diff --git a/EduNetworkBuilder/EduNetworkBuilder.csproj b/EduNetworkBuilder/EduNetworkBuilder.csproj index 95127f6..ea38b9f 100644 --- a/EduNetworkBuilder/EduNetworkBuilder.csproj +++ b/EduNetworkBuilder/EduNetworkBuilder.csproj @@ -241,6 +241,7 @@ + diff --git a/EduNetworkBuilder/NB.cs b/EduNetworkBuilder/NB.cs index 017a060..f228f08 100644 --- a/EduNetworkBuilder/NB.cs +++ b/EduNetworkBuilder/NB.cs @@ -44,24 +44,25 @@ namespace EduNetworkBuilder public enum NetTestType { NeedsLocalIPTo, NeedsDefaultGW, NeedsLinkToDevice, NeedsRouteToNet, NeedsUntaggedVLAN, NeedsTaggedVLAN, NeedsForbiddenVLAN, SuccessfullyPings, SuccessfullyPingsAgain, SuccessfullyArps, SuccessfullyDHCPs, HelpRequest, ReadContextHelp, FailedPing, - DHCPServerEnabled, + DHCPServerEnabled, SuccessfullyTraceroutes, LockAll, LockIP, LockRoute, LockNic, LockDHCP, LockGateway, LockVLANsOnHost, LockNicVLAN, LockInterfaceVLAN, LockVLANNames, } + public enum ContextTest { ping, arp, traceroute } public enum NetTestVerbosity { none, basic, hints, full } public enum LBContents { routes, messages, dhcp, puzzles } public enum HelpTopics { None, DHCP, DHCPServer, Firewall, Gateway, Help, IPAddress, Link, Subnet, Ping, VPN, Hub, Switch, ARP, StaticRoute, Subnetting, WhenToSubnet, ComparingAddresses, MACAddress, Network, Packet, NIC, Interface, Router, PacketCorruption, GeneralWireless, WirelessSSID, WirelessKey, - WirelessAP, WirelessRouter, WirelessRepeater, WirelessBridge, VLAN, Power + WirelessAP, WirelessRouter, WirelessRepeater, WirelessBridge, VLAN, Power, Traceroute } public enum FirewallRuleType { Allow, Drop } public enum PuzzleNames { Level0_IP, Level1_NoGateway, Level0_NeedsLink, Level0_NoSwitch, Level1_BadDHCP, Level1_BadGateway, Level0_SimpleDHCP, Level1_BadIP, Level0_Help, Level0_Ping, Level0_HubVsSwitch, Level0_Power, - Level0_PacketCorruption1, Level0_PacketCorruption2, Level1_AddingDevices, + Level0_PacketCorruption1, Level0_PacketCorruption2, Level0_Traceroute, Level1_AddingDevices, Level1_MidDHCP, Level1_OneNetTwoSubnets, Level1_DuplicateIPs, Level0_NetworkLoop, Level1_DuplicateMAC, Level2_FirewallDemo, Level1_OneNetTwoSubnets2, Level2_VPN_Demo, Level2_Bad_VPN_IP, Level2_Bad_Encryption, Level2_Bad_Route, Level2_Blast_From_Past, Level2_Not_Working, Level2_Build_A_VPN, Level2_Connect_The_Dots, diff --git a/EduNetworkBuilder/NetTest.cs b/EduNetworkBuilder/NetTest.cs index 8126223..e9df04f 100644 --- a/EduNetworkBuilder/NetTest.cs +++ b/EduNetworkBuilder/NetTest.cs @@ -150,6 +150,9 @@ namespace EduNetworkBuilder case NetTestType.SuccessfullyDHCPs: toreturn = NB.Translate("NT_TstDiscriptDHCPIP"); break; + case NetTestType.SuccessfullyTraceroutes: + toreturn = NB.Translate("NT_TstDiscriptTraceroute"); + break; case NetTestType.SuccessfullyPings: case NetTestType.SuccessfullyPingsAgain: toreturn = NB.Translate("NT_TstDiscriptPing"); @@ -231,6 +234,9 @@ namespace EduNetworkBuilder case NetTestType.SuccessfullyDHCPs: toreturn = NB.Translate("NT_TstDiscriptDHCPIP2"); break; + case NetTestType.SuccessfullyTraceroutes: + toreturn = NB.Translate("NT_TstDiscriptTraceroute2"); + break; case NetTestType.SuccessfullyPings: case NetTestType.SuccessfullyPingsAgain: toreturn = NB.Translate("NT_TstDiscriptPing2"); @@ -401,7 +407,7 @@ namespace EduNetworkBuilder { if (TheTest == NetTestType.FailedPing || TheTest == NetTestType.SuccessfullyArps || TheTest == NetTestType.SuccessfullyDHCPs || TheTest == NetTestType.SuccessfullyPings - || TheTest == NetTestType.SuccessfullyPingsAgain) + || TheTest == NetTestType.SuccessfullyPingsAgain || TheTest == NetTestType.SuccessfullyTraceroutes) PacketNumber = PacketID; //Track the packetID of the first packet to complete the task NB.PlaySound(NBSoundType.success); NB.MarkToUpdate(); @@ -492,6 +498,7 @@ namespace EduNetworkBuilder case NetTestType.SuccessfullyDHCPs: case NetTestType.SuccessfullyPings: case NetTestType.SuccessfullyPingsAgain: + case NetTestType.SuccessfullyTraceroutes: case NetTestType.HelpRequest: case NetTestType.ReadContextHelp: case NetTestType.FailedPing: diff --git a/EduNetworkBuilder/NetTestEditor.cs b/EduNetworkBuilder/NetTestEditor.cs index 96fde22..d02b7f8 100644 --- a/EduNetworkBuilder/NetTestEditor.cs +++ b/EduNetworkBuilder/NetTestEditor.cs @@ -420,6 +420,7 @@ namespace EduNetworkBuilder else { if (ntt == NetTestType.SuccessfullyPings) return true; + if (ntt == NetTestType.SuccessfullyTraceroutes) return true; if (theNet.GetDeviceFromName(cbDest.SelectedItem.ToString()) == null) return false; //This should never happen with a drop-down list, but just in case... } diff --git a/EduNetworkBuilder/Network.cs b/EduNetworkBuilder/Network.cs index dc04940..f61a9de 100644 --- a/EduNetworkBuilder/Network.cs +++ b/EduNetworkBuilder/Network.cs @@ -523,17 +523,19 @@ namespace EduNetworkBuilder } return tMessages; } - public List GetIncompleteTestDestinations(string Source, bool forPing=true) + public List GetIncompleteTestDestinations(string Source, ContextTest WhatFor=ContextTest.ping) { List tDests = new List(); foreach (NetTest nt in NetTests) { if (nt.sHost == Source && !nt.TestComplete()) { - if (forPing && (nt.TheTest == NetTestType.FailedPing || nt.TheTest == NetTestType.SuccessfullyPings + if (WhatFor == ContextTest.ping && (nt.TheTest == NetTestType.FailedPing || nt.TheTest == NetTestType.SuccessfullyPings || nt.TheTest == NetTestType.SuccessfullyPingsAgain)) tDests.Add(nt.dHost); - if (!forPing && nt.TheTest == NetTestType.SuccessfullyArps) + if (WhatFor == ContextTest.arp && nt.TheTest == NetTestType.SuccessfullyArps) + tDests.Add(nt.dHost); + if (WhatFor == ContextTest.traceroute && nt.TheTest == NetTestType.SuccessfullyTraceroutes) tDests.Add(nt.dHost); } } @@ -831,6 +833,10 @@ namespace EduNetworkBuilder nt.SetDone(PacketID); if (nt.TheTest == NetTestType.SuccessfullyPings && packet_type == PacketType.ping_answer && sHost == nt.sHost && dHost == null && dIP != null && dIP.BroadcastAddress == dIP.GetIP && dIP.GetIPString == nt.dHost) nt.SetDone(PacketID); + if (nt.TheTest == NetTestType.SuccessfullyTraceroutes && packet_type == PacketType.tracert_reply && sHost == nt.sHost && dHost == nt.dHost) + nt.SetDone(PacketID); + if (nt.TheTest == NetTestType.SuccessfullyTraceroutes && packet_type == PacketType.tracert_reply && sHost == nt.sHost && dHost == null && dIP != null && dIP.BroadcastAddress == dIP.GetIP && dIP.GetIPString == nt.dHost) + nt.SetDone(PacketID); } } diff --git a/EduNetworkBuilder/NetworkBuilder.cs b/EduNetworkBuilder/NetworkBuilder.cs index 7e56ac0..fb07673 100644 --- a/EduNetworkBuilder/NetworkBuilder.cs +++ b/EduNetworkBuilder/NetworkBuilder.cs @@ -593,7 +593,7 @@ namespace EduNetworkBuilder if (ReleasedOn != null && ReleasedOn.IsNotNetDevice()) { List DoneList = new List(); - foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, true)) + foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, ContextTest.ping)) { if (!DoneList.Contains(tStr)) { @@ -603,7 +603,17 @@ namespace EduNetworkBuilder } } DoneList.Clear(); - foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, false)) + foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, ContextTest.traceroute)) + { + if (!DoneList.Contains(tStr)) + { + pbNetworkView.ContextMenuStrip.Items.Add(string.Format(NB.Translate("_Traceroute") + " " + tStr)); + pbNetworkView.ContextMenuStrip.Items[index++].Click += pbNetworkView_Traceroute_Name_Click; + DoneList.Add(tStr); + } + } + DoneList.Clear(); + foreach (string tStr in myNetwork.GetIncompleteTestDestinations(ReleasedOn.hostname, ContextTest.arp)) { if (!DoneList.Contains(tStr)) { @@ -843,6 +853,22 @@ namespace EduNetworkBuilder myNetwork.ProcessPackets(); UpdateMessages(); } + + private void pbNetworkView_Traceroute_Name_Click(object sender, EventArgs e) + { + if (ItemClickedOn == null) return; //we do not have something chosen to ping from + ToolStripMenuItem Pressed = (ToolStripMenuItem)sender; + string itemname = Pressed.Text; + string dest = Regex.Replace(itemname, NB.Translate("_Traceroute") + " ", ""); + IPAddress destination; + destination = myNetwork.DNSLookup(ItemClickedOn, dest); + if (destination == null || destination.GetIPString == NB.ZeroIPString) + destination = new IPAddress(dest); + ItemClickedOn.TracerouteFromHere(destination); + myNetwork.ProcessPackets(); + UpdateMessages(); + } + private void pbNetworkView_Arp_Name_Click(object sender, EventArgs e) { if (ItemClickedOn == null) return; //we do not have something chosen to ping from diff --git a/EduNetworkBuilder/NetworkDevice.cs b/EduNetworkBuilder/NetworkDevice.cs index 8a17806..c2a5fe6 100644 --- a/EduNetworkBuilder/NetworkDevice.cs +++ b/EduNetworkBuilder/NetworkDevice.cs @@ -1840,6 +1840,10 @@ namespace EduNetworkBuilder myNet.addPacket(trPacket); myNet.ResetPacketTimeout(); } + if (tPacket.sourceIP.GetIPString == origStart.GetIPString) + { + myNet.NotePacketArrived(tPacket.MyType, this, tPacket.destIP, tPacket.sourceIP, tPacket.packetID); + } return; } if (tPacket.MyType == PacketType.arp_request) diff --git a/EduNetworkBuilder/Properties/Resources.Designer.cs b/EduNetworkBuilder/Properties/Resources.Designer.cs index 810d982..3f92c8d 100644 --- a/EduNetworkBuilder/Properties/Resources.Designer.cs +++ b/EduNetworkBuilder/Properties/Resources.Designer.cs @@ -163,7 +163,7 @@ namespace EduNetworkBuilder.Properties { /// /// Looks up a localized string similar to {\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;} - ///{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f50\fb [rest of string was truncated]";. + ///{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f40\fb [rest of string was truncated]";. /// internal static string Help { get { @@ -331,6 +331,16 @@ namespace EduNetworkBuilder.Properties { } } + /// + /// Looks up a localized resource of type System.Byte[]. + /// + internal static byte[] Level0_Traceroute { + get { + object obj = ResourceManager.GetObject("Level0_Traceroute", resourceCulture); + return ((byte[])(obj)); + } + } + /// /// Looks up a localized resource of type System.Byte[]. /// diff --git a/EduNetworkBuilder/Properties/Resources.resx b/EduNetworkBuilder/Properties/Resources.resx index 486fa99..f0c8756 100644 --- a/EduNetworkBuilder/Properties/Resources.resx +++ b/EduNetworkBuilder/Properties/Resources.resx @@ -454,6 +454,9 @@ ..\Resources\Level0_Power.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + + ..\Resources\Level0_Traceroute.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 + ..\Resources\Level2_CannotConnect.enbx;System.Byte[], mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089 diff --git a/EduNetworkBuilder/Resources/Help.rtf b/EduNetworkBuilder/Resources/Help.rtf index 5e19da3..1bef89a 100644 --- a/EduNetworkBuilder/Resources/Help.rtf +++ b/EduNetworkBuilder/Resources/Help.rtf @@ -1,18 +1,18 @@ {\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;} -{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f50\fbidi \fmodern\fcharset0\fprq1{\*\panose 020b0609020204030204}Consolas;} +{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f40\fbidi \fmodern\fcharset0\fprq1{\*\panose 00000000000000000000}Consolas;} {\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;} {\fhimajor\f31502\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0302020204030204}Calibri Light;}{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;} {\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;} -{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f357\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} -{\f358\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f360\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f361\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f362\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);} -{\f363\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f364\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f365\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f377\fbidi \fmodern\fcharset238\fprq1 Courier New CE;} -{\f378\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f380\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f381\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f382\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);} -{\f383\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f384\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f385\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f697\fbidi \froman\fcharset238\fprq2 Cambria Math