|
|
|
@ -1,18 +1,18 @@
|
|
|
|
|
{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}
|
|
|
|
|
{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f50\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}
|
|
|
|
|
{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f40\fbidi \fmodern\fcharset0\fprq1{\*\panose 00000000000000000000}Consolas;}
|
|
|
|
|
{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
|
|
|
|
|
{\fhimajor\f31502\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0302020204030204}Calibri Light;}{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
|
|
|
|
|
{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
|
|
|
|
|
{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f357\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
|
|
|
|
|
{\f358\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f360\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f361\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f362\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}
|
|
|
|
|
{\f363\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f364\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f365\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f377\fbidi \fmodern\fcharset238\fprq1 Courier New CE;}
|
|
|
|
|
{\f378\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f380\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f381\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f382\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);}
|
|
|
|
|
{\f383\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f384\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f385\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f697\fbidi \froman\fcharset238\fprq2 Cambria Math CE;}
|
|
|
|
|
{\f698\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f700\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f701\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f704\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;}
|
|
|
|
|
{\f705\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f747\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f748\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f750\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;}
|
|
|
|
|
{\f751\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f752\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f753\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f754\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;}
|
|
|
|
|
{\f755\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f857\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f858\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f860\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;}
|
|
|
|
|
{\f861\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f864\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f865\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
|
|
|
|
|
{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f41\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
|
|
|
|
|
{\f42\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f44\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f45\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f46\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}
|
|
|
|
|
{\f47\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f48\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f49\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f61\fbidi \fmodern\fcharset238\fprq1 Courier New CE;}
|
|
|
|
|
{\f62\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f64\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f65\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f66\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);}
|
|
|
|
|
{\f67\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f68\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f69\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f381\fbidi \froman\fcharset238\fprq2 Cambria Math CE;}
|
|
|
|
|
{\f382\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f384\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f385\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f388\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;}
|
|
|
|
|
{\f389\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f431\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f432\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f434\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;}
|
|
|
|
|
{\f435\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f436\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f437\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f438\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;}
|
|
|
|
|
{\f439\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f441\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f442\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f444\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;}
|
|
|
|
|
{\f445\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f448\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f449\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
|
|
|
|
|
{\flomajor\f31509\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flomajor\f31511\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\flomajor\f31512\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}
|
|
|
|
|
{\flomajor\f31513\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flomajor\f31514\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\flomajor\f31515\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}
|
|
|
|
|
{\flomajor\f31516\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbmajor\f31518\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fdbmajor\f31519\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}
|
|
|
|
@ -40,10 +40,10 @@
|
|
|
|
|
\fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext0 \sqformat \spriority0 Normal;}{\*\cs10 \additive \ssemihidden \sunhideused \spriority1 Default Paragraph Font;}{\*
|
|
|
|
|
\ts11\tsrowd\trftsWidthB3\trpaddl108\trpaddr108\trpaddfl3\trpaddft3\trpaddfb3\trpaddfr3\trcbpat1\trcfpat1\tblind0\tblindtype3\tsvertalt\tsbrdrt\tsbrdrl\tsbrdrb\tsbrdrr\tsbrdrdgl\tsbrdrdgr\tsbrdrh\tsbrdrv \ql \li0\ri0\sa160\sl259\slmult1
|
|
|
|
|
\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs22\alang1025 \ltrch\fcs0 \fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext11 \ssemihidden \sunhideused
|
|
|
|
|
Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid4603928\rsid5375111\rsid5966121\rsid6042682\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid7216714\rsid7365293\rsid8022092
|
|
|
|
|
\rsid8342082\rsid8995041\rsid10760348\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0\mdispDef1\mlMargin0\mrMargin0\mdefJc1
|
|
|
|
|
\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo3\dy11\hr9\min48}{\version22}{\edmins1552}{\nofpages19}{\nofwords6170}{\nofchars35171}{\nofcharsws41259}{\vern89}}
|
|
|
|
|
{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect
|
|
|
|
|
Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2259517\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid4603928\rsid5375111\rsid5966121\rsid6042682\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid7216714\rsid7365293
|
|
|
|
|
\rsid7810929\rsid8022092\rsid8342082\rsid8995041\rsid10760348\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid13053143\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0
|
|
|
|
|
\mdispDef1\mlMargin0\mrMargin0\mdefJc1\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo3\dy13\hr16\min29}{\version24}{\edmins1559}{\nofpages19}{\nofwords6343}
|
|
|
|
|
{\nofchars36160}{\nofcharsws42419}{\vern89}}{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect
|
|
|
|
|
\widowctrl\ftnbj\aenddoc\trackmoves0\trackformatting1\donotembedsysfont0\relyonvml0\donotembedlingdata1\grfdocevents0\validatexml0\showplaceholdtext0\ignoremixedcontent0\saveinvalidxml0\showxmlerrors0\horzdoc\dghspace120\dgvspace120\dghorigin1701
|
|
|
|
|
\dgvorigin1984\dghshow0\dgvshow3\jcompress\viewkind1\viewscale100\rsidroot13008245 \nouicompat \fet0{\*\wgrffmtfilter 2450}\nofeaturethrottle1\ilfomacatclnup0\ltrpar \sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\*\pnseclvl1
|
|
|
|
|
\pnucrm\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl2\pnucltr\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl4\pnlcltr\pnstart1\pnindent720\pnhang {\pntxta )}}{\*\pnseclvl5
|
|
|
|
@ -66,8 +66,8 @@ Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Each network card can have multiple IP addresses. This allows you to have one network wire coming into a computer, but have multiple IP-addresses. \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
This adds a little bit of complexity, to it being a "simple" network simulation tool. But it adds a lot of flexibility, as well as being closer to reality.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Building a network:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1046{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1075{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 1}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\pngblip\bliptag-1272176549{\*\blipuid b42c205b1dadc3d8e90139fb2240d3fc}
|
|
|
|
@ -178,7 +178,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0
|
|
|
|
|
\f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1045{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}
|
|
|
|
|
\f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1074{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}
|
|
|
|
|
{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 2}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex22\picscaley22\piccropl0\piccropr0\piccropt0\piccropb0\picw4868\pich4868\picwgoal2760\pichgoal2760\pngblip\bliptag-2029053173{\*\blipuid 870f1b0bebebc602ae30d0fca37d41f5}
|
|
|
|
@ -1069,8 +1069,8 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f
|
|
|
|
|
01010101010101010101010100000101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1044{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1073{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 3}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex99\picscaley99\piccropl0\piccropr0\piccropt0\piccropb0\picw1067\pich1067\picwgoal605\pichgoal605\pngblip\bliptag1707607077{\*\blipuid 65c80425ca1c5677ea901160569d16b8}
|
|
|
|
@ -1113,7 +1113,7 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f
|
|
|
|
|
11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111
|
|
|
|
|
11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111
|
|
|
|
|
111111111110111111111111111111111111111111111111111111111111111111111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111111111111110040000002701ffff030000000000}}}{\rtlch\fcs1 \af39
|
|
|
|
|
\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1043{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1072{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 4}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -1232,7 +1232,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 Use the\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
item list on the left to choose an item to add to the network. Click on an item to select it. Then click somewhere on the network to place it there. You may put as many of those items on the network as you want before clicking on something else.
