0. Our valid host range must be 10.24.0.1 to 10.27.255.254 again remembering not to include our subnet (10.24.0.0) and the broadcast address (10.27.255.255). +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 What if they give me the subnet\hich\af39\dbch\af31505\loch\f39 mask in dotted decimal? \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 If you're lucky and they give you a mask in dotted decimal format then you should have an even easier time. All you need again is your block size. -\par \hich\af39\dbch\af31505\loch\f39 Let's say they have given a\hich\af39\dbch\af31505\loch\f39 mask of 255.255.255.248 and you wish to know the block size. Here's the technique: +\par \hich\af39\dbch\af31505\loch\f39 Let's say they have given a mask of 255.255.255.248 and you wish to know the block s\hich\af39\dbch\af31505\loch\f39 ize. Here's the technique: \par \hich\af39\dbch\af31505\loch\f39 1. Starting from the left of the mask find which is the first octet to NOT have 255 in it. -\par \hich\af39\dbch\af31505\loch\f39 2. Subtract the number in that octet from 256 to get your block size e.g. above i\hich\af39\dbch\af31505\loch\f39 t is 256 - 248 = block size of 8. -\par \hich\af39\dbch\af31505\loch\f39 3. Count up from zero in your block size in the octet identified in step 1 as you have learned above (the example above would be in the last octet). -\par \hich\af39\dbch\af31505\loch\f39 Another example is a mask of 255.255.192.0 - you would simply count up in\hich\af39\dbch\af31505\loch\f39 256 - 192 = 64 in the third octet. -\par \hich\af39\dbch\af31505\loch\f39 One more example is 255.224.0.0 - block size is 256 - 224 = 32 in the second octet. +\par \hich\af39\dbch\af31505\loch\f39 2. Subtract the number in that octet from 256 to get your block size e.g. above it is 256 - 248 = block size of 8. +\par \hich\af39\dbch\af31505\loch\f39 3. Count up from zero i\hich\af39\dbch\af31505\loch\f39 n your block size in the octet identified in step 1 as you have learned above (the example above would be in the last octet). +\par \hich\af39\dbch\af31505\loch\f39 Another example is a mask of 255.255.192.0 - you would simply count up in 256 - 192 = 64 in the third octet. +\par \hich\af39\dbch\af31505\loch\f39 One more example is 2\hich\af39\dbch\af31505\loch\f39 55.224.0.0 - block size is 256 - 224 = 32 in the second octet. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 WHEN TO SUBNET: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The word, "subnet", means one network that is part of another. The process of subnetting, therefore, is the process of -\hich\af39\dbch\af31505\loch\f39 breaking a network into smaller pieces.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -Subnetting used to be very critical to the smooth operations of a network. Old versions of Windows did lots of broadcasting, and networks were very loud. That, combined with slower networks, meant a lot of congesti\hich\af39\dbch\af31505\loch\f39 -on. To remedy that, they used to subnet networks into small pools of like items (PCs, printers, servers, etc.) This would have the net effect of shrinking the distance a broadcast packet would travel, as well as give granular control of security. -\par \hich\af39\dbch\af31505\loch\f39 But a n\hich\af39\dbch\af31505\loch\f39 umber of technological advances happened, which removed many of the reasons to subnet. +The word, "subnet", means one network that is part of another. The process of subnetting, therefore, is the process of breaking a network into smaller pieces.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Subnetting used t\hich\af39\dbch\af31505\loch\f39 +o be very critical to the smooth operations of a network. Old versions of Windows did lots of broadcasting, and networks were very loud. That, combined with slower networks, meant a lot of congestion. To remedy that, they used to subnet networks into s +\hich\af39\dbch\af31505\loch\f39 m\hich\af39\dbch\af31505\loch\f39 +all pools of like items (PCs, printers, servers, etc.) This would have the net effect of shrinking the distance a broadcast packet would travel, as well as give granular control of security. +\par \hich\af39\dbch\af31505\loch\f39 But a number of technological advances happened, which removed m\hich\af39\dbch\af31505\loch\f39 any of the reasons to subnet. \par \hich\af39\dbch\af31505\loch\f39 * Switches were invented so only broadcast traffic went to every machine. \par \hich\af39\dbch\af31505\loch\f39 * Protocols got a lot smarter, relying less and less on broadcast traffic to make things work. -\par \hich\af39\dbch\af31505\loch\f39 * Programs got a lot smarter, using other methods than broadcasts. +\par \hich\af39\dbch\af31505\loch\f39 * Programs got a lot smarter, using other methods than br\hich\af39\dbch\af31505\loch\f39 oadcasts. \par \hich\af39\dbch\af31505\loch\f39 * Router speed increased, so routers could handle more traffic and larger routing tables. -\par \hich\af39\dbch\af31505\loch\f39 * Network speeds increased exponentially, which increased the carrying capacity of a single network\hich\af39\dbch\af31505\loch\f39 exponentially. +\par \hich\af39\dbch\af31505\loch\f39 * Network speeds increased exponentially, which increased the carrying capacity of a single network exponentially. \par \hich\af39\dbch\af31505\loch\f39 * And many other advances. -\par \hich\af39\dbch\af31505\loch\f39 So, in short, subnetting is no longer critical for making a small network function. But subnetting of large networks is very important. Security is probably the biggest reason to subnet. Subnetting very large n -\hich\af39\dbch\af31505\loch\f39 etworks can still be very helpful in keeping down traffic. And Subnetting networks that are connected via VPNs is still a very important part of planning large scale networks. +\par \hich\af39\dbch\af31505\loch\f39 So, in short, \hich\af39\dbch\af31505\loch\f39 +subnetting is no longer critical for making a small network function. But subnetting of large networks is very important. Security is probably the biggest reason to subnet. Subnetting very large networks can still be very helpful in keeping down traffi +\hich\af39\dbch\af31505\loch\f39 c\hich\af39\dbch\af31505\loch\f39 . And Subnetting networks that are connected via VPNs is still a very important part of planning large scale networks. \par \hich\af39\dbch\af31505\loch\f39 There are a few main rules for how to subnet: -\par \hich\af39\dbch\af31505\loch\f39 * All IP subnets should use natur\hich\af39\dbch\af31505\loch\f39 al boundaries. -\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\loch\f39 subnets makes them easier to control. +\par \hich\af39\dbch\af31505\loch\f39 * All IP subnets should use natural boundaries. +\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\hich\af39\dbch\af31505\loch\f39 subnets makes them easier to control. \par \hich\af39\dbch\af31505\loch\f39 * Smaller adjacent subnets should fit into larger subnets, most of the time. \par \hich\af39\dbch\af31505\loch\f39 * Smaller routing tables require less management and resources. -\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 All IP subnets \hich\af39\dbch\af31505\loch\f39 should use natural boundaries. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 All IP subnets should use natural boundaries. \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -Even if you do not need all the space, you should break up networks into ranges of the power of 2. It is very common to say something like, the first 50 IPs are for networking equipment, the next 20 are for printers, etc. B -\hich\af39\dbch\af31505\loch\f39 -ut it is much better to use 64 IPs for networking equipment, and 16 IPs for printers... The numbers are not quite as simple on the brain, but they are a lot easier to control in your firewall. You can block access from the Internet to your networking eq -\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 -ipment my making one simple rule if you make your ranges appropriately. You should also plan on growth. It is very common for people to run out of their IP space, simply because they failed to plan. -\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 \hich\f39 Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\loch\f39 subnets makes them\hich\af39\dbch\af31505\loch\f39 - easier to control. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -As mentioned above, it is common to want to block Internet access directly to and from your networking equipment and printers. You may want to allow certain traffic to individual departments (many organizations allow the media departme -\hich\af39\dbch\af31505\loch\f39 -nts to access Facebook and social media sites during work-hours, while other departments are not allowed to access those same sites.) If your equipment and PCs are subnetted along natural boundaries (8, 16, 32, 64, etc.), you can usually make a single ru -\hich\af39\dbch\af31505\loch\f39 l\hich\af39\dbch\af31505\loch\f39 e to allow or block traffic to those particular items. +Even if you do not need all the space, you should break up networks into ranges of the power of 2. It is very common to say something like, the first 50 IPs are for networking equipment, the next 20 are for printers, etc. But it is much better to use 64 +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 +IPs for networking equipment, and 16 IPs for printers... The numbers are not quite as simple on the brain, but they are a lot easier to control in your firewall. You can block access from the Internet to your networking equipment my making one simple ru +\hich\af39\dbch\af31505\loch\f39 l\hich\af39\dbch\af31505\loch\f39 e if you make your ranges appropriately. You should also plan on growth. It is very common for people to run out of their IP space, simply because they failed to plan. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 \hich\f39 Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\loch\f39 subnets makes them easier to control. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 As mentione\hich\af39\dbch\af31505\loch\f39 +d above, it is common to want to block Internet access directly to and from your networking equipment and printers. You may want to allow certain traffic to individual departments (many organizations allow the media departments to access Facebook and soc +\hich\af39\dbch\af31505\loch\f39 i\hich\af39\dbch\af31505\loch\f39 +al media sites during work-hours, while other departments are not allowed to access those same sites.) If your equipment and PCs are subnetted along natural boundaries (8, 16, 32, 64, etc.), you can usually make a single rule to allow or block traffic to +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 those particular items. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Smaller adjacent subnets should fit into larger subnets, most of the time. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 If you plan it right, you should be able to supernet your subnets, and have one route or rule for them. For example, you may -\hich\af39\dbch\af31505\loch\f39 have your networking equipment in 1-63, and your printers from 65-127. That means you can have one route or rule that matches all 128 IPs. This makes life a lot simpler for creating many sorts of rules.}{\rtlch\fcs1 -\ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 -\par \hich\af39\dbch\af31505\loch\f39 Smaller routing tables require less management and \hich\af39\dbch\af31505\loch\f39 resources. \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -Again, with the onset of more powerful routers, firewalls, and faster networking speeds, this is no longer quite as critical as it once was. But if you have a finely tuned firewall, you can end up with many rules. Often it is very nice to bloc -\hich\af39\dbch\af31505\loch\f39 k all access to a whole range instead of blocking access to each machine one IP at a time. Often, the "less management" simply means less work for the techies who are keeping things running smoothly. +If you plan it right, you should be able to supernet your subnets, and have one route or rule for them. For example, you may have your networking equipment \hich\af39\dbch\af31505\loch\f39 +in 1-63, and your printers from 65-127. That means you can have one route or rule that matches all 128 IPs. This makes life a lot simpler for creating many sorts of rules.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 + +\par \hich\af39\dbch\af31505\loch\f39 Smaller routing tables require less management and resources. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Again, with the onse\hich\af39\dbch\af31505\loch\f39 +t of more powerful routers, firewalls, and faster networking speeds, this is no longer quite as critical as it once was. But if you have a finely tuned firewall, you can end up with many rules. Often it is very nice to block all access to a whole range +\hich\af39\dbch\af31505\loch\f39 i\hich\af39\dbch\af31505\loch\f39 nstead of blocking access to each machine one IP at a time. Often, the "less management" simply means less work for the techies who are keeping things running smoothly. \par \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 VLANs:\line }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 \hich\af39\dbch\af31505\loch\f39 -Most managed switches can be configured for VLA\hich\af39\dbch\af31505\loch\f39 Ns. }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -Virtual Local Area Networks (Virtual LANs) allow you to segment y}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 \hich\af39\dbch\af31505\loch\f39 -our network for security sake. Any computer, or device, that is on one VLAN can communicate with anything else on that VLAN. If it is not on the same VLAN, you need a router to route th\hich\af39\dbch\af31505\loch\f39 e packets between VLANs.}{ -\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6178591 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028 +Most managed switches can be configured for VLANs. }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Virtual Local Area Networks\hich\af39\dbch\af31505\loch\f39 + (Virtual LANs) allow you to segment y}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 \hich\af39\dbch\af31505\loch\f39 +our network for security sake. Any computer, or device, that is on one VLAN can communicate with anything else on that VLAN. If it is not on the same VLAN, you need a router to route the packets between VLANs.