Added a traceroute test, a puzzle to show off traceroute, and traceroute help info.

This commit is contained in:
Tim Young 2017-03-13 16:32:40 +03:00
parent efe15659de
commit f8eec8375a
12 changed files with 1646 additions and 183 deletions

View File

@ -241,6 +241,7 @@
<None Include="Resources\Level0_PacketCorruption1.enbx" />
<None Include="Resources\Level0_PacketCorruption2.enbx" />
<None Include="Resources\Level0_Power.enbx" />
<None Include="Resources\Level0_Traceroute.enbx" />
<None Include="Resources\Level1-BadDHCP.enbx" />
<None Include="Resources\Level1-BadIP.enbx" />
<None Include="Resources\Level1-DuplicateIPs.enbx" />

View File

@ -44,24 +44,25 @@ namespace EduNetworkBuilder
public enum NetTestType { NeedsLocalIPTo, NeedsDefaultGW, NeedsLinkToDevice, NeedsRouteToNet,
NeedsUntaggedVLAN, NeedsTaggedVLAN, NeedsForbiddenVLAN,
SuccessfullyPings, SuccessfullyPingsAgain, SuccessfullyArps, SuccessfullyDHCPs, HelpRequest, ReadContextHelp, FailedPing,
DHCPServerEnabled,
DHCPServerEnabled, SuccessfullyTraceroutes,
LockAll, LockIP, LockRoute, LockNic, LockDHCP, LockGateway,
LockVLANsOnHost, LockNicVLAN, LockInterfaceVLAN, LockVLANNames,
}
public enum ContextTest { ping, arp, traceroute }
public enum NetTestVerbosity { none, basic, hints, full }
public enum LBContents { routes, messages, dhcp, puzzles }
public enum HelpTopics {
None, DHCP, DHCPServer, Firewall, Gateway, Help, IPAddress, Link, Subnet, Ping,
VPN, Hub, Switch, ARP, StaticRoute, Subnetting, WhenToSubnet, ComparingAddresses, MACAddress,
Network, Packet, NIC, Interface, Router, PacketCorruption, GeneralWireless, WirelessSSID, WirelessKey,
WirelessAP, WirelessRouter, WirelessRepeater, WirelessBridge, VLAN, Power
WirelessAP, WirelessRouter, WirelessRepeater, WirelessBridge, VLAN, Power, Traceroute
}
public enum FirewallRuleType { Allow, Drop }
public enum PuzzleNames
{
Level0_IP, Level1_NoGateway, Level0_NeedsLink, Level0_NoSwitch, Level1_BadDHCP, Level1_BadGateway,
Level0_SimpleDHCP, Level1_BadIP, Level0_Help, Level0_Ping, Level0_HubVsSwitch, Level0_Power,
Level0_PacketCorruption1, Level0_PacketCorruption2, Level1_AddingDevices,
Level0_PacketCorruption1, Level0_PacketCorruption2, Level0_Traceroute, Level1_AddingDevices,
Level1_MidDHCP, Level1_OneNetTwoSubnets, Level1_DuplicateIPs, Level0_NetworkLoop, Level1_DuplicateMAC,
Level2_FirewallDemo, Level1_OneNetTwoSubnets2, Level2_VPN_Demo, Level2_Bad_VPN_IP, Level2_Bad_Encryption,
Level2_Bad_Route, Level2_Blast_From_Past, Level2_Not_Working, Level2_Build_A_VPN, Level2_Connect_The_Dots,

View File

@ -150,6 +150,9 @@ namespace EduNetworkBuilder
case NetTestType.SuccessfullyDHCPs:
toreturn = NB.Translate("NT_TstDiscriptDHCPIP");
break;
case NetTestType.SuccessfullyTraceroutes:
toreturn = NB.Translate("NT_TstDiscriptTraceroute");
break;
case NetTestType.SuccessfullyPings:
case NetTestType.SuccessfullyPingsAgain:
toreturn = NB.Translate("NT_TstDiscriptPing");
@ -231,6 +234,9 @@ namespace EduNetworkBuilder
case NetTestType.SuccessfullyDHCPs:
toreturn = NB.Translate("NT_TstDiscriptDHCPIP2");
break;
case NetTestType.SuccessfullyTraceroutes:
toreturn = NB.Translate("NT_TstDiscriptTraceroute2");
break;
case NetTestType.SuccessfullyPings:
case NetTestType.SuccessfullyPingsAgain:
toreturn = NB.Translate("NT_TstDiscriptPing2");
@ -401,7 +407,7 @@ namespace EduNetworkBuilder
{
if (TheTest == NetTestType.FailedPing || TheTest == NetTestType.SuccessfullyArps
|| TheTest == NetTestType.SuccessfullyDHCPs || TheTest == NetTestType.SuccessfullyPings
|| TheTest == NetTestType.SuccessfullyPingsAgain)
|| TheTest == NetTestType.SuccessfullyPingsAgain || TheTest == NetTestType.SuccessfullyTraceroutes)
PacketNumber = PacketID; //Track the packetID of the first packet to complete the task
NB.PlaySound(NBSoundType.success);
NB.MarkToUpdate();
@ -492,6 +498,7 @@ namespace EduNetworkBuilder
case NetTestType.SuccessfullyDHCPs:
case NetTestType.SuccessfullyPings:
case NetTestType.SuccessfullyPingsAgain:
case NetTestType.SuccessfullyTraceroutes:
case NetTestType.HelpRequest:
case NetTestType.ReadContextHelp:
case NetTestType.FailedPing:

View File

@ -420,6 +420,7 @@ namespace EduNetworkBuilder
else
{
if (ntt == NetTestType.SuccessfullyPings) return true;
if (ntt == NetTestType.SuccessfullyTraceroutes) return true;
if (theNet.GetDeviceFromName(cbDest.SelectedItem.ToString()) == null)
return false; //This should never happen with a drop-down list, but just in case...
}

View File

@ -523,17 +523,19 @@ namespace EduNetworkBuilder
}
return tMessages;
}
public List<string> GetIncompleteTestDestinations(string Source, bool forPing=true)
public List<string> GetIncompleteTestDestinations(string Source, ContextTest WhatFor=ContextTest.ping)
{
List<string> tDests = new List<string>();
foreach (NetTest nt in NetTests)
{
if (nt.sHost == Source && !nt.TestComplete())
{
if (forPing && (nt.TheTest == NetTestType.FailedPing || nt.TheTest == NetTestType.SuccessfullyPings
if (WhatFor == ContextTest.ping && (nt.TheTest == NetTestType.FailedPing || nt.TheTest == NetTestType.SuccessfullyPings
|| nt.TheTest == NetTestType.SuccessfullyPingsAgain))
tDests.Add(nt.dHost);
if (!forPing && nt.TheTest == NetTestType.SuccessfullyArps)
if (WhatFor == ContextTest.arp && nt.TheTest == NetTestType.SuccessfullyArps)
tDests.Add(nt.dHost);
if (WhatFor == ContextTest.traceroute && nt.TheTest == NetTestType.SuccessfullyTraceroutes)
tDests.Add(nt.dHost);
}
}
@ -831,6 +833,10 @@ namespace EduNetworkBuilder
nt.SetDone(PacketID);
if (nt.TheTest == NetTestType.SuccessfullyPings && packet_type == PacketType.ping_answer && sHost == nt.sHost && dHost == null && dIP != null && dIP.BroadcastAddress == dIP.GetIP && dIP.GetIPString == nt.dHost)
nt.SetDone(PacketID);
if (nt.TheTest == NetTestType.SuccessfullyTraceroutes && packet_type == PacketType.tracert_reply && sHost == nt.sHost && dHost == nt.dHost)
nt.SetDone(PacketID);
if (nt.TheTest == NetTestType.SuccessfullyTraceroutes && packet_type == PacketType.tracert_reply && sHost == nt.sHost && dHost == null && dIP != null && dIP.BroadcastAddress == dIP.GetIP && dIP.GetIPString == nt.dHost)
nt.SetDone(PacketID);
}
}