|
|
|
|
|
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1042{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1071{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 5}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -1931,8 +1931,8 @@ tem to the network.
|
|
|
|
|
If you click on an item that is already on the network, you can drag it and release it to a new location. There is no visual feedback that shows that you are dragging and dropping it. When you release the button, the item will snap to
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 the new location.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Links:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1041{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1070{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 6}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex20\picscaley20\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag783477962{\*\blipuid 2eb2ecca66199fd25bb0f84018900df1}
|
|
|
|
@ -2638,8 +2638,8 @@ Delete, edit, ping from, arp from, dhcp request (if the device is configured to
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
A packet is information that is sent from one computer to another. In this simulation, you can see the packets flowing between devices. A packet has a source and destination. Each packet looks different from the others.
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1040{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1069{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 7}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-1822675188{\*\blipuid 935c2f0ce92c8b0cb6c1e465c717d5d2}
|
|
|
|
@ -3317,7 +3317,7 @@ c400f97f5e00fdece600fabaa7000000000000000000000000000000000000000000000000000000
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 The Ping packet goes from one computer to the other. When it gets to the destination, the destination computer sends a ping response that says, "the ping made it."
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1039{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1068{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 8}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -3996,7 +3996,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 The ARP packet (see the section on ARP) is used when one computer is looking for the MAC address of the other computer. You usually do not see these packets in this simulation unless you specifically ask a machine to
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 find the arp of another.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1038{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1067{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 9}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -4675,7 +4675,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 DHCP packets contain IP address information (See the section on DHCP or DHCP Servers). They are used when a device needs to find its own IP address.\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
A DHCP server will respond with a packet to tell the device what IP address it should use.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1037{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1066{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 10}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -5359,7 +5359,7 @@ db00fbc1b200fa9a8000359fea00339eea00319eea00309dea00fdeae4002e9dea002d9cea002b9b
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 A VPN packet is an encrypted packet (see the section on VPNs) that goes between t\hich\af39\dbch\af31505\loch\f39 wo firewalls that are configured for a VPN.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1036{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1065{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 11}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -6098,8 +6098,8 @@ The gateway is a computer on the same subnet as the IP address, where any non-lo
|
|
|
|
|
e subnet-mask to determine if it is local or not. If the packet is local, it is sent straight out of the network card to the destination computer. If the packet is not local, it is routed to the default gateway, which sends it on towards the final desti
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 n\hich\af39\dbch\af31505\loch\f39 ation.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DHCP:
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1035{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1064{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 12}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-491375475{\*\blipuid e2b6348d9bf57bfe4a73d613ee6d91e6}
|
|
|
|
@ -6783,9 +6783,8 @@ to have one assigned to it. DHCP is what happens. Basically the client broadca
|
|
|
|
|
(See DHCP above) A DHCP server remembers all the clients that request IP addresses so it issues the same IP address if that particular client asks a second time. It also remembers which IP addresses it has given\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
out so it does not give the same IP address to different computers.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Ping:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1034{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid7810929\charrsid1788261 {\*\shppict{\pict{\*\picprop\shplid1054{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}
|
|
|
|
|
{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 13}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-1822675188{\*\blipuid 935c2f0ce92c8b0cb6c1e465c717d5d2}
|
|
|
|
|
89504e470d0a1a0a0000000d49484452000000c8000000c808030000009a865eac000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
|
|
|
|
@ -7463,14 +7462,29 @@ c400f97f5e00fdece600fabaa7000000000000000000000000000000000000000000000000000000
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 A Ping is a simple packet that is sent from one comput to the other. The computer you send the pin\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
g packet to will usually respond. The word "Ping" comes from the concept of a submarine and sonar. Something does a "Ping" and you hear an echo to tell you that the computer is alive. This is usually what it is used for, to determine if a computer is t
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 rned on, functional, or to see if the network is properly set up.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 MAC Addresses:
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 rned on, functional, or to see if the network is properly set up.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 Traceroute:
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 Traceroute is more complex than a ping. It is used to test all the routers along t}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0
|
|
|
|
|
\f39\lang9\langfe1033\langnp9\insrsid13053143 \hich\af39\dbch\af31505\loch\f39 he path between two computers. It is particular\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ly nice to use when you are checking out a complex network. Instead of pinging every spot along the way, you can use traceroute to automatically test.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Traceroute works by }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 send}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13053143
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 ing}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 a special packet with a \loch\af39\dbch\af31505\hich\f39 \'93\hich\af39\dbch\af31505\loch\f39 TTL
|
|
|
|
|
\loch\af39\dbch\af31505\hich\f39 \'94\hich\af39\dbch\af31505\loch\f39 (Time to Live). The time to live starts at 1. Each router along the path is supposed to subtract 1\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
from the TTL, and when the TTL reaches 0, the router that has it responds to tell you it has dropped the packet. Traceroute catches these \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
error messages and tells you which computer it got it from. Then, traceroute adds 1 to the ttl and sends out anot\hich\af39\dbch\af31505\loch\f39 her packet.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
With a TTL of 2, the second router responds. Then the TTL is increased to 3 and it keeps going. Traceroute will continue until it has reached the end, or until the maximum hops has been reached. In the real world, the maximum is usually 30.