}{\rtlch\fcs1 \af39 \ltrch\fcs0 +\f39\lang9\langfe1033\langnp9\insrsid6700708 +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028 {\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0 \picw7807\pich4101\picwgoal4426\pichgoal2325\pngblip\bliptag228299346{\*\blipuid 0d9b9252bce41f38f6369a69367bfc61}89504e470d0a1a0a0000000d49484452000001270000009b080600000157226d6d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 @@ -12671,16 +13069,15 @@ f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000040000002701ffff030000000000}\par}} }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 \hich\af39\dbch\af31505\loch\f39 For example}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid2891341 \hich\af39\dbch\af31505\loch\f39 , in this image, there are multi-colored computers. Each color represents}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 .}{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341\charrsid2891341 -\hich\af31506\dbch\af31505\loch\f31506 }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341 \hich\af31506\dbch\af31505\loch\f31506 A VLAN. The purple computers can talk to each-other, the yellow computers can talk to each-other, an -\hich\af31506\dbch\af31505\loch\f31506 d the green computers can talk to each-other. But, for the green computers to talk to the yellow computers, the packet must go through the firewall.}{\rtlch\fcs1 \af0 \ltrch\fcs0 -\lang1024\langfe1024\noproof\insrsid6970211 -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341 \hich\af31506\dbch\af31505\loch\f31506 -The firewall lets us set up rules to allow, or disallow packets to go between VLANs. In this way, you can have a staff network, which is protected from the guest network. Your server is something that you do not want strangers to have access to. But, y -\hich\af31506\dbch\af31505\loch\f31506 o\hich\af31506\dbch\af31505\loch\f31506 u could have a printer on the guest network, which the staff could use. -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6178591 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027 -{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv -{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw5847\pich2011\picwgoal3315\pichgoal1140\pngblip\bliptag1600046003{\*\blipuid 5f5ec3b36b805056fe5c7e987ea64bf1} -89504e470d0a1a0a0000000d49484452000000dd0000004c0802000001119b153d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 +\hich\af31506\dbch\af31505\loch\f31506 }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341 \hich\af31506\dbch\af31505\loch\f31506 +A VLAN. The purple computers can talk to each-other, the yellow computers can talk to each-other, and the green computers can talk \hich\af31506\dbch\af31505\loch\f31506 +to each-other. But, for the green computers to talk to the yellow computers, the packet must go through the firewall.}{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6970211 +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341 \hich\af31506\dbch\af31505\loch\f31506 The firewall lets us set up rules to allow, or disallow packets to go between VLANs. In this way, you can have a staff network, which is +\hich\af31506\dbch\af31505\loch\f31506 protected from the guest network. Your server is something that you do not want strangers to have access to. But, you could have a printer on the guest network, which the staff could use. +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027 +{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0 +\picw5847\pich2011\picwgoal3315\pichgoal1140\pngblip\bliptag1600046003{\*\blipuid 5f5ec3b36b805056fe5c7e987ea64bf1}89504e470d0a1a0a0000000d49484452000000dd0000004c0802000001119b153d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 00097048597300000ec300000ec301c76fa864000019d749444154785eed9d795453599ec7ebffb6e7f44c9f33674ef73f3dd33353d333d567aa4e776ddd5659 43d96a29a596a5822bd6c22a6089b243822082a284454041c212b60844202c41c21208093b84400809d94416919d204b20cc4dde35400821cb7b40baf89c773c f73de2cd7ddff7bdf7feee7bf7bebc63676777166dde3976ecd8ca5be2c86d30b59e91c5c10e2167641eee2228140aa552c99b597f7465657070705da67f7aac @@ -12785,8 +13182,8 @@ bf0409b1580c06215e5e5ec9c9c9c811c0b6f6e3e32d5996e84bd0608e773efffadbaf0f1d3e11e0 7c7f33a989f1ecf8912f8fd83ae516255aff970d5d34a2ce63c7d0f4e3a24e5684f3e94f0e7c71f2c4b75f1cf30e52add3153757269cfae0c0814f0e1372ebeb 0bbdac3f3e70f04bdb670504e71b44a14c16890bde365fea642fbed407f4a565b2175fea63cf973b05e24bf58f44ec463a3a3a905f8cd20983c1d0edcbc5c545 3883d23ce874badc620102c19405323434042e2d8d46437e9a75b741a552cbcbcbe1ce064a4a4ad6cdbfcccdfd7f907d3a59027846910000000049454e44ae426082}}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} -{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 25}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fLayoutInCell}{\sv 1}}{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}} -{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard\ql \li0\ri0\widctlpar\pvpara\posx6264\posy620\dxfrtext180\dfrmtxtx180\dfrmtxty0\wraparound\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 +{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 25}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fLayoutInCell}{\sv 1}}{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}} +{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard\ql \li0\ri0\widctlpar\pvpara\posx6264\posy620\dxfrtext180\dfrmtxtx180\dfrmtxty0\wraparound\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw5847\pich2011\picwgoal3315\pichgoal1140\wmetafile8\bliptag1600046003\blipupi95{\*\blipuid 5f5ec3b36b805056fe5c7e987ea64bf1} 010009000003da6200000000b162000000000400000003010800050000000b0200000000050000000c0260001501030000001e00040000000701040004000000 07010400b1620000410b2000cc004c00dd00000000005f0014010000000028000000dd0000004c000000010018000000000020c5000000000000000000000000 @@ -13578,47 +13975,48 @@ c6b5b5b5adadadadadadadadad006363635a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a 5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a 5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a 5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a00040000002701ffff030000000000}\par}}}{\rtlch\fcs1 -\af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid8022092 \hich\af31506\dbch\af31505\loch\f31506 \hich\f31506 To make this work, you need to define your VLANs. The VLAN is only really tracked by the \'93\loch\f31506 \hich\f31506 VLAN ID\'94 -\loch\f31506 , a number. But, since it is often hard for us to remember the numbers, we can defin\hich\af31506\dbch\af31505\loch\f31506 e a name for each VLAN Id we want to use.}{\rtlch\fcs1 \af0 \ltrch\fcs0 +\af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid8022092 \hich\af31506\dbch\af31505\loch\f31506 To make this work, you\hich\af31506\dbch\af31505\loch\f31506 \hich\f31506 need to define your VLANs. The VLAN is only really tracked by the \'93 +\loch\f31506 \hich\f31506 VLAN ID\'94\loch\f31506 , a number. But, since it is often hard for us to remember the numbers, we can define a name for each VLAN Id we want to use.