View File

@ -593,7 +593,7 @@ namespace EduNetworkBuilder
if (ReleasedOn != null && ReleasedOn.IsNotNetDevice())
{
List<string> DoneList = new List<string>();
foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, true))
foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, ContextTest.ping))
{
if (!DoneList.Contains(tStr))
{
@ -603,7 +603,17 @@ namespace EduNetworkBuilder
}
}
DoneList.Clear();
foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, false))
foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, ContextTest.traceroute))
{
if (!DoneList.Contains(tStr))
{
pbNetworkView.ContextMenuStrip.Items.Add(string.Format(NB.Translate("_Traceroute") + " " + tStr));
pbNetworkView.ContextMenuStrip.Items[index++].Click += pbNetworkView_Traceroute_Name_Click;
DoneList.Add(tStr);
}
}
DoneList.Clear();
foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, ContextTest.arp))
{
if (!DoneList.Contains(tStr))
{
@ -843,6 +853,22 @@ namespace EduNetworkBuilder
myNetwork.ProcessPackets();
UpdateMessages();
}
private void pbNetworkView_Traceroute_Name_Click(object sender, EventArgs e)
{
if (ItemClickedOn == null) return; //we do not have something chosen to ping from
ToolStripMenuItem Pressed = (ToolStripMenuItem)sender;
string itemname = Pressed.Text;
string dest = Regex.Replace(itemname, NB.Translate("_Traceroute") + " ", "");
IPAddress destination;
destination = myNetwork.DNSLookup(ItemClickedOn, dest);
if (destination == null || destination.GetIPString == NB.ZeroIPString)
destination = new IPAddress(dest);
ItemClickedOn.TracerouteFromHere(destination);
myNetwork.ProcessPackets();
UpdateMessages();
}
private void pbNetworkView_Arp_Name_Click(object sender, EventArgs e)
{
if (ItemClickedOn == null) return; //we do not have something chosen to ping from

View File

@ -1840,6 +1840,10 @@ namespace EduNetworkBuilder
myNet.addPacket(trPacket);
myNet.ResetPacketTimeout();
}
if (tPacket.sourceIP.GetIPString == origStart.GetIPString)
{
myNet.NotePacketArrived(tPacket.MyType, this, tPacket.destIP, tPacket.sourceIP, tPacket.packetID);
}
return;
}
if (tPacket.MyType == PacketType.arp_request)

View File

@ -163,7 +163,7 @@ namespace EduNetworkBuilder.Properties {
/// <summary>
/// Looks up a localized string similar to {\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}
///{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f50\fb [rest of string was truncated]&quot;;.
///{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f40\fb [rest of string was truncated]&quot;;.
/// </summary>
internal static string Help {
get {
@ -331,6 +331,16 @@ namespace EduNetworkBuilder.Properties {
}
}
/// <summary>
/// Looks up a localized resource of type System.Byte[].
/// </summary>
internal static byte[] Level0_Traceroute {
get {
object obj = ResourceManager.GetObject("Level0_Traceroute", resourceCulture);
return ((byte[])(obj));
}
}
/// <summary>
/// Looks up a localized resource of type System.Byte[].
/// </summary>

View File

@ -454,6 +454,9 @@
<data name="Level0_Power" type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>..\Resources\Level0_Power.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</data>
<data name="Level0_Traceroute" type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>..\Resources\Level0_Traceroute.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</data>
<data name="Level2_CannotConnect" type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>..\Resources\Level2_CannotConnect.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</data>