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 In this program, it is much lower than that.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 The traceroute program exists on most operating systems, but under \hich\af39\dbch\af31505\loch\f39 differen\hich\af39\dbch\af31505\loch\f39 t names. It might be \hich\af39\dbch\af31505\loch\f39 called
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 tracert, traceroute, or a few other variations.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929\charrsid7810929
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7810929
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 MAC Addresses:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Each Network Card has a hard-coded "address". These are supposed to be unique to each network card, and look something like: }{\rtlch\fcs1 \af2
|
|
|
|
|
\ltrch\fcs0 \f2\insrsid6700708 \hich\af2\dbch\af31505\loch\f2 10:08:b1:73:aa:5b.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets that are being sent o\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
n the local network use the "Ethernet protocol", which sends the packet from one MAC Address to another. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 ARP:
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1033{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1063{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 14}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag1748859600{\*\blipuid 683d7ad04fca3dd8c66ece4cf808f2d2}
|
|
|
|
@ -8162,10 +8176,10 @@ it gets a response back that says something like, "I have that IP and my MAC add
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
A broadcast packet is one that is sent out to everything that is considered local to it. Routers, firewalls, and some other devices do not pass broadcasts on.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293 \hich\af39\dbch\af31505\loch\f39 Power:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft0\shptop3\shpright1490\shpbottom387\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz3\shplid1029
|
|
|
|
|
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv
|
|
|
|
|
{\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0\picw3450\pich889\picwgoal1956\pichgoal504\pngblip\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}
|
|
|
|
|
89504e470d0a1a0a0000000d49484452000000a30000002a080200000050b17cc7000000017352474200aece1ce90000109249444154785eed5bd9935c5519ef
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft0\shptop3\shpright1490\shpbottom387\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz3\shplid1029
|
|
|
|
|
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0
|
|
|
|
|
\picw3450\pich889\picwgoal1956\pichgoal504\pngblip\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}89504e470d0a1a0a0000000d49484452000000a30000002a080200000050b17cc7000000017352474200aece1ce90000109249444154785eed5bd9935c5519ef
|
|
|
|
|
bbdfdb7b4ff76c992c246848022498842c24200a460838187789a0a296e583a556f9c083fe0b3ef80082e55202226008b21a212ca99028645f262bd967c8acdd
|
|
|
|
|
d3cbdd177fe79c9e9e21e999e92422dd95e9ba49f57cf73bdff9ceb7feceb9b7b95c2e179afa5c0516e0af82354e2d915860cad3574b1c4c797acad3578b05ae
|
|
|
|
|
96754ee5f4d5e269ee32b037473f0d6aa1807e2650bed15787a5555de0257b9ae77941103c7c7c3f3491c5ea2b127841e6798ee76004df75ddf194839bb1c050
|
|
|
|
@ -8232,8 +8246,8 @@ c91650ff9fb639f7643a6e9c3d4d5931bf386fdeb5aeeb547ff3997a1a2f1d3cbbe1d50d1bff59ff
|
|
|
|
|
46371309e3fd5a07cfb2608b225eb7d1ab3fc9af4303e1518f2c6baa2a86159f19a2faef56a8a7f1e012efc40de76b7a61e3935f2c79ff4712e578242cab7862
|
|
|
|
|
e7d9b56773b9928de7691802fd05ce268f2c1be5839fe3908bb4d5897f6e435e6a26cf11c63d67a8cb15138041d787d5550fe209d41e37a71bf737766cb593fe
|
|
|
|
|
ccae2e7d59ab52b580ed0b645ddaaf756a55648aaffe2c30d9b3acfad3784aa3cbb3c094a72fcf6e8d376acad38de7b3cbd378cad39767b7c61b35e5e9c6f3d9e569fc5f26ff178811746d230000000049454e44ae426082}
|
|
|
|
|
}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 26}}{\sp{\sn dhgt}{\sv 251659264}}
|
|
|
|
|
{\sp{\sn fLayoutInCell}{\sv 1}}{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard
|
|
|
|
|
}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 26}}{\sp{\sn dhgt}{\sv 251659264}}{\sp{\sn fLayoutInCell}{\sv 1}}
|
|
|
|
|
{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard
|
|
|
|
|
\ql \li0\ri0\widctlpar\pvpara\posy2\dxfrtext180\dfrmtxtx180\dfrmtxty0\wraparound\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 {\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0
|
|
|
|
|
\picw3450\pich889\picwgoal1956\pichgoal504\wmetafile8\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}010009000003a628000000007d28000000000400000003010800050000000b0200000000050000000c022b00a400030000001e00040000000701040004000000
|
|
|
|
|
070104007d280000410b2000cc002a00a300000000002a00a3000000000028000000a30000002a0000000100180000000000b850000000000000000000000000
|
|
|
|
@ -8561,38 +8575,38 @@ f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7
|
|
|
|
|
f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7
|
|
|
|
|
f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000040000002701ffff030000000000}\par}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 Some}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
devices (networking devices like switches, hubs, routers, etc.) can have their power turned on and off. This does not necessarily fix problems. But, if the power is off, that device cannot do it\hich\f39 \rquote \loch\f39
|
|
|
|
|
s task. Luckily for you, the device does look like it is\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 off, when it is powered off. Look for the lights. If the lights are all dark, the device might be powered off.