}{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid15539794\charrsid15539794 \hich\af31506\dbch\af31505\loch\f31506 }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid8022092 -\par \hich\af31506\dbch\af31505\loch\f31506 EduNetworkBuilder also allows us to define a color for each VLAN. This color is used when visualizing packets; the packet has a ring of the VLAN color around it if the option is set for the puzzle you are working -\hich\af31506\dbch\af31505\loch\f31506 on. -\par \hich\af31506\dbch\af31505\loch\f31506 Once we have defined the VLAN IDs and names, we can then program our Switches. We do that by setting each port / VLAN combination with one of three values:}{\rtlch\fcs1 \af39 \ltrch\fcs0 -\f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 \hich\af39\dbch\af31505\loch\f39 Tagged , Untagged, }{\rtlch\fcs1 \af39 \ltrch\fcs0 +\par \hich\af31506\dbch\af31505\loch\f31506 EduNetworkBuilder also allows us to define a color \hich\af31506\dbch\af31505\loch\f31506 +for each VLAN. This color is used when visualizing packets; the packet has a ring of the VLAN color around it if the option is set for the puzzle you are working on. +\par \hich\af31506\dbch\af31505\loch\f31506 Once we have defined the VLAN IDs and names, we can then program our Switches. We do tha\hich\af31506\dbch\af31505\loch\f31506 t by setting each port / VLAN combination with one of three values:}{\rtlch\fcs1 \af39 +\ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 \hich\af39\dbch\af31505\loch\f39 Tagged , Untagged, }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 or }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 \hich\af39\dbch\af31505\loch\f39 Forbidden -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 \hich\f39 All data being processed by a switch is \'93\loch\f39 \hich\f39 tagged\'94\loch\f39 by the switch\hich\af39\dbch\af31505\loch\f39 -, so the switch knows where it came from. Behind the scenes, the switch is tagging and untagging all the time. When you only have the default VLAN, you never notice it. -\par \hich\af39\dbch\af31505\loch\f39 These names end up confusing people a lot. They represent the status of the packet t\hich\af39\dbch\af31505\loch\f39 \hich\f39 -hat is expected on the port that it is plugged into. For example, if we have port 1 untagged on the \'93\loch\f39 \hich\f39 default\'94\loch\f39 - VLAN, it means that we expect any packed that is coming in from port 1 to need to be tagged as it enters the switch. Let\hich\f39 \rquote \loch\f39 s return to that in a \hich\af39\dbch\af31505\loch\f39 m\hich\af39\dbch\af31505\loch\f39 -oment. First, let\hich\f39 \rquote \loch\f39 s look more at the definition of what these mean. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 \hich\f39 All data being processed by a switch is \'93\loch\f39 \hich\f39 tagged\'94\loch\f39 + by the switch, so the switch knows where it came from. Behind the scenes, the switch is tagging and untag\hich\af39\dbch\af31505\loch\f39 ging all the time. When you only have the default VLAN, you never notice it. +\par \hich\af39\dbch\af31505\loch\f39 These names end up confusing people a lot. They represent the status of the packet that is expected on the port that it is plugged into. For example, if we have port 1 untagged\hich\af39\dbch\af31505\loch\f39 \hich\f39 + on the \'93\loch\f39 \hich\f39 default\'94\loch\f39 VLAN, it means that we expect any packed that is coming in from port 1 to need to be tagged as it enters the switch. Let\hich\f39 \rquote \loch\f39 s return to that in a moment. First, let\hich\f39 +\rquote \loch\f39 s look more at the definition of what these mean. \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0\pararsid8022092 {\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid8022092\charrsid1076115 \hich\af39\dbch\af31505\loch\f39 Untagged: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 \hich\f39 You can only have one \'93\loch\f39 \hich\f39 untagged\'94\loch\f39 VLAN per port. It means that, when an untagged packet comes into the switch, that packet }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 needs to be}{\rtlch\fcs1 \af39 \ltrch\fcs0 -\f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 tagged with the VLAN ID of the specified V\hich\af39\dbch\af31505\loch\f39 LAN}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 -\hich\af39\dbch\af31505\loch\f39 so the switch can track where it comes from}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 -. For example, if you have port 1 untagged on VLAN 10, then, when a packet comes into the switch, the }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 switch}{\rtlch\fcs1 \af39 \ltrch\fcs0 +\f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 tagged with the VLAN ID of the specified VLAN}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 + so the switch can track where it comes from}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 . For example, if you have port\hich\af39\dbch\af31505\loch\f39 + 1 untagged on VLAN 10, then, when a packet comes into the switch, the }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 switch}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 will mark it (tag it) as being part of VLAN 10. When }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 the packet leaves the switch}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 out of that port}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 , if the packet is part of VLAN 10, the packet is untagged as it leaves.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8022092 \hich\af39\dbch\af31505\loch\f39 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 \hich\f39 If you have a computer or a device that does not know about VLANs, you need to have it plugged into a port that is \'93\loch\f39 -\hich\f39 untagged.\'94\loch\f39 Computers and unmanaged devices only know how to produ\hich\af39\dbch\af31505\loch\f39 -ce untagged packets, and so the switch needs to know how to deal with untagged packets. If a packet comes in that is untagged, and no VLAN is labeled as untagged, then the switch does not know what to do with the packet, and the packet is dropped. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 If yo\hich\af39\dbch\af31505\loch\f39 \hich\f39 +u have a computer or a device that does not know about VLANs, you need to have it plugged into a port that is \'93\loch\f39 \hich\f39 untagged.\'94\loch\f39 + Computers and unmanaged devices only know how to produce untagged packets, and so the switch needs to know how to deal with untagged\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 +packets. If a packet comes in that is untagged, and no VLAN is labeled as untagged, then the switch does not know what to do with the packet, and the packet is dropped. \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid3998963\charrsid1076115 \hich\af39\dbch\af31505\loch\f39 Tagged:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid8022092\charrsid1076115 \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 If a packet is tagged, it means the packet is}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 expected to be}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 coming from another switch, or a device that understands VLANs. Only VLAN-}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 knowledgeable}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 - devices can tag a packet, so they must be coming from a VLAN capable device. Tagged packets are ones whic\hich\af39\dbch\af31505\loch\f39 -h are destined for a device on another switch, or need to be routed to another VLAN. The VLAN Tag tells the switches at the far end, which VLAN the packet is a part of. Most of your switch-to-switch traffic should be tagged. And, when you tag a VLAN, y -\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 u will usually tag it for all VLAN IDs that you have.