View File

@ -1,18 +1,18 @@
{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}
{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f50\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;}
{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f40\fbidi \fmodern\fcharset0\fprq1{\*\panose 00000000000000000000}Consolas;}
{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
{\fhimajor\f31502\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0302020204030204}Calibri Light;}{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f357\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
{\f358\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f360\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f361\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f362\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}
{\f363\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f364\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f365\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f377\fbidi \fmodern\fcharset238\fprq1 Courier New CE;}
{\f378\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f380\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f381\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f382\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);}
{\f383\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f384\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f385\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f697\fbidi \froman\fcharset238\fprq2 Cambria Math CE;}
{\f698\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f700\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f701\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f704\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;}
{\f705\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f747\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f748\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f750\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;}
{\f751\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f752\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f753\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f754\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;}
{\f755\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f857\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f858\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f860\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;}
{\f861\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f864\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f865\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f41\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
{\f42\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f44\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f45\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f46\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}
{\f47\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f48\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f49\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f61\fbidi \fmodern\fcharset238\fprq1 Courier New CE;}
{\f62\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f64\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f65\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f66\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);}
{\f67\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f68\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f69\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f381\fbidi \froman\fcharset238\fprq2 Cambria Math CE;}
{\f382\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f384\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f385\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f388\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;}
{\f389\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f431\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f432\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f434\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;}
{\f435\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f436\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f437\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f438\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;}
{\f439\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f441\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f442\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f444\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;}
{\f445\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f448\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f449\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
{\flomajor\f31509\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flomajor\f31511\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\flomajor\f31512\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}
{\flomajor\f31513\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flomajor\f31514\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\flomajor\f31515\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}
{\flomajor\f31516\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbmajor\f31518\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fdbmajor\f31519\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}
@ -40,10 +40,10 @@
\fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext0 \sqformat \spriority0 Normal;}{\*\cs10 \additive \ssemihidden \sunhideused \spriority1 Default Paragraph Font;}{\*
\ts11\tsrowd\trftsWidthB3\trpaddl108\trpaddr108\trpaddfl3\trpaddft3\trpaddfb3\trpaddfr3\trcbpat1\trcfpat1\tblind0\tblindtype3\tsvertalt\tsbrdrt\tsbrdrl\tsbrdrb\tsbrdrr\tsbrdrdgl\tsbrdrdgr\tsbrdrh\tsbrdrv \ql \li0\ri0\sa160\sl259\slmult1
\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs22\alang1025 \ltrch\fcs0 \fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext11 \ssemihidden \sunhideused
Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid4603928\rsid5375111\rsid5966121\rsid6042682\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid7216714\rsid7365293\rsid8022092
\rsid8342082\rsid8995041\rsid10760348\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0\mdispDef1\mlMargin0\mrMargin0\mdefJc1
\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo3\dy11\hr9\min48}{\version22}{\edmins1552}{\nofpages19}{\nofwords6170}{\nofchars35171}{\nofcharsws41259}{\vern89}}
{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect
Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2259517\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid4603928\rsid5375111\rsid5966121\rsid6042682\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid7216714\rsid7365293
\rsid7810929\rsid8022092\rsid8342082\rsid8995041\rsid10760348\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid13053143\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0
\mdispDef1\mlMargin0\mrMargin0\mdefJc1\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo3\dy13\hr16\min29}{\version24}{\edmins1559}{\nofpages19}{\nofwords6343}
{\nofchars36160}{\nofcharsws42419}{\vern89}}{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect
\widowctrl\ftnbj\aenddoc\trackmoves0\trackformatting1\donotembedsysfont0\relyonvml0\donotembedlingdata1\grfdocevents0\validatexml0\showplaceholdtext0\ignoremixedcontent0\saveinvalidxml0\showxmlerrors0\horzdoc\dghspace120\dgvspace120\dghorigin1701
\dgvorigin1984\dghshow0\dgvshow3\jcompress\viewkind1\viewscale100\rsidroot13008245 \nouicompat \fet0{\*\wgrffmtfilter 2450}\nofeaturethrottle1\ilfomacatclnup0\ltrpar \sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\*\pnseclvl1
\pnucrm\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl2\pnucltr\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl4\pnlcltr\pnstart1\pnindent720\pnhang {\pntxta )}}{\*\pnseclvl5
@ -66,8 +66,8 @@ Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid
\par \hich\af39\dbch\af31505\loch\f39 Each network card can have multiple IP addresses. This allows you to have one network wire coming into a computer, but have multiple IP-addresses. \hich\af39\dbch\af31505\loch\f39
This adds a little bit of complexity, to it being a "simple" network simulation tool. But it adds a lot of flexibility, as well as being closer to reality.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Building a network:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
{\pict{\*\picprop\shplid1046{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
{\pict{\*\picprop\shplid1075{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 1}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\pngblip\bliptag-1272176549{\*\blipuid b42c205b1dadc3d8e90139fb2240d3fc}
@ -178,7 +178,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0
\f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1045{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}
\f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1074{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}
{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 2}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex22\picscaley22\piccropl0\piccropr0\piccropt0\piccropb0\picw4868\pich4868\picwgoal2760\pichgoal2760\pngblip\bliptag-2029053173{\*\blipuid 870f1b0bebebc602ae30d0fca37d41f5}
@ -1069,8 +1069,8 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f
01010101010101010101010100000101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
{\pict{\*\picprop\shplid1044{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
{\pict{\*\picprop\shplid1073{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 3}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex99\picscaley99\piccropl0\piccropr0\piccropt0\piccropb0\picw1067\pich1067\picwgoal605\pichgoal605\pngblip\bliptag1707607077{\*\blipuid 65c80425ca1c5677ea901160569d16b8}
@ -1113,7 +1113,7 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f
11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111
11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111
111111111110111111111111111111111111111111111111111111111111111111111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111111111111110040000002701ffff030000000000}}}{\rtlch\fcs1 \af39
\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1043{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1072{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 4}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -1232,7 +1232,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
\hich\af39\dbch\af31505\loch\f39 Use the\hich\af39\dbch\af31505\loch\f39
item list on the left to choose an item to add to the network. Click on an item to select it. Then click somewhere on the network to place it there. You may put as many of those items on the network as you want before clicking on something else.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1042{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1071{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 5}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -1931,8 +1931,8 @@ tem to the network.
If you click on an item that is already on the network, you can drag it and release it to a new location. There is no visual feedback that shows that you are dragging and dropping it. When you release the button, the item will snap to
\hich\af39\dbch\af31505\loch\f39 the new location.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Links:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
{\pict{\*\picprop\shplid1041{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
{\pict{\*\picprop\shplid1070{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 6}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex20\picscaley20\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag783477962{\*\blipuid 2eb2ecca66199fd25bb0f84018900df1}
@ -2638,8 +2638,8 @@ Delete, edit, ping from, arp from, dhcp request (if the device is configured to
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
A packet is information that is sent from one computer to another. In this simulation, you can see the packets flowing between devices. A packet has a source and destination. Each packet looks different from the others.
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
{\pict{\*\picprop\shplid1040{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
{\pict{\*\picprop\shplid1069{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 7}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-1822675188{\*\blipuid 935c2f0ce92c8b0cb6c1e465c717d5d2}
@ -3317,7 +3317,7 @@ c400f97f5e00fdece600fabaa7000000000000000000000000000000000000000000000000000000
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39 The Ping packet goes from one computer to the other. When it gets to the destination, the destination computer sends a ping response that says, "the ping made it."
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1039{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1068{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 8}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -3996,7 +3996,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39 The ARP packet (see the section on ARP) is used when one computer is looking for the MAC address of the other computer. You usually do not see these packets in this simulation unless you specifically ask a machine to