|
|
|
|
|
devices (networking devices like switches, hubs, routers, etc.) can have their power turned on and off. This does not necessarily fix problems. But, if the power is off, that device cannot do it\hich\f39 \rquote \loch\f39 s task. Lu
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 ckily for you, the device does look like it is off, when it is powered off. Look for the lights. If the lights are all dark, the device might be powered off.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid4603928\charrsid7365293
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Static Routes:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A static route has a network, a subnet mask, and a gateway. The gateway must be local to the computer that is sending out the
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, firewalls, and computers how to send packets when the IP addresses and gateways are not obvious.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A static route has a network, a subnet mask, and a gateway. The gateway must b\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
e local to the computer that is sending out the packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, firewalls, and computers how to send packets when the IP addresses and gateways
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 are not obvious.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Comparing IP addresses:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 When a \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our face; masking tape covers a wall to keep it from being painted on. A subnet mask hides the subnet. For example, an IP addre
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 s\hich\af39\dbch\af31505\loch\f39 s of 192.168.0.50 and netmask of 255.255.255.0 looks like:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
When a computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our face; masking tape covers a wall to keep it from being painted on. A subnet m\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ask hides the subnet. For example, an IP address of 192.168.0.50 and netmask of 255.255.255.0 looks like:
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39\afs24 \ltrch\fcs0 \f39\fs24\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 IP:
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 11000000.10101000.00000000.00110010
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Mask:
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 11111111.11111111.11111111.00000000
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
The mask has 24 ones in a row. So it could also be represented as /24. When it is compared, the first thing that \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dropped. The resulting number is: 192.168.0.0. This is called the "Network Address." We do the same thing for both the source
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 a\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
nd destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are considered to be on the same network. If they do not have the same network address, they are considered to be on different netw
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 rks.
|
|
|
|
|
The mask has 24 ones in a row. So it could also be represented as \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
/24. When it is compared, the first thing that happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dropped. The resulting number is: 192.168.0.0. This is called the "Network Addr
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ss." We do the same thing for both the source and destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are considered to be on the same network. If they do not have the same network addr
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 ss, they are considered to be on different networks.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 VPNs:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, usually across the Internet. It is usually used in the context of either someone working from home and wanting to access printe
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 rs or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc).
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 A VPN has an IP address, which is defined like any other IP address. That IP-Address should be on a subnet that is unique to\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that has the other end of the VPN.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encryption key is supposed to be hard to guess, and it \hich\af39\dbch\af31505\loch\f39 is must be the same at both ends of the VPN. The key is case-sensitive.
|
|
|
|
|
A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, usually across the Internet. It is usually used in the context of either someon\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
e working from home and wanting to access printers or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc).
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 A VPN has an IP address, which is defined like any other IP address. That IP\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
-Address should be on a subnet that is unique to the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that has the other end of the VPN.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encrypt\hich\af39\dbch\af31505\loch\f39 ion key is supposed to be hard to guess, and it is must be the same at both ends of the VPN. The key is case-sensitive.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DEVICES:
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Hubs:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1032{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1062{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 15}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -9268,7 +9282,7 @@ ee00beb6b4001fd94600766561004b352f00eceaea00b1a7a50074635e0048322c00e7e4e400aca2
|
|
|
|
|
\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Switches:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1031{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1061{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 16}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -9319,7 +9333,7 @@ estination, the switch needs to figure out where that destination is. So the fi
|
|
|
|
|
tches in this simulation have some features of a "managed switch", in that they pretend they have spanning tree turned on. Spanning tree helps if you have a network loop (see the network loop puzzles for an example of what happens.) Spanning-tree finds
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 he quickest path through a series of switches from source to destination, ignoring the other paths.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Routers:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1030{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1060{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 17}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -10019,11 +10033,12 @@ f800e3dfde00beb6b4008d7f7b00543f3a003f272100faf9f900ddd8d700a79c9a00f4f3f200c6bf
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 A router is a network device that recieves a packet and sends it onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set ba
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 sed on the interfaces configured on the device. Anything that is considered "local" has a basic route defined for it.
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 A router is a network device that recieves a packet and sends it \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set based on the interfaces configured on the device. Anything that is considered "local" has a basic ro
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 te defined for it.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Firewall:
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1029{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
|
|
|
|
|
{\pict{\*\picprop\shplid1059{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 18}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
|
\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\pngblip\bliptag-1272176549{\*\blipuid b42c205b1dadc3d8e90139fb2240d3fc}
|
|
|
|
@ -10134,14 +10149,13 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as router\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
s, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming into the firewall that is destined for inside the firewall is blocked. In a real firewall, you would have the option to do port-forwarding, which would allow
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
incoming traffic to go to a particular destination. We do not have any way to communicate between devices except "ping", which we usually do not port-forward for. So this simulation does not do port-forwarding.
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The firewall can also do VPNs (see the help
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices behind another firewall.