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 - There will be some cases when you will not want it tagged for everything, you want to forbid it (below)}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 + devices can tag a packet, so they must be coming from a VLAN capable device. Tagged packets are ones which are destined for a device on another switch, or need to be \hich\af39\dbch\af31505\loch\f39 +routed to another VLAN. The VLAN Tag tells the switches at the far end, which VLAN the packet is a part of. Most of your switch-to-switch traffic should be tagged. And, when you tag a VLAN, you will usually tag it for all VLAN IDs that you have.}{ +\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 There \hich\af39\dbch\af31505\loch\f39 will be some cases when you will not want it tagged for everything, you want to forbid it (below)}{ +\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid3998963\charrsid1076115 \hich\af39\dbch\af31505\loch\f39 Forbidden: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 Forbidden VLANs allow you to keep certain VLANs from\hich\af39\dbch\af31505\loch\f39 - being accessed in different places. For example, if you have a school that has a staff network, guest network, and a student network, you may not want the staff network accessible in the student dorms. If the network is forbidden there, then the studen -\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 s cannot hack into it from there without going through your firewall.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 - There are a number of ways to hack into VLANs, and so there are certainly some times to forbid VLANs from places where they do not need to be.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6178591 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026 +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 \hich\af39\dbch\af31505\loch\f39 +Forbidden VLANs allow you to keep certain VLANs from being accessed in different places. For example, if you have a school that has a staff networ\hich\af39\dbch\af31505\loch\f39 +k, guest network, and a student network, you may not want the staff network accessible in the student dorms. If the network is forbidden there, then the students cannot hack into it from there without going through your firewall.}{\rtlch\fcs1 \af39 +\ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 There are a number of wa\hich\af39\dbch\af31505\loch\f39 +ys to hack into VLANs, and so there are certainly some times to forbid VLANs from places where they do not need to be.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026 {\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0 \picw7595\pich5847\picwgoal4306\pichgoal3315\pngblip\bliptag2097857432{\*\blipuid 7d0ac39839b3515cea3f364371a51431}89504e470d0a1a0a0000000d494844520000011f000000dd0806000001f50746d0000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 @@ -17306,45 +17704,45 @@ bdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbd bdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdbdcececeefefef000000040000002701ffff030000000000}\par}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid3998963\charrsid3887485 \hich\af39\dbch\af31505\loch\f39 Configuring a VLAN:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \b\lang1024\langfe1024\noproof\insrsid3887485\charrsid3887485 \hich\af31506\dbch\af31505\loch\f31506 }{\rtlch\fcs1 \af0 \ltrch\fcs0 \b\lang1024\langfe1024\noproof\insrsid3998963\charrsid3887485 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 Let\hich\f39 \rquote \loch\f39 -s look at this example of vlan configuration. Here we have four VLAN IDs. The main networks we have are for student, staff, and guests. -\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 Port 1 is \'93\loch\f39 \hich\f39 Untagged\'94\hich\af39\dbch\af31505\loch\f39 on the Student VLAN. This means that the computer connected to port 1 is part of the Student VLAN. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7013448 \hich\af39\dbch\af31505\loch\f39 -Port 2 is untagged on the default VLAN. This is actually not good practice. The default VLAN is often used for switch-to-switch communication, and giving\hich\af39\dbch\af31505\loch\f39 people access to this is a great way to be hacked into. -\par \hich\af39\dbch\af31505\loch\f39 Ports 6 and 7 are Tagged for all the VLANs. These are the uplink ports for the switch that connect to the other switches, or to the firewall. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 Let\hich\f39 \rquote \loch\f39 s look at this example of vlan configuration. Here we have four VLAN\hich\af39\dbch\af31505\loch\f39 + IDs. The main networks we have are for student, staff, and guests. +\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 Port 1 is \'93\loch\f39 \hich\f39 Untagged\'94\loch\f39 on the Student VLAN. This means that the computer connected to port 1 is part of the Student VLAN. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7013448 \hich\af39\dbch\af31505\loch\f39 Port 2 is untagged on the default VLAN. This is actually not good\hich\af39\dbch\af31505\loch\f39 + practice. The default VLAN is often used for switch-to-switch communication, and giving people access to this is a great way to be hacked into. +\par \hich\af39\dbch\af31505\loch\f39 Ports 6 and 7 are Tagged for all the VLANs. These are the uplink ports for the switch that connect to the oth\hich\af39\dbch\af31505\loch\f39 er switches, or to the firewall. \par \hich\af39\dbch\af31505\loch\f39 Below are some best practices for VLANs \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7013448\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 VLAN Best}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid16462501\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 }{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7013448\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 P}{\rtlch\fcs1 \af39 \ltrch\fcs0 -\b\f39\lang9\langfe1033\langnp9\insrsid16462501\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 racti\hich\af39\dbch\af31505\loch\f39 ce}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7013448\charrsid7013448 -\hich\af39\dbch\af31505\loch\f39 s}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid16462501\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 : +\b\f39\lang9\langfe1033\langnp9\insrsid16462501\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 ractice}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7013448\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 s}{\rtlch\fcs1 \af39 +\ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid16462501\charrsid7013448 \hich\af39\dbch\af31505\loch\f39 : \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid16462501 \hich\af39\dbch\af31505\loch\f39 Use ports on one side}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 of switch}{ \rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid16462501 \hich\af39\dbch\af31505\loch\f39 or other for uplinks (tagged) \par }\pard \ltrpar\ql \li720\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin720\itap0\pararsid15880749 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7013448 \hich\af39\dbch\af31505\loch\f39 -This is for convenience of management. If all your uplink ports are on one end of the switch, it makes it a LOT easier when moving wires around. It is very difficult, if you have uplinks\hich\af39\dbch\af31505\loch\f39 - somewhere in the middle of your switch, to remember which wire connects to a switch and what connects to a computer. If you have a very complex network, where you have multiple ports on every switch that are untagged for different VLANs, then it may not -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 \hich\f39 matter as much. You will be needing a very thorough network map to do that. But, for the most part, use your uplinks on the left (that is where most switches that have special -\'93\loch\f39 \hich\f39 backbone\'94\loch\f39 ports have them.) +This is for convenience of management. If all your uplink ports\hich\af39\dbch\af31505\loch\f39 + are on one end of the switch, it makes it a LOT easier when moving wires around. It is very difficult, if you have uplinks somewhere in the middle of your switch, to remember which wire connects to a switch and what connects to a computer. If you have +\hich\af39\dbch\af31505\loch\f39 a\hich\af39\dbch\af31505\loch\f39 + very complex network, where you have multiple ports on every switch that are untagged for different VLANs, then it may not matter as much. You will be needing a very thorough network map to do that. But, for the most part, use your uplinks on the left ( +\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 \hich\f39 hat is where most switches that have special \'93\loch\f39 \hich\f39 backbone\'94\loch\f39 ports have them.) \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid5966121 \hich\af39\dbch\af31505\loch\f39 Management VLAN is untagged on uplink ports. }{ \rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid15880749 -\par }\pard \ltrpar\ql \li720\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin720\itap0\pararsid15880749 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid15880749 \hich\af39\dbch\af31505\loch\f39 Edu -\hich\af39\dbch\af31505\loch\f39 -NetworkBuilder drastically limits your ability to have complex tagging and untagging. Some switches allow you to build things that cannot physically work. EduNetworkBuilder does not allow some of that. Unfortunately, it also keeps you from doing one of -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 -the best practices. On your uplink ports, the ports that connect from switch to switch, you should usually have the management VLAN untagged. This makes life a lot simpler when you are trying to access switches for the first time. But, not all switches -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 allow you to combine tagged and untagged ports. It is just very nice when you can do so. -\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 -Block the default vlan on all ports except switch-to-switch ports \par }\pard \ltrpar\ql \li720\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin720\itap0\pararsid15880749 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid15880749 \hich\af39\dbch\af31505\loch\f39 -The default port is used for switch-to-switch communication. There are hacker tools which allow hac\hich\af39\dbch\af31505\loch\f39 -kers to create packets to fool switches into doing things, so long as those packets come in on the default VLAN. Thus, the default VLAN should be blocked on all ports that hackers might use, but need to be allowed on the ports which are connected to othe -\hich\af39\dbch\af31505\loch\f39 r\hich\af39\dbch\af31505\loch\f39 switches. +EduNetworkBuilder drastically limits your ability to have complex tagging and untagging. Some switches allow you to build things that \hich\af39\dbch\af31505\loch\f39 +cannot physically work. EduNetworkBuilder does not allow some of that. Unfortunately, it also keeps you from doing one of the best practices. On your uplink ports, the ports that connect from switch to switch, you should usually have the management VLA +\hich\af39\dbch\af31505\loch\f39 N\hich\af39\dbch\af31505\loch\f39 + untagged. This makes life a lot simpler when you are trying to access switches for the first time. But, not all switches allow you to combine tagged and untagged ports. It is just very nice when you can do so. +\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 Block the default vlan on all ports except +\hich\af39\dbch\af31505\loch\f39 switch-to-switch ports +\par }\pard \ltrpar\ql \li720\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin720\itap0\pararsid15880749 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid15880749 \hich\af39\dbch\af31505\loch\f39 +The default port is used for switch-to-switch communication. There are hacker tools which allow hackers to create packets to fool switches into doing things, so long as those packets come in on the default VLAN. Thus, the default +\hich\af39\dbch\af31505\loch\f39 VLAN should be blocked on all ports that hackers might use, but need to be allowed on the ports which are connected to other switches. \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 \hich\af39\dbch\af31505\loch\f39 Create a management vlan that is separate from the default VLAN \par }\pard \ltrpar\ql \li720\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin720\itap0\pararsid15880749 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid15880749 \hich\af39\dbch\af31505\loch\f39 -He who controls a switch, controls most of the network. Because of this, it is best to create a VLAN for managing switches that is separate from your other VLANs. In particular, t\hich\af39\dbch\af31505\loch\f39 -he default VLAN is the dangerous VLAN to have access to, so it is pretty important to do your management on something different from that. But, if you have the choice between using the guest VLAN and the default VLAN for management, use the default VLAN. -}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid8995041 \hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 - But if at all possible, do your management from its own network and control access to that VLAN using firewall rules.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1795431 +He who controls a switch, controls most of the network. \hich\af39\dbch\af31505\loch\f39 +Because of this, it is best to create a VLAN for managing switches that is separate from your other VLANs. In particular, the default VLAN is the dangerous VLAN to have access to, so it is pretty important to do your management on something different fro +\hich\af39\dbch\af31505\loch\f39 m\hich\af39\dbch\af31505\loch\f39 that. But, if you have the choice between using the guest VLAN and the default VLAN for management, use the default VLAN.