\hich\af39\dbch\af31505\loch\f39 find the arp of another.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1038{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1067{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 9}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -4675,7 +4675,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39 DHCP packets contain IP address information (See the section on DHCP or DHCP Servers). They are used when a device needs to find its own IP address.\hich\af39\dbch\af31505\loch\f39
A DHCP server will respond with a packet to tell the device what IP address it should use.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1037{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1066{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 10}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -5359,7 +5359,7 @@ db00fbc1b200fa9a8000359fea00339eea00319eea00309dea00fdeae4002e9dea002d9cea002b9b
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39 A VPN packet is an encrypted packet (see the section on VPNs) that goes between t\hich\af39\dbch\af31505\loch\f39 wo firewalls that are configured for a VPN.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1036{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1065{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 11}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -6098,8 +6098,8 @@ The gateway is a computer on the same subnet as the IP address, where any non-lo
e subnet-mask to determine if it is local or not. If the packet is local, it is sent straight out of the network card to the destination computer. If the packet is not local, it is routed to the default gateway, which sends it on towards the final desti
\hich\af39\dbch\af31505\loch\f39 n\hich\af39\dbch\af31505\loch\f39 ation.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DHCP:
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
{\pict{\*\picprop\shplid1035{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
{\pict{\*\picprop\shplid1064{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 12}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-491375475{\*\blipuid e2b6348d9bf57bfe4a73d613ee6d91e6}
@ -6783,9 +6783,8 @@ to have one assigned to it. DHCP is what happens. Basically the client broadca
(See DHCP above) A DHCP server remembers all the clients that request IP addresses so it issues the same IP address if that particular client asks a second time. It also remembers which IP addresses it has given\hich\af39\dbch\af31505\loch\f39
out so it does not give the same IP address to different computers.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\par \hich\af39\dbch\af31505\loch\f39 Ping:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1034{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid7810929\charrsid1788261 {\*\shppict{\pict{\*\picprop\shplid1054{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}
{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 13}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-1822675188{\*\blipuid 935c2f0ce92c8b0cb6c1e465c717d5d2}
89504e470d0a1a0a0000000d49484452000000c8000000c808030000009a865eac000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
@ -7463,14 +7462,29 @@ c400f97f5e00fdece600fabaa7000000000000000000000000000000000000000000000000000000
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39 A Ping is a simple packet that is sent from one comput to the other. The computer you send the pin\hich\af39\dbch\af31505\loch\f39
g packet to will usually respond. The word "Ping" comes from the concept of a submarine and sonar. Something does a "Ping" and you hear an echo to tell you that the computer is alive. This is usually what it is used for, to determine if a computer is t
\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 rned on, functional, or to see if the network is properly set up.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\par \hich\af39\dbch\af31505\loch\f39 MAC Addresses:
\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 rned on, functional, or to see if the network is properly set up.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 Traceroute:
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 Traceroute is more complex than a ping. It is used to test all the routers along t}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0
\f39\lang9\langfe1033\langnp9\insrsid13053143 \hich\af39\dbch\af31505\loch\f39 he path between two computers. It is particular\hich\af39\dbch\af31505\loch\f39
ly nice to use when you are checking out a complex network. Instead of pinging every spot along the way, you can use traceroute to automatically test.
\par \hich\af39\dbch\af31505\loch\f39 Traceroute works by }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 send}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13053143
\hich\af39\dbch\af31505\loch\f39 ing}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 a special packet with a \loch\af39\dbch\af31505\hich\f39 \'93\hich\af39\dbch\af31505\loch\f39 TTL
\loch\af39\dbch\af31505\hich\f39 \'94\hich\af39\dbch\af31505\loch\f39 (Time to Live). The time to live starts at 1. Each router along the path is supposed to subtract 1\hich\af39\dbch\af31505\loch\f39
from the TTL, and when the TTL reaches 0, the router that has it responds to tell you it has dropped the packet. Traceroute catches these \hich\af39\dbch\af31505\loch\f39
error messages and tells you which computer it got it from. Then, traceroute adds 1 to the ttl and sends out anot\hich\af39\dbch\af31505\loch\f39 her packet.
\par \hich\af39\dbch\af31505\loch\f39
With a TTL of 2, the second router responds. Then the TTL is increased to 3 and it keeps going. Traceroute will continue until it has reached the end, or until the maximum hops has been reached. In the real world, the maximum is usually 30.
\hich\af39\dbch\af31505\loch\f39 In this program, it is much lower than that.
\par \hich\af39\dbch\af31505\loch\f39 The traceroute program exists on most operating systems, but under \hich\af39\dbch\af31505\loch\f39 differen\hich\af39\dbch\af31505\loch\f39 t names. It might be \hich\af39\dbch\af31505\loch\f39 called
\hich\af39\dbch\af31505\loch\f39 tracert, traceroute, or a few other variations.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929\charrsid7810929
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7810929
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 MAC Addresses:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Each Network Card has a hard-coded "address". These are supposed to be unique to each network card, and look something like: }{\rtlch\fcs1 \af2
\ltrch\fcs0 \f2\insrsid6700708 \hich\af2\dbch\af31505\loch\f2 10:08:b1:73:aa:5b.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets that are being sent o\hich\af39\dbch\af31505\loch\f39
n the local network use the "Ethernet protocol", which sends the packet from one MAC Address to another. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\par \hich\af39\dbch\af31505\loch\f39 ARP:
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
{\pict{\*\picprop\shplid1033{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
{\pict{\*\picprop\shplid1063{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 14}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag1748859600{\*\blipuid 683d7ad04fca3dd8c66ece4cf808f2d2}
@ -8162,10 +8176,10 @@ it gets a response back that says something like, "I have that IP and my MAC add
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
A broadcast packet is one that is sent out to everything that is considered local to it. Routers, firewalls, and some other devices do not pass broadcasts on.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293 \hich\af39\dbch\af31505\loch\f39 Power:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft0\shptop3\shpright1490\shpbottom387\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz3\shplid1029
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv
{\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0\picw3450\pich889\picwgoal1956\pichgoal504\pngblip\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}
89504e470d0a1a0a0000000d49484452000000a30000002a080200000050b17cc7000000017352474200aece1ce90000109249444154785eed5bd9935c5519ef
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft0\shptop3\shpright1490\shpbottom387\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz3\shplid1029
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0
\picw3450\pich889\picwgoal1956\pichgoal504\pngblip\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}89504e470d0a1a0a0000000d49484452000000a30000002a080200000050b17cc7000000017352474200aece1ce90000109249444154785eed5bd9935c5519ef
bbdfdb7b4ff76c992c246848022498842c24200a460838187789a0a296e583a556f9c083fe0b3ef80082e55202226008b21a212ca99028645f262bd967c8acdd
d3cbdd177fe79c9e9e21e999e92422dd95e9ba49f57cf73bdff9ceb7feceb9b7b95c2e179afa5c0516e0af82354e2d915860cad3574b1c4c797acad3578b05ae
96754ee5f4d5e269ee32b037473f0d6aa1807e2650bed15787a5555de0257b9ae77941103c7c7c3f3491c5ea2b127841e6798ee76004df75ddf194839bb1c050
@ -8232,8 +8246,8 @@ c91650ff9fb639f7643a6e9c3d4d5931bf386fdeb5aeeb547ff3997a1a2f1d3cbbe1d50d1bff59ff
46371309e3fd5a07cfb2608b225eb7d1ab3fc9af4303e1518f2c6baa2a86159f19a2faef56a8a7f1e012efc40de76b7a61e3935f2c79ff4712e578242cab7862
e7d9b56773b9928de7691802fd05ce268f2c1be5839fe3908bb4d5897f6e435e6a26cf11c63d67a8cb15138041d787d5550fe209d41e37a71bf737766cb593fe
ccae2e7d59ab52b580ed0b645ddaaf756a55648aaffe2c30d9b3acfad3784aa3cbb3c094a72fcf6e8d376acad38de7b3cbd378cad39767b7c61b35e5e9c6f3d9e569fc5f26ff178811746d230000000049454e44ae426082}
}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 26}}{\sp{\sn dhgt}{\sv 251659264}}
{\sp{\sn fLayoutInCell}{\sv 1}}{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard
}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 26}}{\sp{\sn dhgt}{\sv 251659264}}{\sp{\sn fLayoutInCell}{\sv 1}}
{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard
\ql \li0\ri0\widctlpar\pvpara\posy2\dxfrtext180\dfrmtxtx180\dfrmtxty0\wraparound\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 {\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0
\picw3450\pich889\picwgoal1956\pichgoal504\wmetafile8\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}010009000003a628000000007d28000000000400000003010800050000000b0200000000050000000c022b00a400030000001e00040000000701040004000000
070104007d280000410b2000cc002a00a300000000002a00a3000000000028000000a30000002a0000000100180000000000b850000000000000000000000000
@ -8561,38 +8575,38 @@ f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7
f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7
f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000040000002701ffff030000000000}\par}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293
\hich\af39\dbch\af31505\loch\f39 Some}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293 \hich\af39\dbch\af31505\loch\f39
devices (networking devices like switches, hubs, routers, etc.) can have their power turned on and off. This does not necessarily fix problems. But, if the power is off, that device cannot do it\hich\f39 \rquote \loch\f39
s task. Luckily for you, the device does look like it is\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 off, when it is powered off. Look for the lights. If the lights are all dark, the device might be powered off.
devices (networking devices like switches, hubs, routers, etc.) can have their power turned on and off. This does not necessarily fix problems. But, if the power is off, that device cannot do it\hich\f39 \rquote \loch\f39 s task. Lu
\hich\af39\dbch\af31505\loch\f39 ckily for you, the device does look like it is off, when it is powered off. Look for the lights. If the lights are all dark, the device might be powered off.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid4603928\charrsid7365293
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Static Routes:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A static route has a network, a subnet mask, and a gateway. The gateway must be local to the computer that is sending out the
\hich\af39\dbch\af31505\loch\f39
packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, firewalls, and computers how to send packets when the IP addresses and gateways are not obvious.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A static route has a network, a subnet mask, and a gateway. The gateway must b\hich\af39\dbch\af31505\loch\f39
e local to the computer that is sending out the packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, firewalls, and computers how to send packets when the IP addresses and gateways
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 are not obvious.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Comparing IP addresses:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 When a \hich\af39\dbch\af31505\loch\f39
computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our face; masking tape covers a wall to keep it from being painted on. A subnet mask hides the subnet. For example, an IP addre
\hich\af39\dbch\af31505\loch\f39 s\hich\af39\dbch\af31505\loch\f39 s of 192.168.0.50 and netmask of 255.255.255.0 looks like:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