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as routers, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming int\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
o the firewall that is destined for inside the firewall is blocked. In a real firewall, you would have the option to do port-forwarding, which would allow incoming traffic to go to a particular destination. We do not have any way to communicate between
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 d\hich\af39\dbch\af31505\loch\f39 evices except "ping", which we usually do not port-forward for. So this simulation does not do port-forwarding.
|
|
|
|
|
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
The firewall can also do VPNs (see the help topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices\hich\af39\dbch\af31505\loch\f39 behind another firewall.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Router:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1028{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1058{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 19}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -10181,11 +10195,11 @@ f28b7e30bb0431d8375d59733e3f21de6bb5c57bd40c0bbab52cd857b2e0886621bf9c051561c1b0
|
|
|
|
|
}{\nonshppict{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag1579083670\blipupi95{\*\blipuid 5e1ee7967f7d0b879bc48aaf9c27415c}
|
|
|
|
|
0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
|
|
|
|
|
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000
|
|
|
|
|
0000001ef32e022222220000000001ffffff0000000003ffffff8000000001ff7fff40ff574003ffffffe0ff574001ffffffc03f000003ffffffc000000001ff
|
|
|
|
|
ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fff7fc000000000ffffffe0000000007fffffc0000000002bfbaa800000000000
|
|
|
|
|
d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000
|
|
|
|
|
34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000
|
|
|
|
|
000000000000022222220041494c01ffffff0000000003ffffff8000000001ff7fff4000000003ffffffe0143d6f01ffffffc000000003ffffffc00080ca01ff
|
|
|
|
|
ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fff7fc000400000ffffffe0000000007fffffc0143d6f002bfbaa80ffffff0000
|
|
|
|
|
d500000000000000ff000000803f0000fd00000000000000fa000000000000005700000000000000fe000000000000005e000000000000006e00000000000000
|
|
|
|
|
34000000000000003e000000000000003c000000000000003c0000000000000014000041494c000038000000803f000018000000000000001800000000000000
|
|
|
|
|
10000000000000003800000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000
|
|
|
|
|
280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
@ -10262,9 +10276,9 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}}
|
|
|
|
|
{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless router is the most\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
complex device on the network. It functions as a firewall, as a switch (on the wired side) and as a hub (on the wireless side). It has VPN capability and can serve DHCP.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1027{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless router is the most complex device on the network. It functions as a firewall, as a switch (on the wired side) and as
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 a hub (on the wireless side). It has VPN capability and can serve DHCP.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1057{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 20}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -10295,11 +10309,11 @@ a7b484ca5088dddc7d45584cb8c41acdb372a6a1ab6ddc05d8433599d30637ac5e17034310f42df8
|
|
|
|
|
{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag63258229\blipupi95{\*\blipuid 03c53e75d46f94b9f265aed8df7b2335}
|
|
|
|
|
0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
|
|
|
|
|
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000018000007d3110000
|
|
|
|
|
1000001ef32e000238e000000000000774c000000000000fffe0000000000006574000ff57400003bfc000ff5740000719c0003f00000003bd80000000000003
|
|
|
|
|
3580007b690d0003ff80000000000001df80000000000003fb800020260000011100000000000001ff00000000000001df00000000000000ff00000000000000
|
|
|
|
|
7700000000000000fa000000000000005e00000000000000fe000000000000007c000000000000007e000000000000005c00002e690d00003c000067c80f0000
|
|
|
|
|
3c0000000000000038000000000000001c000000000000003800000000000000100000000000000038000000000000001c000000000000003800000000000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000001800000000000000
|
|
|
|
|
100000000000000238e00041494c000774c000000000000fffe00000000000065740000000000003bfc000143d6f000719c0000000000003bd80000080ca0003
|
|
|
|
|
35800000004b0003ff8000ffffff0001df800041494c0003fb800000c0ff00011100000040000001ff00000000000001df0000143d6f0000ff0000ffffff0000
|
|
|
|
|
7700000000000000fa000000803f00005e00000000000000fe000000000000007c000000000000007e000000000000005c000000000000003c00000000000000
|
|
|
|
|
3c0000000000000038000000000000001c00000000000000380000000000000010000041494c000038000000803f00001c000000000000003800000000000000
|
|
|
|
|
00000000000000000000000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000
|
|
|
|
|
280000000100080000000000000000000000000000000000000000000000000000000000ffffff00f3a28b002b2b2b0010101000ddb8ad006231230051515100
|
|
|
|
|
984c3600f6977d00432017002d1b1500341912002f161000f4f4f400d789770087423100803f2e007d4334006a3124005f2f220043322f00602e2300190b0800
|
|
|
|
@ -10342,11 +10356,11 @@ bfc0c10101010101010101010101010101010101010101010101010101b2b3b401b5b6b701b80101
|
|
|
|
|
01010100000301010101010101010101010101010101010101010101010101010101010101010101010102030401010101010101010101010101010101010101
|
|
|
|
|
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
|
|
|
|
|
0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}}
|
|
|
|
|
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 W\hich\af39\dbch\af31505\loch\f39 ireless Access Point:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
The WAP (Wireless Access Point) is a simple device, which allows you to plug one Ethernet port into a wire, and attach multiple wireless devices to it. Read up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39
|
|
|
|
|
\ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1026{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Access Point:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The WAP (Wireless Access Point) is a simple device, which allows you to plug o\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ne Ethernet port into a wire, and attach multiple wireless devices to it. Read up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1056{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 21}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -10380,11 +10394,11 @@ de4135480dd9de47197821ffab13f0b0cd927be1819bce11e3a15b50ccc6717e01070fdf944e0de0
|
|
|
|
|
{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag-1837271951\blipupi95{\*\blipuid 927d7471fcd0e3d1418850009d192cea}
|
|
|
|
|
0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
|
|
|
|
|
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000
|
|
|
|
|
0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff
|
|
|
|
|
ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000002bffaa800000000000
|
|
|
|
|
d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000
|
|
|
|
|
34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000
|
|
|
|
|
000000000000022222220041494c01fffffe0000000003ffffff8000000001ffffff0000000003ffffff80143d6f01ffffffc000000003ffffffc00080ca01ff
|
|
|
|
|
ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fffffc000400000ffffffe0000000007fffffc0143d6f002bffaa80ffffff0000
|
|
|
|
|
d500000000000000ff000000803f0000fd00000000000000fa000000000000005700000000000000fe000000000000005e000000000000006e00000000000000
|
|
|
|
|
34000000000000003e000000000000003c000000000000003c0000000000000014000041494c000038000000803f000018000000000000001800000000000000
|
|
|
|
|
10000000000000003800000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000
|
|
|
|
|
280000000100080000000000000000000000000000000000000000000000000000000000ffffff00feeeee00371b1300c5968d00c67762004b312d00b1563f00
|
|
|
|
|
542b1f00fccabe005d2c2100af563e000d06040041252100c3705a006a5f5e009b847e003d37360080514500321d180089716900915e4e008d4836002b141000
|
|
|
|
@ -10428,10 +10442,10 @@ d06ad0cc6acdd06acdcbcfcdd1d2c96ad3d40101010101010101010101014ab6b76ab8b9babbbcbd
|
|
|
|
|
01010101010101010101010101010101010101040101010101010101010101010101010101010101010101010101010101010101010101010101020300010101
|
|
|
|
|
0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}}
|
|
|
|
|
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Bridge:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wireless client connec\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
tion, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of a wireless link, and allows you to attach multiple wired devices. The Wireless Bridge is also call
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 d Wireless Client Mode (when referring to wireless devices.)