CE;} -{\f698\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f700\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f701\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f704\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;} -{\f705\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f747\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f748\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f750\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;} -{\f751\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f752\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f753\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f754\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;} -{\f755\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f857\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f858\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f860\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;} -{\f861\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f864\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f865\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} +{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f41\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} +{\f42\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f44\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f45\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f46\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);} +{\f47\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f48\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f49\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f61\fbidi \fmodern\fcharset238\fprq1 Courier New CE;} +{\f62\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}{\f64\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f65\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f66\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);} +{\f67\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f68\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f69\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}{\f381\fbidi \froman\fcharset238\fprq2 Cambria Math CE;} +{\f382\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f384\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;}{\f385\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f388\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;} +{\f389\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);}{\f431\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\f432\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}{\f434\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;} +{\f435\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\f436\fbidi \fswiss\fcharset177\fprq2 Calibri (Hebrew);}{\f437\fbidi \fswiss\fcharset178\fprq2 Calibri (Arabic);}{\f438\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;} +{\f439\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\f441\fbidi \fmodern\fcharset238\fprq1 Consolas CE;}{\f442\fbidi \fmodern\fcharset204\fprq1 Consolas Cyr;}{\f444\fbidi \fmodern\fcharset161\fprq1 Consolas Greek;} +{\f445\fbidi \fmodern\fcharset162\fprq1 Consolas Tur;}{\f448\fbidi \fmodern\fcharset186\fprq1 Consolas Baltic;}{\f449\fbidi \fmodern\fcharset163\fprq1 Consolas (Vietnamese);}{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} {\flomajor\f31509\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flomajor\f31511\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\flomajor\f31512\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;} {\flomajor\f31513\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flomajor\f31514\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\flomajor\f31515\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;} {\flomajor\f31516\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbmajor\f31518\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fdbmajor\f31519\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;} @@ -40,10 +40,10 @@ \fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext0 \sqformat \spriority0 Normal;}{\*\cs10 \additive \ssemihidden \sunhideused \spriority1 Default Paragraph Font;}{\* \ts11\tsrowd\trftsWidthB3\trpaddl108\trpaddr108\trpaddfl3\trpaddft3\trpaddfb3\trpaddfr3\trcbpat1\trcfpat1\tblind0\tblindtype3\tsvertalt\tsbrdrt\tsbrdrl\tsbrdrb\tsbrdrr\tsbrdrdgl\tsbrdrdgr\tsbrdrh\tsbrdrv \ql \li0\ri0\sa160\sl259\slmult1 \widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs22\alang1025 \ltrch\fcs0 \fs22\lang1033\langfe1033\loch\f31506\hich\af31506\dbch\af31505\cgrid\langnp1033\langfenp1033 \snext11 \ssemihidden \sunhideused -Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid4603928\rsid5375111\rsid5966121\rsid6042682\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid7216714\rsid7365293\rsid8022092 -\rsid8342082\rsid8995041\rsid10760348\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0\mdispDef1\mlMargin0\mrMargin0\mdefJc1 -\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo3\dy11\hr9\min48}{\version22}{\edmins1552}{\nofpages19}{\nofwords6170}{\nofchars35171}{\nofcharsws41259}{\vern89}} -{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect +Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid2259517\rsid2703488\rsid2891341\rsid3887485\rsid3998963\rsid4603928\rsid5375111\rsid5966121\rsid6042682\rsid6178591\rsid6700708\rsid6970211\rsid7013448\rsid7216714\rsid7365293 +\rsid7810929\rsid8022092\rsid8342082\rsid8995041\rsid10760348\rsid11215494\rsid12656447\rsid12665668\rsid13008245\rsid13053143\rsid14946433\rsid15539794\rsid15880749\rsid15940135\rsid16462501}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0 +\mdispDef1\mlMargin0\mrMargin0\mdefJc1\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\operator tim.young@lightsys.org}{\creatim\yr2017\mo1\dy28\hr20\min53}{\revtim\yr2017\mo3\dy13\hr16\min29}{\version24}{\edmins1559}{\nofpages19}{\nofwords6343} +{\nofchars36160}{\nofcharsws42419}{\vern89}}{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect \widowctrl\ftnbj\aenddoc\trackmoves0\trackformatting1\donotembedsysfont0\relyonvml0\donotembedlingdata1\grfdocevents0\validatexml0\showplaceholdtext0\ignoremixedcontent0\saveinvalidxml0\showxmlerrors0\horzdoc\dghspace120\dgvspace120\dghorigin1701 \dgvorigin1984\dghshow0\dgvshow3\jcompress\viewkind1\viewscale100\rsidroot13008245 \nouicompat \fet0{\*\wgrffmtfilter 2450}\nofeaturethrottle1\ilfomacatclnup0\ltrpar \sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\*\pnseclvl1 \pnucrm\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl2\pnucltr\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl4\pnlcltr\pnstart1\pnindent720\pnhang {\pntxta )}}{\*\pnseclvl5 @@ -66,8 +66,8 @@ Normal Table;}}{\*\rsidtbl \rsid1076115\rsid1774947\rsid1795431\rsid2169499\rsid \par \hich\af39\dbch\af31505\loch\f39 Each network card can have multiple IP addresses. This allows you to have one network wire coming into a computer, but have multiple IP-addresses. \hich\af39\dbch\af31505\loch\f39 This adds a little bit of complexity, to it being a "simple" network simulation tool. But it adds a lot of flexibility, as well as being closer to reality. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Building a network:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict -{\pict{\*\picprop\shplid1046{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict +{\pict{\*\picprop\shplid1075{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 1}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\pngblip\bliptag-1272176549{\*\blipuid b42c205b1dadc3d8e90139fb2240d3fc} @@ -178,7 +178,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 -\f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1045{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}} +\f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1074{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}} {\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 2}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex22\picscaley22\piccropl0\piccropr0\piccropt0\piccropb0\picw4868\pich4868\picwgoal2760\pichgoal2760\pngblip\bliptag-2029053173{\*\blipuid 870f1b0bebebc602ae30d0fca37d41f5} @@ -1069,8 +1069,8 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f 01010101010101010101010100000101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 -010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict -{\pict{\*\picprop\shplid1044{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict +{\pict{\*\picprop\shplid1073{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 3}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex99\picscaley99\piccropl0\piccropr0\piccropt0\piccropb0\picw1067\pich1067\picwgoal605\pichgoal605\pngblip\bliptag1707607077{\*\blipuid 65c80425ca1c5677ea901160569d16b8} @@ -1113,7 +1113,7 @@ df91cffc94e72ac3f51df9cccf78ae325cdf91cfdc1ebb7475ecf33d5cdc1afbe2cbb1afaee0eb6f 11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111 11111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111 111111111110111111111111111111111111111111111111111111111111111111111111111011111111111111111111111111111111111111111111111111111111111111101111111111111111111111111111111111111111111111111111111111111110040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 -\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1043{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1072{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 4}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -1232,7 +1232,7 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \hich\af39\dbch\af31505\loch\f39 Use the\hich\af39\dbch\af31505\loch\f39 item list on the left to choose an item to add to the network. Click on an item to select it. Then click somewhere on the network to place it there. You may put as many of those items on the network as you want before clicking on something else. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1042{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1071{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 5}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -1931,8 +1931,8 @@ tem to the network. If you click on an item that is already on the network, you can drag it and release it to a new location. There is no visual feedback that shows that you are dragging and dropping it. When you release the button, the item will snap to \hich\af39\dbch\af31505\loch\f39 the new location. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Links:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict -{\pict{\*\picprop\shplid1041{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict +{\pict{\*\picprop\shplid1070{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 6}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex20\picscaley20\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag783477962{\*\blipuid 2eb2ecca66199fd25bb0f84018900df1} @@ -2638,8 +2638,8 @@ Delete, edit, ping from, arp from, dhcp request (if the device is configured to \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A packet is information that is sent from one computer to another. In this simulation, you can see the packets flowing between devices. A packet has a source and destination. Each packet looks different from the others. -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict -{\pict{\*\picprop\shplid1040{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict +{\pict{\*\picprop\shplid1069{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 7}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-1822675188{\*\blipuid 935c2f0ce92c8b0cb6c1e465c717d5d2} @@ -3317,7 +3317,7 @@ c400f97f5e00fdece600fabaa7000000000000000000000000000000000000000000000000000000 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The Ping packet goes from one computer to the other. When it gets to the destination, the destination computer sends a ping response that says, "the ping made it." -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1039{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1068{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 8}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -3996,7 +3996,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The ARP packet (see the section on ARP) is used when one computer is looking for the MAC address of the other computer. You usually do not see these packets in this simulation unless you specifically ask a machine to \hich\af39\dbch\af31505\loch\f39 find the arp of another. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1038{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1067{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 9}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -4675,7 +4675,7 @@ b200fa9a8000fdeae400fab9a700fcccc000fdf0ec00fdefea00faac9700fdf4f100fab29f00fdfb 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DHCP packets contain IP address information (See the section on DHCP or DHCP Servers). They are used when a device needs to find its own IP address.\hich\af39\dbch\af31505\loch\f39 A DHCP server will respond with a packet to tell the device what IP address it should use. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1037{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1066{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 10}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -5359,7 +5359,7 @@ db00fbc1b200fa9a8000359fea00339eea00319eea00309dea00fdeae4002e9dea002d9cea002b9b 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A VPN packet is an encrypted packet (see the section on VPNs) that goes between t\hich\af39\dbch\af31505\loch\f39 wo firewalls that are configured for a VPN. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1036{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1065{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 11}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -6098,8 +6098,8 @@ The gateway is a computer on the same subnet as the IP address, where any non-lo e subnet-mask to determine if it is local or not. If the packet is local, it is sent straight out of the network card to the destination computer. If the packet is not local, it is routed to the default gateway, which sends it on towards the final desti \hich\af39\dbch\af31505\loch\f39 n\hich\af39\dbch\af31505\loch\f39 ation. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DHCP: -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict -{\pict{\*\picprop\shplid1035{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict +{\pict{\*\picprop\shplid1064{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 12}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-491375475{\*\blipuid e2b6348d9bf57bfe4a73d613ee6d91e6} @@ -6783,9 +6783,8 @@ to have one assigned to it. DHCP is what happens. Basically the client broadca (See DHCP above) A DHCP server remembers all the clients that request IP addresses so it issues the same IP address if that particular client asks a second time. It also remembers which IP addresses it has given\hich\af39\dbch\af31505\loch\f39 out so it does not give the same IP address to different computers.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par \hich\af39\dbch\af31505\loch\f39 Ping: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1034{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} -{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} -{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid7810929\charrsid1788261 {\*\shppict{\pict{\*\picprop\shplid1054{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}} +{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 13}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag-1822675188{\*\blipuid 935c2f0ce92c8b0cb6c1e465c717d5d2} 89504e470d0a1a0a0000000d49484452000000c8000000c808030000009a865eac000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 @@ -7463,14 +7462,29 @@ c400f97f5e00fdece600fabaa7000000000000000000000000000000000000000000000000000000 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A Ping is a simple packet that is sent from one comput to the other. The computer you send the pin\hich\af39\dbch\af31505\loch\f39 g packet to will usually respond. The word "Ping" comes from the concept of a submarine and sonar. Something does a "Ping" and you hear an echo to tell you that the computer is alive. This is usually what it is used for, to determine if a computer is t -\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 rned on, functional, or to see if the network is properly set up.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 -\par \hich\af39\dbch\af31505\loch\f39 MAC Addresses: +\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 rned on, functional, or to see if the network is properly set up. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 Traceroute: +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 Traceroute is more complex than a ping. It is used to test all the routers along t}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 +\f39\lang9\langfe1033\langnp9\insrsid13053143 \hich\af39\dbch\af31505\loch\f39 he path between two computers. It is particular\hich\af39\dbch\af31505\loch\f39 +ly nice to use when you are checking out a complex network. Instead of pinging every spot along the way, you can use traceroute to automatically test. +\par \hich\af39\dbch\af31505\loch\f39 Traceroute works by }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 send}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13053143 +\hich\af39\dbch\af31505\loch\f39 ing}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929 \hich\af39\dbch\af31505\loch\f39 a special packet with a \loch\af39\dbch\af31505\hich\f39 \'93\hich\af39\dbch\af31505\loch\f39 TTL +\loch\af39\dbch\af31505\hich\f39 \'94\hich\af39\dbch\af31505\loch\f39 (Time to Live). The time to live starts at 1. Each router along the path is supposed to subtract 1\hich\af39\dbch\af31505\loch\f39 + from the TTL, and when the TTL reaches 0, the router that has it responds to tell you it has dropped the packet. Traceroute catches these \hich\af39\dbch\af31505\loch\f39 +error messages and tells you which computer it got it from. Then, traceroute adds 1 to the ttl and sends out anot\hich\af39\dbch\af31505\loch\f39 her packet. +\par \hich\af39\dbch\af31505\loch\f39 +With a TTL of 2, the second router responds. Then the TTL is increased to 3 and it keeps going. Traceroute will continue until it has reached the end, or until the maximum hops has been reached. In the real world, the maximum is usually 30. +\hich\af39\dbch\af31505\loch\f39 In this program, it is much lower than that. +\par \hich\af39\dbch\af31505\loch\f39 The traceroute program exists on most operating systems, but under \hich\af39\dbch\af31505\loch\f39 differen\hich\af39\dbch\af31505\loch\f39 t names. It might be \hich\af39\dbch\af31505\loch\f39 called +\hich\af39\dbch\af31505\loch\f39 tracert, traceroute, or a few other variations.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7810929\charrsid7810929 +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7810929 +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 MAC Addresses: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Each Network Card has a hard-coded "address". These are supposed to be unique to each network card, and look something like: }{\rtlch\fcs1 \af2 \ltrch\fcs0 \f2\insrsid6700708 \hich\af2\dbch\af31505\loch\f2 10:08:b1:73:aa:5b.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packets that are being sent o\hich\af39\dbch\af31505\loch\f39 n the local network use the "Ethernet protocol", which sends the packet from one MAC Address to another. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par \hich\af39\dbch\af31505\loch\f39 ARP: -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict -{\pict{\*\picprop\shplid1033{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict +{\pict{\*\picprop\shplid1063{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 14}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex10\picscaley10\piccropl0\piccropr0\piccropt0\piccropb0\picw4233\pich4233\picwgoal2400\pichgoal2400\pngblip\bliptag1748859600{\*\blipuid 683d7ad04fca3dd8c66ece4cf808f2d2} @@ -8162,10 +8176,10 @@ it gets a response back that says something like, "I have that IP and my MAC add \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A broadcast packet is one that is sent out to everything that is considered local to it. Routers, firewalls, and some other devices do not pass broadcasts on. \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293 \hich\af39\dbch\af31505\loch\f39 Power:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid7365293 -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft0\shptop3\shpright1490\shpbottom387\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz3\shplid1029 -{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv -{\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0\picw3450\pich889\picwgoal1956\pichgoal504\pngblip\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf} -89504e470d0a1a0a0000000d49484452000000a30000002a080200000050b17cc7000000017352474200aece1ce90000109249444154785eed5bd9935c5519ef +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft0\shptop3\shpright1490\shpbottom387\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz3\shplid1029 +{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +{\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0 +\picw3450\pich889\picwgoal1956\pichgoal504\pngblip\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}89504e470d0a1a0a0000000d49484452000000a30000002a080200000050b17cc7000000017352474200aece1ce90000109249444154785eed5bd9935c5519ef bbdfdb7b4ff76c992c246848022498842c24200a460838187789a0a296e583a556f9c083fe0b3ef80082e55202226008b21a212ca99028645f262bd967c8acdd d3cbdd177fe79c9e9e21e999e92422dd95e9ba49f57cf73bdff9ceb7feceb9b7b95c2e179afa5c0516e0af82354e2d915860cad3574b1c4c797acad3578b05ae 96754ee5f4d5e269ee32b037473f0d6aa1807e2650bed15787a5555de0257b9ae77941103c7c7c3f3491c5ea2b127841e6798ee76004df75ddf194839bb1c050 @@ -8232,8 +8246,8 @@ c91650ff9fb639f7643a6e9c3d4d5931bf386fdeb5aeeb547ff3997a1a2f1d3cbbe1d50d1bff59ff 46371309e3fd5a07cfb2608b225eb7d1ab3fc9af4303e1518f2c6baa2a86159f19a2faef56a8a7f1e012efc40de76b7a61e3935f2c79ff4712e578242cab7862 e7d9b56773b9928de7691802fd05ce268f2c1be5839fe3908bb4d5897f6e435e6a26cf11c63d67a8cb15138041d787d5550fe209d41e37a71bf737766cb593fe ccae2e7d59ab52b580ed0b645ddaaf756a55648aaffe2c30d9b3acfad3784aa3cbb3c094a72fcf6e8d376acad38de7b3cbd378cad39767b7c61b35e5e9c6f3d9e569fc5f26ff178811746d230000000049454e44ae426082} -}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 26}}{\sp{\sn dhgt}{\sv 251659264}} -{\sp{\sn fLayoutInCell}{\sv 1}}{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard +}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}}{\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 26}}{\sp{\sn dhgt}{\sv 251659264}}{\sp{\sn fLayoutInCell}{\sv 1}} +{\sp{\sn fAllowOverlap}{\sv 1}}{\sp{\sn fBehindDocument}{\sv 1}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}}{\shprslt\par\pard \ql \li0\ri0\widctlpar\pvpara\posy2\dxfrtext180\dfrmtxtx180\dfrmtxty0\wraparound\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 {\pict\picscalex76\picscaley76\piccropl0\piccropr0\piccropt0\piccropb0 \picw3450\pich889\picwgoal1956\pichgoal504\wmetafile8\bliptag1069067716{\*\blipuid 3fb8adc468f9e25b3b53f904bafffcaf}010009000003a628000000007d28000000000400000003010800050000000b0200000000050000000c022b00a400030000001e00040000000701040004000000 070104007d280000410b2000cc002a00a300000000002a00a3000000000028000000a30000002a0000000100180000000000b850000000000000000000000000 @@ -8561,38 +8575,38 @@ f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7 f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7f7000000040000002701ffff030000000000}\par}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293\charrsid7365293 \hich\af39\dbch\af31505\loch\f39 Some}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid7365293 \hich\af39\dbch\af31505\loch\f39 - devices (networking devices like switches, hubs, routers, etc.) can have their power turned on and off. This does not necessarily fix problems. But, if the power is off, that device cannot do it\hich\f39 \rquote \loch\f39 -s task. Luckily for you, the device does look like it is\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 off, when it is powered off. Look for the lights. If the lights are all dark, the device might be powered off. + devices (networking devices like switches, hubs, routers, etc.) can have their power turned on and off. This does not necessarily fix problems. But, if the power is off, that device cannot do it\hich\f39 \rquote \loch\f39 s task. Lu +\hich\af39\dbch\af31505\loch\f39 ckily for you, the device does look like it is off, when it is powered off. Look for the lights. If the lights are all dark, the device might be powered off. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid4603928\charrsid7365293 \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Static Routes: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A static route has a network, a subnet mask, and a gateway. The gateway must be local to the computer that is sending out the -\hich\af39\dbch\af31505\loch\f39 -packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, firewalls, and computers how to send packets when the IP addresses and gateways are not obvious. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A static route has a network, a subnet mask, and a gateway. The gateway must b\hich\af39\dbch\af31505\loch\f39 +e local to the computer that is sending out the packet, otherwise the computer cannot figure out how to send the packet. Static routes are used primarily for telling routers, firewalls, and computers how to send packets when the IP addresses and gateways +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 are not obvious. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Comparing IP addresses: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 When a \hich\af39\dbch\af31505\loch\f39 -computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our face; masking tape covers a wall to keep it from being painted on. A subnet mask hides the subnet. For example, an IP addre -\hich\af39\dbch\af31505\loch\f39 s\hich\af39\dbch\af31505\loch\f39 s of 192.168.0.50 and netmask of 255.255.255.0 looks like: +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +When a computer wants to compare IP Addresses, it does it by using the subnet mask. A mask hides something. A Halloween mask hides our face; masking tape covers a wall to keep it from being painted on. A subnet m\hich\af39\dbch\af31505\loch\f39 +ask hides the subnet. For example, an IP address of 192.168.0.50 and netmask of 255.255.255.0 looks like: \par }\pard \ltrpar\ql \li0\ri0\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39\afs24 \ltrch\fcs0 \f39\fs24\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 IP: \par \hich\af39\dbch\af31505\loch\f39 11000000.10101000.00000000.00110010 \par \hich\af39\dbch\af31505\loch\f39 