When a computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our face; masking tape covers a wall to keep it from being painted on. A subnet m\hich\af39\dbch\af31505\loch\f39
ask hides the subnet. For example, an IP address of 192.168.0.50 and netmask of 255.255.255.0 looks like:
\par }\pard \ltrpar\ql \li0\ri0\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39\afs24 \ltrch\fcs0 \f39\fs24\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 IP:
\par \hich\af39\dbch\af31505\loch\f39 11000000.10101000.00000000.00110010
\par \hich\af39\dbch\af31505\loch\f39 Mask:
\par \hich\af39\dbch\af31505\loch\f39 11111111.11111111.11111111.00000000
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
The mask has 24 ones in a row. So it could also be represented as /24. When it is compared, the first thing that \hich\af39\dbch\af31505\loch\f39
happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dropped. The resulting number is: 192.168.0.0. This is called the "Network Address." We do the same thing for both the source
\hich\af39\dbch\af31505\loch\f39 a\hich\af39\dbch\af31505\loch\f39
nd destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are considered to be on the same network. If they do not have the same network address, they are considered to be on different netw
\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 rks.
The mask has 24 ones in a row. So it could also be represented as \hich\af39\dbch\af31505\loch\f39
/24. When it is compared, the first thing that happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dropped. The resulting number is: 192.168.0.0. This is called the "Network Addr
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39
ss." We do the same thing for both the source and destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are considered to be on the same network. If they do not have the same network addr
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 ss, they are considered to be on different networks.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 VPNs:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, usually across the Internet. It is usually used in the context of either someone working from home and wanting to access printe
\hich\af39\dbch\af31505\loch\f39 rs or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc).
\par \hich\af39\dbch\af31505\loch\f39 A VPN has an IP address, which is defined like any other IP address. That IP-Address should be on a subnet that is unique to\hich\af39\dbch\af31505\loch\f39
the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that has the other end of the VPN.
\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encryption key is supposed to be hard to guess, and it \hich\af39\dbch\af31505\loch\f39 is must be the same at both ends of the VPN. The key is case-sensitive.
A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, usually across the Internet. It is usually used in the context of either someon\hich\af39\dbch\af31505\loch\f39
e working from home and wanting to access printers or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc).
\par \hich\af39\dbch\af31505\loch\f39 A VPN has an IP address, which is defined like any other IP address. That IP\hich\af39\dbch\af31505\loch\f39
-Address should be on a subnet that is unique to the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that has the other end of the VPN.
\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encrypt\hich\af39\dbch\af31505\loch\f39 ion key is supposed to be hard to guess, and it is must be the same at both ends of the VPN. The key is case-sensitive.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DEVICES:
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Hubs:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1032{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1062{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 15}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -9268,7 +9282,7 @@ ee00beb6b4001fd94600766561004b352f00eceaea00b1a7a50074635e0048322c00e7e4e400aca2
\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Switches:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1031{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1061{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 16}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -9319,7 +9333,7 @@ estination, the switch needs to figure out where that destination is. So the fi
tches in this simulation have some features of a "managed switch", in that they pretend they have spanning tree turned on. Spanning tree helps if you have a network loop (see the network loop puzzles for an example of what happens.) Spanning-tree finds
\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 he quickest path through a series of switches from source to destination, ignoring the other paths.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\par \hich\af39\dbch\af31505\loch\f39 Routers:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1030{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1060{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 17}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -10019,11 +10033,12 @@ f800e3dfde00beb6b4008d7f7b00543f3a003f272100faf9f900ddd8d700a79c9a00f4f3f200c6bf
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39 A router is a network device that recieves a packet and sends it onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set ba
\hich\af39\dbch\af31505\loch\f39 sed on the interfaces configured on the device. Anything that is considered "local" has a basic route defined for it.
\hich\af39\dbch\af31505\loch\f39 A router is a network device that recieves a packet and sends it \hich\af39\dbch\af31505\loch\f39
onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set based on the interfaces configured on the device. Anything that is considered "local" has a basic ro
\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 te defined for it.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Firewall:
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict
{\pict{\*\picprop\shplid1029{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict
{\pict{\*\picprop\shplid1059{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 18}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\pngblip\bliptag-1272176549{\*\blipuid b42c205b1dadc3d8e90139fb2240d3fc}
@ -10134,14 +10149,13 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as router\hich\af39\dbch\af31505\loch\f39
s, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming into the firewall that is destined for inside the firewall is blocked. In a real firewall, you would have the option to do port-forwarding, which would allow
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39
incoming traffic to go to a particular destination. We do not have any way to communicate between devices except "ping", which we usually do not port-forward for. So this simulation does not do port-forwarding.
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The firewall can also do VPNs (see the help
\hich\af39\dbch\af31505\loch\f39 topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices behind another firewall.
\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as routers, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming int\hich\af39\dbch\af31505\loch\f39
o the firewall that is destined for inside the firewall is blocked. In a real firewall, you would have the option to do port-forwarding, which would allow incoming traffic to go to a particular destination. We do not have any way to communicate between
\hich\af39\dbch\af31505\loch\f39 d\hich\af39\dbch\af31505\loch\f39 evices except "ping", which we usually do not port-forward for. So this simulation does not do port-forwarding.
\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
The firewall can also do VPNs (see the help topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices\hich\af39\dbch\af31505\loch\f39 behind another firewall.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Router:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1028{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1058{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 19}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -10181,11 +10195,11 @@ f28b7e30bb0431d8375d59733e3f21de6bb5c57bd40c0bbab52cd857b2e0886621bf9c051561c1b0
}{\nonshppict{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag1579083670\blipupi95{\*\blipuid 5e1ee7967f7d0b879bc48aaf9c27415c}
0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000
0000001ef32e022222220000000001ffffff0000000003ffffff8000000001ff7fff40ff574003ffffffe0ff574001ffffffc03f000003ffffffc000000001ff
ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fff7fc000000000ffffffe0000000007fffffc0000000002bfbaa800000000000
d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000
34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000
000000000000022222220041494c01ffffff0000000003ffffff8000000001ff7fff4000000003ffffffe0143d6f01ffffffc000000003ffffffc00080ca01ff
ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fff7fc000400000ffffffe0000000007fffffc0143d6f002bfbaa80ffffff0000
d500000000000000ff000000803f0000fd00000000000000fa000000000000005700000000000000fe000000000000005e000000000000006e00000000000000
34000000000000003e000000000000003c000000000000003c0000000000000014000041494c000038000000803f000018000000000000001800000000000000
10000000000000003800000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000
280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
@ -10262,9 +10276,9 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}}
{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless router is the most\hich\af39\dbch\af31505\loch\f39
complex device on the network. It functions as a firewall, as a switch (on the wired side) and as a hub (on the wireless side). It has VPN capability and can serve DHCP.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1027{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless router is the most complex device on the network. It functions as a firewall, as a switch (on the wired side) and as
\hich\af39\dbch\af31505\loch\f39 a hub (on the wireless side). It has VPN capability and can serve DHCP.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1057{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 20}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -10295,11 +10309,11 @@ a7b484ca5088dddc7d45584cb8c41acdb372a6a1ab6ddc05d8433599d30637ac5e17034310f42df8
{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag63258229\blipupi95{\*\blipuid 03c53e75d46f94b9f265aed8df7b2335}
0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000018000007d3110000
1000001ef32e000238e000000000000774c000000000000fffe0000000000006574000ff57400003bfc000ff5740000719c0003f00000003bd80000000000003
3580007b690d0003ff80000000000001df80000000000003fb800020260000011100000000000001ff00000000000001df00000000000000ff00000000000000
7700000000000000fa000000000000005e00000000000000fe000000000000007c000000000000007e000000000000005c00002e690d00003c000067c80f0000
3c0000000000000038000000000000001c000000000000003800000000000000100000000000000038000000000000001c000000000000003800000000000000
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000001800000000000000
100000000000000238e00041494c000774c000000000000fffe00000000000065740000000000003bfc000143d6f000719c0000000000003bd80000080ca0003
35800000004b0003ff8000ffffff0001df800041494c0003fb800000c0ff00011100000040000001ff00000000000001df0000143d6f0000ff0000ffffff0000
7700000000000000fa000000803f00005e00000000000000fe000000000000007c000000000000007e000000000000005c000000000000003c00000000000000
3c0000000000000038000000000000001c00000000000000380000000000000010000041494c000038000000803f00001c000000000000003800000000000000
00000000000000000000000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000
280000000100080000000000000000000000000000000000000000000000000000000000ffffff00f3a28b002b2b2b0010101000ddb8ad006231230051515100
984c3600f6977d00432017002d1b1500341912002f161000f4f4f400d789770087423100803f2e007d4334006a3124005f2f220043322f00602e2300190b0800
@ -10342,11 +10356,11 @@ bfc0c10101010101010101010101010101010101010101010101010101b2b3b401b5b6b701b80101
01010100000301010101010101010101010101010101010101010101010101010101010101010101010102030401010101010101010101010101010101010101
01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101
0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}}
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 W\hich\af39\dbch\af31505\loch\f39 ireless Access Point:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
The WAP (Wireless Access Point) is a simple device, which allows you to plug one Ethernet port into a wire, and attach multiple wireless devices to it. Read up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39
\ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1026{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Access Point:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The WAP (Wireless Access Point) is a simple device, which allows you to plug o\hich\af39\dbch\af31505\loch\f39