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1025{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wireless client connection, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 a wireless link, and allows you to attach multiple wired devices. The Wireless Bridge is also called Wireless Client Mode (when referring to wireless devices.)
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1055{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
|
|
|
|
|
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
|
|
|
|
|
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 22}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
|
|
|
|
@ -10469,11 +10483,11 @@ fb970bbcdfc1741b719a247b0991bf143f59624df88b34e1b7ae56fe8e02d96fc5286432993f1a72
|
|
|
|
|
{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag991145542\blipupi95{\*\blipuid 3b13ae462c7cca9c1834cac9a3ab36d8}
|
|
|
|
|
0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
|
|
|
|
|
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000
|
|
|
|
|
0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff
|
|
|
|
|
ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000007eebfe800000000024
|
|
|
|
|
413600000000003f81be00000000003d815c00000000003f80fe000000000015003400000000003f80fc00000000001f00dc002e690d001f80fc0067c80f0017
|
|
|
|
|
005000000000000f007800000000000d005800000000000e0078000000000006007000000000000e0038000000000004003000000000000e0030000000000006
|
|
|
|
|
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000
|
|
|
|
|
000000000000022222220041494c01fffffe0000000003ffffff8000000001ffffff0000000003ffffff80143d6f01ffffffc000000003ffffffc00080ca01ff
|
|
|
|
|
ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fffffc000400000ffffffe0000000007fffffc0143d6f007eebfe80ffffff0024
|
|
|
|
|
413600000000003f81be0000803f003d815c00000000003f80fe000000000015003400000000003f80fc00000000001f00dc00000000001f80fc000000000017
|
|
|
|
|
005000000000000f007800000000000d005800000000000e007800000000000600700041494c000e00380000803f0004003000000000000e0030000000000006
|
|
|
|
|
00300000000000020020000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000
|
|
|
|
|
280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
@ -10550,72 +10564,74 @@ ffffffffffff8c6352ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}}
|
|
|
|
|
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Repeater:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless has a limited distance it can travel, but sometimes you would prefer to stretch the w\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allows you to attach other wireless clients to it. When you are rolling out wireless in a building, it
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data it can transport. Adding a repeater does extend the distance and increases the number of devices t
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 h\hich\af39\dbch\af31505\loch\f39 at works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much more bandwidth used.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packet Corruption:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There are a number of things that can cause packets not to su\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ccessfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets drop but some get through. With Internet packets, this is often due to using too much bandwidth. But
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does not have error counts.)
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though sometimes they will \hich\af39\dbch\af31505\loch\f39 only corrupt packets when you have enough traffic.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the cables will bleed over into the network wires, which can cause a lot of packets to drop on that link.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Network wires running too close to fluorescent lights can also get corrupted. Again, it is the pulsing of the electricity that can cause bleed-over into network cables.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 General Wireless:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A wireless connection uses an antenna in both the client and server\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Wireless works the way a hub works instead of working like a switch. A switch figures out which wire a par\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ticular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the different computers. Instead, it broadcasts out the signal on the radio channel, and all the individua
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 l\hich\af39\dbch\af31505\loch\f39 computers listen to the packet to determine if it is for them.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices connected to the network. For example, if you have a 54 MBps wireless G device with 10 devices connec
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 ted to it, each device gets roughly 5.4 MBps.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of 10 devices on the one wireless, you now have 20. That divides up the signal farther, breaking up t
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 he 54 MBps to 2.7 MBps per person.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure the device. There is some overhead in encrypting and decrypting the packet, particularly since the
|
|
|
|
|
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Repe\hich\af39\dbch\af31505\loch\f39 ater:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
Wireless has a limited distance it can travel, but sometimes you would prefer to stretch the wireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allo
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soho) equipment for their wireless networks until they realize the amount of pain those can impose on a
|
|
|
|
|
ws you to attach other wireless clients to it. When you are rolling out wireless in a building, it is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bulk. Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and better quality.
|
|
|
|
|
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireless device can only function on one channel at a time. What this usually means is that, if one wirel
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ss G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas allow you to be running one network on N while the other runs on G.
|
|
|
|
|
it can transport. Adding a repeater does extend the distance and increases the number of devices that works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much m
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 re bandwidth used.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packet Corruption:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
There are a number of things that can cause packets not to successfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets dro\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
p but some get through. With Internet packets, this is often due to using too much bandwidth. But if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does no
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 have error counts.)