}{\rtlch\fcs1 \af39 \ltrch\fcs0 +\f39\lang9\langfe1033\langnp9\insrsid8995041 \hich\af39\dbch\af31505\loch\f39 But if at all possible, do your management from its own network and control access to that VLAN using firewall rules.}{\rtlch\fcs1 \af39 \ltrch\fcs0 +\f39\lang9\langfe1033\langnp9\insrsid1795431 \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid5966121 \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid16462501 \par }{\*\themedata 504b030414000600080000002100e9de0fbfff0000001c020000130000005b436f6e74656e745f54797065735d2e786d6cac91cb4ec3301045f748fc83e52d4a @@ -17487,8 +17885,8 @@ fffffffffffffffffdfffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff -ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e5000000000000000000000000404c -c6d7217bd201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000 +ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e50000000000000000000000001018 +7683339ad201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000105000000000000}} \ No newline at end of file diff --git a/EduNetworkBuilder/Resources/Level0_Power.enbx b/EduNetworkBuilder/Resources/Level0_Power.enbx new file mode 100644 index 0000000..f0f7632 --- /dev/null +++ b/EduNetworkBuilder/Resources/Level0_Power.enbx @@ -0,0 +1,639 @@ + + + + + The switch is powered off. Right-click it and power it on. Then, ping the laptop to make sure things work. + Power It On + 1024 + 1024 + 100 + True + 0 + 4.3 + 130 + none + True + False + + laptop0 + 100 + 103 + 559,560 + laptop + False + False + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 103 + 104 + laptop0 + lo0 + + lo + 104 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 103 + 105 + laptop0 + eth0 + + eth + 105 + False + + + + eth0 + + 192.168.1.3 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + laptop1 + 100 + 123 + 640,150 + laptop + False + False + + 192.168.2.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 123 + 124 + laptop1 + lo0 + + lo + 124 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 123 + 125 + laptop1 + eth0 + + eth + 125 + False + + + + eth0 + + 192.168.2.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + net_switch0 + 100 + 109 + 410,340 + net_switch + False + False + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 109 + 110 + net_switch0 + lo0 + + lo + 110 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + management_interface + management_interface0 + + 109 + 111 + net_switch0 + management_interface0 + + management_interface + 111 + False + + + + management_interface0 + + 192.168.1.4 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + port + port1 + + 109 + 112 + net_switch0 + port1 + + port + 112 + False + + + + port1 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port2 + + 109 + 113 + net_switch0 + port2 + + port + 113 + False + + + + port2 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port3 + + 109 + 114 + net_switch0 + port3 + + port + 114 + False + + + + port3 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port4 + + 109 + 115 + net_switch0 + port4 + + port + 115 + False + + + + port4 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port5 + + 109 + 116 + net_switch0 + port5 + + port + 116 + False + + + + port5 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port6 + + 109 + 117 + net_switch0 + port6 + + port + 117 + False + + + + port6 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port7 + + 109 + 118 + net_switch0 + port7 + + port + 118 + False + + + + port7 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + pc0 + 100 + 100 + 246,560 + pc + False + False + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 100 + 101 + pc0 + lo0 + + lo + 101 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 100 + 102 + pc0 + eth0 + + eth + 102 + False + + + + eth0 + + 192.168.1.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + router0 + 100 + 119 + 410,150 + router + False + False + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 119 + 120 + router0 + lo0 + + lo + 120 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 119 + 121 + router0 + eth0 + + eth + 121 + False + + + + eth0 + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth1 + + 119 + 122 + router0 + eth1 + + eth + 122 + False + + + + eth1 + + 192.168.2.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + + 100 + 102 + pc0 + eth0 + + + 109 + 112 + net_switch0 + port1 + + + normal + 126 + + + + 103 + 105 + laptop0 + eth0 + + + 109 + 113 + net_switch0 + port2 + + + normal + 127 + + + + 109 + 114 + net_switch0 + port3 + + + 119 + 121 + router0 + eth0 + + + normal + 128 + + + + 119 + 122 + router0 + eth1 + + + 123 + 125 + laptop1 + eth0 + + + normal + 129 + + + pc0 + laptop1 + SuccessfullyPings + + Ping + Power + Default + + \ No newline at end of file diff --git a/EduNetworkBuilder/Resources/Level2_CannotConnect.enbx b/EduNetworkBuilder/Resources/Level2_CannotConnect.enbx new file mode 100644 index 0000000..e191ba9 --- /dev/null +++ b/EduNetworkBuilder/Resources/Level2_CannotConnect.enbx @@ -0,0 +1,1554 @@ + + + + + The director shut down the office when he went away for the weekend, and brought back this new laptop (laptop2) to connect up. It is not working, and you need to fix your network. + Cannot connect + 1024 + 1024 + 100 + False + 2 + 7.5 + 191 + hints + False + False + + firewall0 + 100 + 100 + 180,510 + firewall + False + True + True + + 192.168.5.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 100 + 101 + firewall0 + lo0 + + lo + 101 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + wan + wan0 + + 100 + 104 + firewall0 + wan0 + + wan + 104 + False + + + + wan0 + + 192.168.5.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 100 + 102 + firewall0 + eth0 + + eth + 102 + False + + + + eth0 + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth1 + + 100 + 103 + firewall0 + eth1 + + eth + 103 + False + + + + eth1 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + vpn + vpn0 + + 100 + 157 + firewall0 + vpn0 + + vpn + 157 + False + Test + + + 192.168.6.2 + 255.255.255.0 + 0.0.0.0 + ip_only + + + vpn0 + + 192.168.50.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + vpn + vpn1 + + 100 + 184 + firewall0 + vpn1 + + vpn + 184 + False + Secondary + + + 192.168.7.2 + 255.255.255.0 + 0.0.0.0 + ip_only + + + vpn1 + + 192.168.51.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + 192.168.2.1 + 255.255.255.0 + 192.168.50.2 + route + + + 192.168.3.1 + 255.255.255.0 + 192.168.51.2 + route + + + 127.0.0.1 + 0.0.0.0 + 0.0.0.0 + route + + + 192.168.5.2 + 0.0.0.0 + 0.0.0.0 + route + + + 192.168.1.1 + 192.168.1.10 + 192.168.1.20 + route + + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + route + + + 192.168.50.1 + 0.0.0.0 + 0.0.0.0 + route + + + 192.168.51.1 + 0.0.0.0 + 0.0.0.0 + route + + + + firewall1 + 100 + 105 + 700,510 + firewall + False + False + + 192.168.6.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 105 + 106 + firewall1 + lo0 + + lo + 106 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + wan + wan0 + + 105 + 109 + firewall1 + wan0 + + wan + 109 + False + + + + wan0 + + 192.168.6.