ne Ethernet port into a wire, and attach multiple wireless devices to it. Read up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708
\hich\af39\dbch\af31505\loch\f39
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1056{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 21}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -10380,11 +10394,11 @@ de4135480dd9de47197821ffab13f0b0cd927be1819bce11e3a15b50ccc6717e01070fdf944e0de0
{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag-1837271951\blipupi95{\*\blipuid 927d7471fcd0e3d1418850009d192cea}
0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000
0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff
ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000002bffaa800000000000
d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000
34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000
000000000000022222220041494c01fffffe0000000003ffffff8000000001ffffff0000000003ffffff80143d6f01ffffffc000000003ffffffc00080ca01ff
ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fffffc000400000ffffffe0000000007fffffc0143d6f002bffaa80ffffff0000
d500000000000000ff000000803f0000fd00000000000000fa000000000000005700000000000000fe000000000000005e000000000000006e00000000000000
34000000000000003e000000000000003c000000000000003c0000000000000014000041494c000038000000803f000018000000000000001800000000000000
10000000000000003800000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000
280000000100080000000000000000000000000000000000000000000000000000000000ffffff00feeeee00371b1300c5968d00c67762004b312d00b1563f00
542b1f00fccabe005d2c2100af563e000d06040041252100c3705a006a5f5e009b847e003d37360080514500321d180089716900915e4e008d4836002b141000
@ -10428,10 +10442,10 @@ d06ad0cc6acdd06acdcbcfcdd1d2c96ad3d40101010101010101010101014ab6b76ab8b9babbbcbd
01010101010101010101010101010101010101040101010101010101010101010101010101010101010101010101010101010101010101010101020300010101
0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}}
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Bridge:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wireless client connec\hich\af39\dbch\af31505\loch\f39
tion, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of a wireless link, and allows you to attach multiple wired devices. The Wireless Bridge is also call
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 d Wireless Client Mode (when referring to wireless devices.)
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1025{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wireless client connection, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 a wireless link, and allows you to attach multiple wired devices. The Wireless Bridge is also called Wireless Client Mode (when referring to wireless devices.)
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1055{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}
{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}
{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 22}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}
@ -10469,11 +10483,11 @@ fb970bbcdfc1741b719a247b0991bf143f59624df88b34e1b7ae56fe8e02d96fc5286432993f1a72
{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag991145542\blipupi95{\*\blipuid 3b13ae462c7cca9c1834cac9a3ab36d8}
0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000
070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000
0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000
0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff
ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000007eebfe800000000024
413600000000003f81be00000000003d815c00000000003f80fe000000000015003400000000003f80fc00000000001f00dc002e690d001f80fc0067c80f0017
005000000000000f007800000000000d005800000000000e0078000000000006007000000000000e0038000000000004003000000000000e0030000000000006
0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000
000000000000022222220041494c01fffffe0000000003ffffff8000000001ffffff0000000003ffffff80143d6f01ffffffc000000003ffffffc00080ca01ff
ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fffffc000400000ffffffe0000000007fffffc0143d6f007eebfe80ffffff0024
413600000000003f81be0000803f003d815c00000000003f80fe000000000015003400000000003f80fc00000000001f00dc00000000001f80fc000000000017
005000000000000f007800000000000d005800000000000e007800000000000600700041494c000e00380000803f0004003000000000000e0030000000000006
00300000000000020020000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000
280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
@ -10550,72 +10564,74 @@ ffffffffffff8c6352ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}}
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Repeater:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless has a limited distance it can travel, but sometimes you would prefer to stretch the w\hich\af39\dbch\af31505\loch\f39
ireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allows you to attach other wireless clients to it. When you are rolling out wireless in a building, it
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39
is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data it can transport. Adding a repeater does extend the distance and increases the number of devices t
\hich\af39\dbch\af31505\loch\f39 h\hich\af39\dbch\af31505\loch\f39 at works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much more bandwidth used.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packet Corruption:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There are a number of things that can cause packets not to su\hich\af39\dbch\af31505\loch\f39
ccessfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets drop but some get through. With Internet packets, this is often due to using too much bandwidth. But
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does not have error counts.)
\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though sometimes they will \hich\af39\dbch\af31505\loch\f39 only corrupt packets when you have enough traffic.
\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the cables will bleed over into the network wires, which can cause a lot of packets to drop on that link.
\par \hich\af39\dbch\af31505\loch\f39 Network wires running too close to fluorescent lights can also get corrupted. Again, it is the pulsing of the electricity that can cause bleed-over into network cables.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 General Wireless:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A wireless connection uses an antenna in both the client and server\hich\af39\dbch\af31505\loch\f39
to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match.
\par \hich\af39\dbch\af31505\loch\f39 Wireless works the way a hub works instead of working like a switch. A switch figures out which wire a par\hich\af39\dbch\af31505\loch\f39
ticular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the different computers. Instead, it broadcasts out the signal on the radio channel, and all the individua
\hich\af39\dbch\af31505\loch\f39 l\hich\af39\dbch\af31505\loch\f39 computers listen to the packet to determine if it is for them.
\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices connected to the network. For example, if you have a 54 MBps wireless G device with 10 devices connec
\hich\af39\dbch\af31505\loch\f39 ted to it, each device gets roughly 5.4 MBps.
\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of 10 devices on the one wireless, you now have 20. That divides up the signal farther, breaking up t
\hich\af39\dbch\af31505\loch\f39 he 54 MBps to 2.7 MBps per person.
\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure the device. There is some overhead in encrypting and decrypting the packet, particularly since the
{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Repe\hich\af39\dbch\af31505\loch\f39 ater:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
Wireless has a limited distance it can travel, but sometimes you would prefer to stretch the wireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allo
\hich\af39\dbch\af31505\loch\f39
access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soho) equipment for their wireless networks until they realize the amount of pain those can impose on a
ws you to attach other wireless clients to it. When you are rolling out wireless in a building, it is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39
larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bulk. Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and better quality.
\par \hich\af39\dbch\af31505\loch\f39
Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireless device can only function on one channel at a time. What this usually means is that, if one wirel
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39
ss G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas allow you to be running one network on N while the other runs on G.
it can transport. Adding a repeater does extend the distance and increases the number of devices that works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much m
\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 re bandwidth used.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packet Corruption:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
There are a number of things that can cause packets not to successfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets dro\hich\af39\dbch\af31505\loch\f39
p but some get through. With Internet packets, this is often due to using too much bandwidth. But if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does no
\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 have error counts.)
\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though sometimes they will only corrupt packets when you have enough traffic.
\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the c\hich\af39\dbch\af31505\loch\f39
ables will bleed over into the network wires, which can cause a lot of packets to drop on that link.
\par \hich\af39\dbch\af31505\loch\f39 Network wires running too close to fluorescent lights can also get corrupted. Again, it is the pulsing of the electricity that can cause bleed-over into n\hich\af39\dbch\af31505\loch\f39 etwork cables.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 General Wireless:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
A wireless connection uses an antenna in both the client and server to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match.
\par \hich\af39\dbch\af31505\loch\f39 Wireles\hich\af39\dbch\af31505\loch\f39
s works the way a hub works instead of working like a switch. A switch figures out which wire a particular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the dif
\hich\af39\dbch\af31505\loch\f39 f\hich\af39\dbch\af31505\loch\f39 erent computers. Instead, it broadcasts out the signal on the radio channel, and all the individual computers listen to the packet to determine if it is for them.
\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices co\hich\af39\dbch\af31505\loch\f39
nnected to the network. For example, if you have a 54 MBps wireless G device with 10 devices connected to it, each device gets roughly 5.4 MBps.
\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of\hich\af39\dbch\af31505\loch\f39
10 devices on the one wireless, you now have 20. That divides up the signal farther, breaking up the 54 MBps to 2.7 MBps per person.
\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure \hich\af39\dbch\af31505\loch\f39
the device. There is some overhead in encrypting and decrypting the packet, particularly since the access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soh
\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39
) equipment for their wireless networks until they realize the amount of pain those can impose on a larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bul
\hich\af39\dbch\af31505\loch\f39 k\hich\af39\dbch\af31505\loch\f39 . Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and better quality.
\par \hich\af39\dbch\af31505\loch\f39 Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireles\hich\af39\dbch\af31505\loch\f39
s device can only function on one channel at a time. What this usually means is that, if one wireless G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas
\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 allow you to be running one network on N while the other runs on G.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless SSID:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless SSID\hich\af39\dbch\af31505\loch\f39
(Service Set Identifier) is basically the name of the wireless connection. Advanced devices can have multiple SSIDs on one access-point (this simulator does not allow for that). The SSID is usually public information which is broadcast out from the dev
\hich\af39\dbch\af31505\loch\f39 i\hich\af39\dbch\af31505\loch\f39 ce. You need to specify the key when you connect to make sure you have permission to access the network.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Key:
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless Key is a password for accessing the particular SSID that the key is associated with. The key is used in