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though sometimes they will only corrupt packets when you have enough traffic.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the c\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ables will bleed over into the network wires, which can cause a lot of packets to drop on that link.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Network wires running too close to fluorescent lights can also get corrupted. Again, it is the pulsing of the electricity that can cause bleed-over into n\hich\af39\dbch\af31505\loch\f39 etwork cables.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 General Wireless:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
A wireless connection uses an antenna in both the client and server to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Wireles\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
s works the way a hub works instead of working like a switch. A switch figures out which wire a particular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the dif
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 f\hich\af39\dbch\af31505\loch\f39 erent computers. Instead, it broadcasts out the signal on the radio channel, and all the individual computers listen to the packet to determine if it is for them.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices co\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
nnected to the network. For example, if you have a 54 MBps wireless G device with 10 devices connected to it, each device gets roughly 5.4 MBps.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
10 devices on the one wireless, you now have 20. That divides up the signal farther, breaking up the 54 MBps to 2.7 MBps per person.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
the device. There is some overhead in encrypting and decrypting the packet, particularly since the access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soh
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
) equipment for their wireless networks until they realize the amount of pain those can impose on a larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bul
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 k\hich\af39\dbch\af31505\loch\f39 . Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and better quality.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireles\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
s device can only function on one channel at a time. What this usually means is that, if one wireless G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 allow you to be running one network on N while the other runs on G.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless SSID:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless SSID\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
(Service Set Identifier) is basically the name of the wireless connection. Advanced devices can have multiple SSIDs on one access-point (this simulator does not allow for that). The SSID is usually public information which is broadcast out from the dev
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 i\hich\af39\dbch\af31505\loch\f39 ce. You need to specify the key when you connect to make sure you have permission to access the network.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Key:
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless Key is a password for accessing the particular SSID that the key is associated with. The key is used in
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 encrypting packets between the device and the wireless Access-point.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless Key is a password for accessing the particular SSID that the key is associated with. The key is used in encrypting packets
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 between the device and the wireless Access-point.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 ADVANCED TOPICS:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Subnetting: }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
(Based heavily off of LordFlasheart's post, "Subnetting Made Easy" here: }{\field{\*\fldinst {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html\hich\af39\dbch\af31505\loch\f39 }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield
|
|
|
|
|
HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield
|
|
|
|
|
00d0c9ea79f9bace118c8200aa004ba90b0200000003000000e0c9ea79f9bace118c8200aa004ba90bae00000068007400740070003a002f002f007700770077002e0074006500630068006500780061006d0073002e006e00650074002f0066006f00720075006d0073002f00630063006e0061002d006300630065006e00
|
|
|
|
|
74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a0200}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0
|
|
|
|
|
74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a020000}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0
|
|
|
|
|
\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af39 \ltrch\fcs0
|
|
|
|
|
\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of\hich\af39\dbch\af31505\loch\f39 32 bits, split into 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of 32 bits, split in\hich\af39\dbch\af31505\loch\f39 to 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Below shows you how, for each class, the address is split in terms of network (N) and host (H) portions.
|
|
|
|
|
\par }{\rtlch\fcs1 \af50 \ltrch\fcs0 \f50\lang9\langfe1033\langnp9\insrsid6700708 \hich\af50\dbch\af31505\loch\f50 NN\hich\af50\dbch\af31505\loch\f50 NNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH /8
|
|
|
|
|
\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16
|
|
|
|
|
\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember. Th
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 e first move in doing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) or in dotted decimal (255.2\hich\af39\dbch\af31505\loch\f39 55.255.0). The first thing to do is to determine the block size: how big the subnet is.
|
|
|
|
|
\par }{\rtlch\fcs1 \af40 \ltrch\fcs0 \f40\lang9\langfe1033\langnp9\insrsid6700708 \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.HHHHHHHH.HH\hich\af40\dbch\af31505\loch\f40 HHHHHH.HHHHHHHH /8
|
|
|
|
|
\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16
|
|
|
|
|
\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember. The first move in do\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) or in dotted decimal (255.255.255.0). The fi\hich\af39\dbch\af31505\loch\f39 rst thing to do is to determine the block size: how big the subnet is.
|
|
|
|
|
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next boundary up is /24. We the\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the first number is lost to the "n
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 twork address" and the last number is the "broadcast address".
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 256. For example, if you are
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
doing 255.255.255.240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet doe\hich\af39\dbch\af31505\loch\f39 s 192.168.12.37/29 belong to?
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next boundary up is /24. We then subtract our sub\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
net from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the first number is lost to the "network address" an
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 d\hich\af39\dbch\af31505\loch\f39 the last number is the "broadcast address".
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 256. For example, if you are doing 255.255.255
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 .240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 192.168.12.37/29\hich\af39\dbch\af31505\loch\f39 belong to?
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 You may wonder where to begin. We always start with determining which boundary we are working with for this address.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e.\hich\af39\dbch\af31505\loch\f39 2 to the power of 3 equals 8.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e. 2 to the power of\hich\af39\dbch\af31505\loch\f39 3 equals 8.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 We have borrowed from the last octet as the 29th bit is in the last octet. We start from zero and count up in our block size. Therefore it follows that the subnets are:-
|
|
|
|
|
\par
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.0
|
|
|
|
@ -10623,12 +10639,12 @@ n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits tha
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.16
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.24
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.32
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.40
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192\hich\af39\dbch\af31505\loch\f39 .168.12.40
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 .............etc.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Our address is 192.168.12.37 so it must sit on the 192.168.12.32 subnet.
|
|
|
|
|
\par
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 172.16.116.4/19 sit on?
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is /19 and our next boundary is 24. Therefore 24\hich\af39\dbch\af31505\loch\f39 - 19 = 5. The block size is 2^5 = 32.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is /19 and our next boundary is 24. Therefore 24 - 19 = 5. The block size is 2^5 = 32.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 We have borrowed into the third octet as bit 19 is in the third octet so we count up our block size in that octet. The subnets are:-
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 172.16.0.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 172.16.32.0
|
|
|
|
@ -10636,21 +10652,21 @@ n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits tha
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 172.16.96.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 172.16.128.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 172.16.160.0
|
|
|
|
|
\par ...........\hich\af39\dbch\af31505\loch\f39 ..etc.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Our address is 172.16.116.4 so it must sit on the 172.16.96.0 subnet. Easy eh?