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 105 + 107 + firewall1 + eth0 + + eth + 107 + False + + + + eth0 + + 192.168.2.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth1 + + 105 + 108 + firewall1 + eth1 + + eth + 108 + False + + + + eth1 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + vpn + vpn0 + + 105 + 156 + firewall1 + vpn0 + + vpn + 156 + False + Test + + + 192.168.5.2 + 255.255.255.0 + 0.0.0.0 + ip_only + + + vpn0 + + 192.168.50.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + 192.168.1.1 + 255.255.255.0 + 192.168.50.1 + route + + + 192.168.3.1 + 255.255.255.0 + 192.168.50.1 + route + + + + laptop0 + 100 + 140 + 280,830 + laptop + False + False + + 192.168.1.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 140 + 141 + laptop0 + lo0 + + lo + 141 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 140 + 142 + laptop0 + eth0 + + eth + 142 + False + + + + eth0 + + 192.168.1.3 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + laptop1 + 100 + 143 + 800,850 + laptop + False + False + + 192.168.2.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 143 + 144 + laptop1 + lo0 + + lo + 144 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 143 + 145 + laptop1 + eth0 + + eth + 145 + False + + + + eth0 + + 192.168.2.3 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + laptop2 + 100 + 186 + 360,670 + laptop + False + False + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 186 + 187 + laptop2 + lo0 + + lo + 187 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 186 + 188 + laptop2 + eth0 + + eth + 188 + True + + + + eth0 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + wlan + wlan2 + + 186 + 189 + laptop2 + wlan2 + + wlan + 189 + True + + + + wlan2 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + net_switch0 + 100 + 114 + 180,670 + net_switch + False + False + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 114 + 115 + net_switch0 + lo0 + + lo + 115 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + management_interface + management_interface0 + + 114 + 116 + net_switch0 + management_interface0 + + management_interface + 116 + False + + + + management_interface0 + + 192.168.1.4 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + port + port1 + + 114 + 117 + net_switch0 + port1 + + port + 117 + False + + + + port1 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port2 + + 114 + 118 + net_switch0 + port2 + + port + 118 + False + + + + port2 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port3 + + 114 + 119 + net_switch0 + port3 + + port + 119 + False + + + + port3 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port4 + + 114 + 120 + net_switch0 + port4 + + port + 120 + False + + + + port4 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port5 + + 114 + 121 + net_switch0 + port5 + + port + 121 + False + + + + port5 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port6 + + 114 + 122 + net_switch0 + port6 + + port + 122 + False + + + + port6 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port7 + + 114 + 123 + net_switch0 + port7 + + port + 123 + False + + + + port7 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + net_switch1 + 100 + 124 + 700,690 + net_switch + False + False + + 192.168.2.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 124 + 125 + net_switch1 + lo0 + + lo + 125 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + management_interface + management_interface0 + + 124 + 126 + net_switch1 + management_interface0 + + management_interface + 126 + False + + + + management_interface0 + + 192.168.2.4 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + port + port1 + + 124 + 127 + net_switch1 + port1 + + port + 127 + False + + + + port1 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port2 + + 124 + 128 + net_switch1 + port2 + + port + 128 + False + + + + port2 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port3 + + 124 + 129 + net_switch1 + port3 + + port + 129 + False + + + + port3 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port4 + + 124 + 130 + net_switch1 + port4 + + port + 130 + False + + + + port4 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port5 + + 124 + 131 + net_switch1 + port5 + + port + 131 + False + + + + port5 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port6 + + 124 + 132 + net_switch1 + port6 + + port + 132 + False + + + + port6 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port7 + + 124 + 133 + net_switch1 + port7 + + port + 133 + False + + + + port7 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + pc0 + 100 + 134 + 90,830 + pc + False + False + + 192.168.1.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 134 + 135 + pc0 + lo0 + + lo + 135 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 134 + 136 + pc0 + eth0 + + eth + 136 + False + + + + eth0 + + 192.168.1.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + pc1 + 100 + 137 + 600,850 + pc + False + False + + 192.168.2.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 137 + 138 + pc1 + lo0 + + lo + 138 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 137 + 139 + pc1 + eth0 + + eth + 139 + False + + + + eth0 + + 192.168.2.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + router0 + 100 + 110 + 430,410 + router + False + False + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 110 + 111 + router0 + lo0 + + lo + 111 + False + + + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 110 + 112 + router0 + eth0 + + eth + 112 + False + + + + eth0 + + 192.168.6.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth1 + + 110 + 113 + router0 + eth1 + + eth + 113 + False + + + + eth1 + + 192.168.5.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth2 + + 110 + 182 + router0 + eth2 + + eth + 182 + False + + + + eth2 + + 192.168.7.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + + 100 + 104 + firewall0 + wan0 + + + 110 + 113 + router0 + eth1 + + + normal + 155 + + + + 114 + 119 + net_switch0 + port3 + + + 100 + 102 + firewall0 + eth0 + + + normal + 154 + + + + 105 + 109 + firewall1 + wan0 + + + 110 + 112 + router0 + eth0 + + + normal + 153 + + + + 143 + 145 + laptop1 + eth0 + + + 124 + 128 + net_switch1 + port2 + + + normal + 150 + + + + 124 + 129 + net_switch1 + port3 + + + 105 + 107 + firewall1 + eth0 + + + normal + 152 + + + + 140 + 142 + laptop0 + eth0 + + + 114 + 118 + net_switch0 + port2 + + + normal + 147 + + + + 134 + 136 + pc0 + eth0 + + + 114 + 117 + net_switch0 + port1 + + + normal + 146 + + + + 137 + 139 + pc1 + eth0 + + + 124 + 127 + net_switch1 + port1 + + + normal + 149 + + + + 114 + 120 + net_switch0 + port4 + + + 186 + 188 + laptop2 + eth0 + + + normal + 190 + + + laptop2 + laptop1 + SuccessfullyPings + + Ping + Power + Default + + \ No newline at end of file diff --git a/EduNetworkBuilder/Resources/languages/edustrings.resx b/EduNetworkBuilder/Resources/languages/edustrings.resx index 8836e7b..734585b 100644 --- a/EduNetworkBuilder/Resources/languages/edustrings.resx +++ b/EduNetworkBuilder/Resources/languages/edustrings.resx @@ -1637,6 +1637,14 @@ Firewall Dropped Packet: Device {0} P_FirewallDropped = Firewall Dropped Packet: Device {0} + + Power: + H_Power_Key = Power: + + + Power + H_Power_Title = Power + Power Off NB_PowerOff = Power Off