\hich\af39\dbch\af31505\loch\f39 encrypting packets between the device and the wireless Access-point.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless Key is a password for accessing the particular SSID that the key is associated with. The key is used in encrypting packets
\hich\af39\dbch\af31505\loch\f39 between the device and the wireless Access-point.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 ADVANCED TOPICS:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Subnetting: }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
(Based heavily off of LordFlasheart's post, "Subnetting Made Easy" here: }{\field{\*\fldinst {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html\hich\af39\dbch\af31505\loch\f39 }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield
HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield
00d0c9ea79f9bace118c8200aa004ba90b0200000003000000e0c9ea79f9bace118c8200aa004ba90bae00000068007400740070003a002f002f007700770077002e0074006500630068006500780061006d0073002e006e00650074002f0066006f00720075006d0073002f00630063006e0061002d006300630065006e00
74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a0200}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0
74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a020000}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0
\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af39 \ltrch\fcs0
\f39\lang9\langfe1033\langnp9\insrsid6700708
\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of\hich\af39\dbch\af31505\loch\f39 32 bits, split into 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host.
\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of 32 bits, split in\hich\af39\dbch\af31505\loch\f39 to 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host.
\par \hich\af39\dbch\af31505\loch\f39 Below shows you how, for each class, the address is split in terms of network (N) and host (H) portions.
\par }{\rtlch\fcs1 \af50 \ltrch\fcs0 \f50\lang9\langfe1033\langnp9\insrsid6700708 \hich\af50\dbch\af31505\loch\f50 NN\hich\af50\dbch\af31505\loch\f50 NNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH /8
\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16
\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember. Th
\hich\af39\dbch\af31505\loch\f39 e first move in doing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32.
\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) or in dotted decimal (255.2\hich\af39\dbch\af31505\loch\f39 55.255.0). The first thing to do is to determine the block size: how big the subnet is.
\par }{\rtlch\fcs1 \af40 \ltrch\fcs0 \f40\lang9\langfe1033\langnp9\insrsid6700708 \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.HHHHHHHH.HH\hich\af40\dbch\af31505\loch\f40 HHHHHH.HHHHHHHH /8
\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16
\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39
There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember. The first move in do\hich\af39\dbch\af31505\loch\f39
ing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32.
\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) or in dotted decimal (255.255.255.0). The fi\hich\af39\dbch\af31505\loch\f39 rst thing to do is to determine the block size: how big the subnet is.
\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next boundary up is /24. We the\hich\af39\dbch\af31505\loch\f39
n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the first number is lost to the "n
\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 twork address" and the last number is the "broadcast address".
\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 256. For example, if you are
\hich\af39\dbch\af31505\loch\f39
doing 255.255.255.240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet doe\hich\af39\dbch\af31505\loch\f39 s 192.168.12.37/29 belong to?
\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next boundary up is /24. We then subtract our sub\hich\af39\dbch\af31505\loch\f39
net from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the first number is lost to the "network address" an
\hich\af39\dbch\af31505\loch\f39 d\hich\af39\dbch\af31505\loch\f39 the last number is the "broadcast address".
\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 256. For example, if you are doing 255.255.255
\hich\af39\dbch\af31505\loch\f39 .240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 192.168.12.37/29\hich\af39\dbch\af31505\loch\f39 belong to?
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 You may wonder where to begin. We always start with determining which boundary we are working with for this address.
\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e.\hich\af39\dbch\af31505\loch\f39 2 to the power of 3 equals 8.
\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e. 2 to the power of\hich\af39\dbch\af31505\loch\f39 3 equals 8.
\par \hich\af39\dbch\af31505\loch\f39 We have borrowed from the last octet as the 29th bit is in the last octet. We start from zero and count up in our block size. Therefore it follows that the subnets are:-
\par
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.0
@ -10623,12 +10639,12 @@ n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits tha
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.16
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.24
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.32
\par \hich\af39\dbch\af31505\loch\f39 192.168.12.40
\par \hich\af39\dbch\af31505\loch\f39 192\hich\af39\dbch\af31505\loch\f39 .168.12.40
\par \hich\af39\dbch\af31505\loch\f39 .............etc.
\par \hich\af39\dbch\af31505\loch\f39 Our address is 192.168.12.37 so it must sit on the 192.168.12.32 subnet.
\par
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 172.16.116.4/19 sit on?
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is /19 and our next boundary is 24. Therefore 24\hich\af39\dbch\af31505\loch\f39 - 19 = 5. The block size is 2^5 = 32.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is /19 and our next boundary is 24. Therefore 24 - 19 = 5. The block size is 2^5 = 32.
\par \hich\af39\dbch\af31505\loch\f39 We have borrowed into the third octet as bit 19 is in the third octet so we count up our block size in that octet. The subnets are:-
\par \hich\af39\dbch\af31505\loch\f39 172.16.0.0
\par \hich\af39\dbch\af31505\loch\f39 172.16.32.0
@ -10636,21 +10652,21 @@ n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits tha
\par \hich\af39\dbch\af31505\loch\f39 172.16.96.0
\par \hich\af39\dbch\af31505\loch\f39 172.16.128.0
\par \hich\af39\dbch\af31505\loch\f39 172.16.160.0
\par ...........\hich\af39\dbch\af31505\loch\f39 ..etc.
\par \hich\af39\dbch\af31505\loch\f39 Our address is 172.16.116.4 so it must sit on the 172.16.96.0 subnet. Easy eh?
\par \hich\af39\dbch\af31505\loch\f39 .............etc.
\par \hich\af39\dbch\af31505\loch\f39 Our address is 172.16.116.4 so i\hich\af39\dbch\af31505\loch\f39 t must sit on the 172.16.96.0 subnet. Easy eh?
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 10.34.67.234/12 sit on?
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is 12. Our next boundary is 16. Therefore 16 - 12 = 4. 2^4 = 16 which gives us our block size.
\par \hich\af39\dbch\af31505\loch\f39 We have borrowe\hich\af39\dbch\af31505\loch\f39 d from the second octet as bit 12 sits in the second octet so we count up the block size in that octet. The subnets are:-
\par \hich\af39\dbch\af31505\loch\f39 We have borrowed from the second octet as bit 12 sits \hich\af39\dbch\af31505\loch\f39 in the second octet so we count up the block size in that octet. The subnets are:-
\par \hich\af39\dbch\af31505\loch\f39 10.0.0.0
\par \hich\af39\dbch\af31505\loch\f39 10.16.0.0
\par \hich\af39\dbch\af31505\loch\f39 10.32.0.0
\par \hich\af39\dbch\af31505\loch\f39 10.48.0.0
\par \hich\af39\dbch\af31505\loch\f39 .............etc.
\par \hich\af39\dbch\af31505\loch\f39 Our address is 10.34.67.234 which must sit on the 10.32.0.0 subnet.
\par \hich\af39\dbch\af31505\loch\f39 Hopefully\hich\af39\dbch\af31505\loch\f39 the penny is starting make sense. We will now change the type of question so that we have to give a particular host range of a subnet.
\par \hich\af39\dbch\af31505\loch\f39 Hopefully the penny is starting make sense. We w\hich\af39\dbch\af31505\loch\f39 ill now change the type of question so that we have to give a particular host range of a subnet.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What is the valid host range of the 4th subnet of 192.168.10.0/28?
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 16 since 32 \hich\af39\dbch\af31505\loch\f39
- 28 = 4 and 2^4 = 16. We need to count up in the block size in the last octet as bit 28 is in the last octet.
\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 16 since 32 - 28 = 4 and 2^4 = 16. We need to count\hich\af39\dbch\af31505\loch\f39
up in the block size in the last octet as bit 28 is in the last octet.
\par \hich\af39\dbch\af31505\loch\f39 192.168.10.0
\par \hich\af39\dbch\af31505\loch\f39 192.168.10.16
\par \hich\af39\dbch\af31505\loch\f39 192.168.10.32
@ -10697,7 +10713,7 @@ subnetting is no longer critical for making a small network function. But subne
\hich\af39\dbch\af31505\loch\f39 c\hich\af39\dbch\af31505\loch\f39 . And Subnetting networks that are connected via VPNs is still a very important part of planning large scale networks.
\par \hich\af39\dbch\af31505\loch\f39 There are a few main rules for how to subnet:
\par \hich\af39\dbch\af31505\loch\f39 * All IP subnets should use natural boundaries.
\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\hich\af39\dbch\af31505\loch\f39 subnets makes them easier to control.
\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\loch\f39 sub\hich\af39\dbch\af31505\loch\f39 nets makes them easier to control.
\par \hich\af39\dbch\af31505\loch\f39 * Smaller adjacent subnets should fit into larger subnets, most of the time.
\par \hich\af39\dbch\af31505\loch\f39 * Smaller routing tables require less management and resources.
\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 All IP subnets should use natural boundaries.
@ -10727,7 +10743,7 @@ Most managed switches can be configured for VLANs. }{\rtlch\fcs1 \af39 \ltrch\fc
(Virtual LANs) allow you to segment y}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 \hich\af39\dbch\af31505\loch\f39
our network for security sake. Any computer, or device, that is on one VLAN can communicate with anything else on that VLAN. If it is not on the same VLAN, you need a router to route the packets between VLANs.}{\rtlch\fcs1 \af39 \ltrch\fcs0
\f39\lang9\langfe1033\langnp9\insrsid6700708
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0
\picw7807\pich4101\picwgoal4426\pichgoal2325\pngblip\bliptag228299346{\*\blipuid 0d9b9252bce41f38f6369a69367bfc61}89504e470d0a1a0a0000000d49484452000001270000009b080600000157226d6d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
@ -13074,7 +13090,7 @@ A VLAN. The purple computers can talk to each-other, the yellow computers can t
to each-other. But, for the green computers to talk to the yellow computers, the packet must go through the firewall.}{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6970211
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341 \hich\af31506\dbch\af31505\loch\f31506 The firewall lets us set up rules to allow, or disallow packets to go between VLANs. In this way, you can have a staff network, which is
\hich\af31506\dbch\af31505\loch\f31506 protected from the guest network. Your server is something that you do not want strangers to have access to. But, you could have a printer on the guest network, which the staff could use.
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0
\picw5847\pich2011\picwgoal3315\pichgoal1140\pngblip\bliptag1600046003{\*\blipuid 5f5ec3b36b805056fe5c7e987ea64bf1}89504e470d0a1a0a0000000d49484452000000dd0000004c0802000001119b153d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
@ -14016,7 +14032,7 @@ Forbidden VLANs allow you to keep certain VLANs from being accessed in different
k, guest network, and a student network, you may not want the staff network accessible in the student dorms. If the network is forbidden there, then the students cannot hack into it from there without going through your firewall.}{\rtlch\fcs1 \af39
\ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 There are a number of wa\hich\af39\dbch\af31505\loch\f39
ys to hack into VLANs, and so there are certainly some times to forbid VLANs from places where they do not need to be.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026
\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026
{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}
{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0
\picw7595\pich5847\picwgoal4306\pichgoal3315\pngblip\bliptag2097857432{\*\blipuid 7d0ac39839b3515cea3f364371a51431}89504e470d0a1a0a0000000d494844520000011f000000dd0806000001f50746d0000000017352474200aece1ce90000000467414d410000b18f0bfc61050000
@ -17885,8 +17901,8 @@ fffffffffffffffffdfffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e50000000000000000000000001018
7683339ad201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000
ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e50000000000000000000000008075
e3e0fd9bd201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000105000000000000}}