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 .............etc.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Our address is 172.16.116.4 so i\hich\af39\dbch\af31505\loch\f39 t must sit on the 172.16.96.0 subnet. Easy eh?
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 10.34.67.234/12 sit on?
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is 12. Our next boundary is 16. Therefore 16 - 12 = 4. 2^4 = 16 which gives us our block size.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 We have borrowe\hich\af39\dbch\af31505\loch\f39 d from the second octet as bit 12 sits in the second octet so we count up the block size in that octet. The subnets are:-
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 We have borrowed from the second octet as bit 12 sits \hich\af39\dbch\af31505\loch\f39 in the second octet so we count up the block size in that octet. The subnets are:-
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 10.0.0.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 10.16.0.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 10.32.0.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 10.48.0.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 .............etc.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Our address is 10.34.67.234 which must sit on the 10.32.0.0 subnet.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Hopefully\hich\af39\dbch\af31505\loch\f39 the penny is starting make sense. We will now change the type of question so that we have to give a particular host range of a subnet.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 Hopefully the penny is starting make sense. We w\hich\af39\dbch\af31505\loch\f39 ill now change the type of question so that we have to give a particular host range of a subnet.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What is the valid host range of the 4th subnet of 192.168.10.0/28?
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 16 since 32 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
- 28 = 4 and 2^4 = 16. We need to count up in the block size in the last octet as bit 28 is in the last octet.
|
|
|
|
|
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 16 since 32 - 28 = 4 and 2^4 = 16. We need to count\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
up in the block size in the last octet as bit 28 is in the last octet.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.10.0
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.10.16
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 192.168.10.32
|
|
|
|
@ -10697,7 +10713,7 @@ subnetting is no longer critical for making a small network function. But subne
|
|
|
|
|
\hich\af39\dbch\af31505\loch\f39 c\hich\af39\dbch\af31505\loch\f39 . And Subnetting networks that are connected via VPNs is still a very important part of planning large scale networks.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 There are a few main rules for how to subnet:
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 * All IP subnets should use natural boundaries.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\hich\af39\dbch\af31505\loch\f39 subnets makes them easier to control.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\loch\f39 sub\hich\af39\dbch\af31505\loch\f39 nets makes them easier to control.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 * Smaller adjacent subnets should fit into larger subnets, most of the time.
|
|
|
|
|
\par \hich\af39\dbch\af31505\loch\f39 * Smaller routing tables require less management and resources.
|
|
|
|
|
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 All IP subnets should use natural boundaries.
|
|
|
|
@ -10727,7 +10743,7 @@ Most managed switches can be configured for VLANs. }{\rtlch\fcs1 \af39 \ltrch\fc
|
|
|
|
|
(Virtual LANs) allow you to segment y}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 \hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
our network for security sake. Any computer, or device, that is on one VLAN can communicate with anything else on that VLAN. If it is not on the same VLAN, you need a router to route the packets between VLANs.}{\rtlch\fcs1 \af39 \ltrch\fcs0
|
|
|
|
|
\f39\lang9\langfe1033\langnp9\insrsid6700708
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028
|
|
|
|
|
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0
|
|
|
|
|
\picw7807\pich4101\picwgoal4426\pichgoal2325\pngblip\bliptag228299346{\*\blipuid 0d9b9252bce41f38f6369a69367bfc61}89504e470d0a1a0a0000000d49484452000001270000009b080600000157226d6d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
|
|
|
|
@ -13074,7 +13090,7 @@ A VLAN. The purple computers can talk to each-other, the yellow computers can t
|
|
|
|
|
to each-other. But, for the green computers to talk to the yellow computers, the packet must go through the firewall.}{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6970211
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341 \hich\af31506\dbch\af31505\loch\f31506 The firewall lets us set up rules to allow, or disallow packets to go between VLANs. In this way, you can have a staff network, which is
|
|
|
|
|
\hich\af31506\dbch\af31505\loch\f31506 protected from the guest network. Your server is something that you do not want strangers to have access to. But, you could have a printer on the guest network, which the staff could use.
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027
|
|
|
|
|
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0
|
|
|
|
|
\picw5847\pich2011\picwgoal3315\pichgoal1140\pngblip\bliptag1600046003{\*\blipuid 5f5ec3b36b805056fe5c7e987ea64bf1}89504e470d0a1a0a0000000d49484452000000dd0000004c0802000001119b153d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
|
|
|
|
@ -14016,7 +14032,7 @@ Forbidden VLANs allow you to keep certain VLANs from being accessed in different
|
|
|
|
|
k, guest network, and a student network, you may not want the staff network accessible in the student dorms. If the network is forbidden there, then the students cannot hack into it from there without going through your firewall.}{\rtlch\fcs1 \af39
|
|
|
|
|
\ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 There are a number of wa\hich\af39\dbch\af31505\loch\f39
|
|
|
|
|
ys to hack into VLANs, and so there are certainly some times to forbid VLANs from places where they do not need to be.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026
|
|
|
|
|
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026
|
|
|
|
|
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
|
|
|
|
|
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0
|
|
|
|
|
\picw7595\pich5847\picwgoal4306\pichgoal3315\pngblip\bliptag2097857432{\*\blipuid 7d0ac39839b3515cea3f364371a51431}89504e470d0a1a0a0000000d494844520000011f000000dd0806000001f50746d0000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
|
|
|
|
@ -17885,8 +17901,8 @@ fffffffffffffffffdfffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
|
|
|
|
|
ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e50000000000000000000000001018
|
|
|
|
|
7683339ad201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000
|
|
|
|
|
ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e50000000000000000000000008075
|
|
|
|
|
e3e0fd9bd201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000
|
|
|
|
|
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000
|
|
|
|
|
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff000000000000000000000000000000000000000000000000
|
|
|
|
|
0000000000000000000000000000000000000000000000000105000000000000}}
|