File diff suppressed because it is too large Load Diff

View File

@ -1657,6 +1657,14 @@
<value>Device cannot respond - Packet Failed</value>
<comment>ND_DoInputFromLink_PowerOff = Device cannot respond - Packet Failed</comment>
</data>
<data name="H_Traceroute_Key" xml:space="preserve">
<value>Traceroute:</value>
<comment>H_Traceroute_Key = Traceroute:</comment>
</data>
<data name="H_Traceroute_Title" xml:space="preserve">
<value>Traceroute</value>
<comment>H_Traceroute_Title = Traceroute</comment>
</data>
<data name="ND_ProcessArrival_TracerouteArrived" xml:space="preserve">
<value>TTL reached.</value>
<comment>ND_ProcessArrival_TracerouteArrived = TTL reached.</comment>
@ -1665,6 +1673,14 @@
<value>Traceroute Destination Reached</value>
<comment>ND_ProcessArrival_TracertReply = Traceroute Destination Reached</comment>
</data>
<data name="NT_TstDiscriptTraceroute" xml:space="preserve">
<value>Needs to traceroute</value>
<comment>NT_TstDiscriptTraceroute = Needs to traceroute</comment>
</data>
<data name="NT_TstDiscriptTraceroute2" xml:space="preserve">
<value>Needs to traceroute to</value>
<comment>NT_TstDiscriptTraceroute2 = Needs to traceroute to</comment>
</data>
<data name="_Traceroute" xml:space="preserve">
<value>Traceroute</value>
<comment>_Traceroute = Traceroute</comment>