Mask: \par \hich\af39\dbch\af31505\loch\f39 11111111.11111111.11111111.00000000 \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -The mask has 24 ones in a row. So it could also be represented as /24. When it is compared, the first thing that \hich\af39\dbch\af31505\loch\f39 -happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dropped. The resulting number is: 192.168.0.0. This is called the "Network Address." We do the same thing for both the source -\hich\af39\dbch\af31505\loch\f39 a\hich\af39\dbch\af31505\loch\f39 -nd destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are considered to be on the same network. If they do not have the same network address, they are considered to be on different netw -\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 rks. +The mask has 24 ones in a row. So it could also be represented as \hich\af39\dbch\af31505\loch\f39 +/24. When it is compared, the first thing that happens is the subnet is masked out. In the mask, the final set of numbers are zeroes. The numbers where the mask is a 0 is dropped. The resulting number is: 192.168.0.0. This is called the "Network Addr +\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 +ss." We do the same thing for both the source and destination IP. Then we compare the Network Address of both of them. If they have the same network address, then they are considered to be on the same network. If they do not have the same network addr +\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 ss, they are considered to be on different networks. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 VPNs: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, usually across the Internet. It is usually used in the context of either someone working from home and wanting to access printe -\hich\af39\dbch\af31505\loch\f39 rs or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc). -\par \hich\af39\dbch\af31505\loch\f39 A VPN has an IP address, which is defined like any other IP address. That IP-Address should be on a subnet that is unique to\hich\af39\dbch\af31505\loch\f39 - the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that has the other end of the VPN. -\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encryption key is supposed to be hard to guess, and it \hich\af39\dbch\af31505\loch\f39 is must be the same at both ends of the VPN. The key is case-sensitive. +A VPN stands for a "Virtual Private Network." It is used to make a secure connection between computers or networks, usually across the Internet. It is usually used in the context of either someon\hich\af39\dbch\af31505\loch\f39 +e working from home and wanting to access printers or file-shares off the office network. Or, two different networks wish to be connected (two offices in different states, etc). +\par \hich\af39\dbch\af31505\loch\f39 A VPN has an IP address, which is defined like any other IP address. That IP\hich\af39\dbch\af31505\loch\f39 +-Address should be on a subnet that is unique to the VPN (such as 192.168.50.1). The VPN also has a VPN endpoint. The endpoint is the external IP address of the firewall that has the other end of the VPN. +\par \hich\af39\dbch\af31505\loch\f39 The VPN also has an encryption key. This encrypt\hich\af39\dbch\af31505\loch\f39 ion key is supposed to be hard to guess, and it is must be the same at both ends of the VPN. The key is case-sensitive. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 DEVICES: \par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Hubs: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1032{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1062{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 15}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -9268,7 +9282,7 @@ ee00beb6b4001fd94600766561004b352f00eceaea00b1a7a50074635e0048322c00e7e4e400aca2 \rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Switches: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1031{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1061{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 16}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -9319,7 +9333,7 @@ estination, the switch needs to figure out where that destination is. So the fi tches in this simulation have some features of a "managed switch", in that they pretend they have spanning tree turned on. Spanning tree helps if you have a network loop (see the network loop puzzles for an example of what happens.) Spanning-tree finds \hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 he quickest path through a series of switches from source to destination, ignoring the other paths.}{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \par \hich\af39\dbch\af31505\loch\f39 Routers:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1030{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1060{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 17}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -10019,11 +10033,12 @@ f800e3dfde00beb6b4008d7f7b00543f3a003f272100faf9f900ddd8d700a79c9a00f4f3f200c6bf 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\hich\af39\dbch\af31505\loch\f39 A router is a network device that recieves a packet and sends it onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set ba -\hich\af39\dbch\af31505\loch\f39 sed on the interfaces configured on the device. Anything that is considered "local" has a basic route defined for it. +\hich\af39\dbch\af31505\loch\f39 A router is a network device that recieves a packet and sends it \hich\af39\dbch\af31505\loch\f39 +onward to the next destination. You may need to configure the routes on the router (see the topic on Static Routes). It will have some basic routes set based on the interfaces configured on the device. Anything that is considered "local" has a basic ro +\hich\af39\dbch\af31505\loch\f39 u\hich\af39\dbch\af31505\loch\f39 te defined for it. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Firewall: -\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict -{\pict{\*\picprop\shplid1029{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} +\par }\pard \ltrpar\ql \li0\ri0\sa200\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict +{\pict{\*\picprop\shplid1059{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 18}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} \picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\pngblip\bliptag-1272176549{\*\blipuid b42c205b1dadc3d8e90139fb2240d3fc} @@ -10134,14 +10149,13 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff040000002701ffff030000000000}}}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as router\hich\af39\dbch\af31505\loch\f39 -s, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming into the firewall that is destined for inside the firewall is blocked. In a real firewall, you would have the option to do port-forwarding, which would allow -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 -incoming traffic to go to a particular destination. We do not have any way to communicate between devices except "ping", which we usually do not port-forward for. So this simulation does not do port-forwarding. -\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The firewall can also do VPNs (see the help -\hich\af39\dbch\af31505\loch\f39 topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices behind another firewall. +\hich\af39\dbch\af31505\loch\f39 A firewall has some ports that work as routers, but it can also have WAN ports. A WAN port does not allow incoming packets. Anything coming int\hich\af39\dbch\af31505\loch\f39 +o the firewall that is destined for inside the firewall is blocked. In a real firewall, you would have the option to do port-forwarding, which would allow incoming traffic to go to a particular destination. We do not have any way to communicate between +\hich\af39\dbch\af31505\loch\f39 d\hich\af39\dbch\af31505\loch\f39 evices except "ping", which we usually do not port-forward for. So this simulation does not do port-forwarding. +\par }\pard \ltrpar\ql \li0\ri0\sa200\sl276\slmult1\widctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +The firewall can also do VPNs (see the help topic on VPNs for more information). The VPN allows devices behind one firewall to talk to devices\hich\af39\dbch\af31505\loch\f39 behind another firewall. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Router: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1028{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1058{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 19}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -10181,11 +10195,11 @@ f28b7e30bb0431d8375d59733e3f21de6bb5c57bd40c0bbab52cd857b2e0886621bf9c051561c1b0 }{\nonshppict{\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag1579083670\blipupi95{\*\blipuid 5e1ee7967f7d0b879bc48aaf9c27415c} 0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000 -0000001ef32e022222220000000001ffffff0000000003ffffff8000000001ff7fff40ff574003ffffffe0ff574001ffffffc03f000003ffffffc000000001ff -ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fff7fc000000000ffffffe0000000007fffffc0000000002bfbaa800000000000 -d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000 -34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000 +0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000 +000000000000022222220041494c01ffffff0000000003ffffff8000000001ff7fff4000000003ffffffe0143d6f01ffffffc000000003ffffffc00080ca01ff +ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fff7fc000400000ffffffe0000000007fffffc0143d6f002bfbaa80ffffff0000 +d500000000000000ff000000803f0000fd00000000000000fa000000000000005700000000000000fe000000000000005e000000000000006e00000000000000 +34000000000000003e000000000000003c000000000000003c0000000000000014000041494c000038000000803f000018000000000000001800000000000000 10000000000000003800000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000 280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff @@ -10262,9 +10276,9 @@ ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}} -{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless router is the most\hich\af39\dbch\af31505\loch\f39 - complex device on the network. It functions as a firewall, as a switch (on the wired side) and as a hub (on the wireless side). It has VPN capability and can serve DHCP. -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1027{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless router is the most complex device on the network. It functions as a firewall, as a switch (on the wired side) and as +\hich\af39\dbch\af31505\loch\f39 a hub (on the wireless side). It has VPN capability and can serve DHCP. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1057{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 20}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -10295,11 +10309,11 @@ a7b484ca5088dddc7d45584cb8c41acdb372a6a1ab6ddc05d8433599d30637ac5e17034310f42df8 {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag63258229\blipupi95{\*\blipuid 03c53e75d46f94b9f265aed8df7b2335} 0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000018000007d3110000 -1000001ef32e000238e000000000000774c000000000000fffe0000000000006574000ff57400003bfc000ff5740000719c0003f00000003bd80000000000003 -3580007b690d0003ff80000000000001df80000000000003fb800020260000011100000000000001ff00000000000001df00000000000000ff00000000000000 -7700000000000000fa000000000000005e00000000000000fe000000000000007c000000000000007e000000000000005c00002e690d00003c000067c80f0000 -3c0000000000000038000000000000001c000000000000003800000000000000100000000000000038000000000000001c000000000000003800000000000000 +0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000001800000000000000 +100000000000000238e00041494c000774c000000000000fffe00000000000065740000000000003bfc000143d6f000719c0000000000003bd80000080ca0003 +35800000004b0003ff8000ffffff0001df800041494c0003fb800000c0ff00011100000040000001ff00000000000001df0000143d6f0000ff0000ffffff0000 +7700000000000000fa000000803f00005e00000000000000fe000000000000007c000000000000007e000000000000005c000000000000003c00000000000000 +3c0000000000000038000000000000001c00000000000000380000000000000010000041494c000038000000803f00001c000000000000003800000000000000 00000000000000000000000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000 280000000100080000000000000000000000000000000000000000000000000000000000ffffff00f3a28b002b2b2b0010101000ddb8ad006231230051515100 984c3600f6977d00432017002d1b1500341912002f161000f4f4f400d789770087423100803f2e007d4334006a3124005f2f220043322f00602e2300190b0800 @@ -10342,11 +10356,11 @@ bfc0c10101010101010101010101010101010101010101010101010101b2b3b401b5b6b701b80101 01010100000301010101010101010101010101010101010101010101010101010101010101010101010102030401010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101 0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}} -{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 W\hich\af39\dbch\af31505\loch\f39 ireless Access Point: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -The WAP (Wireless Access Point) is a simple device, which allows you to plug one Ethernet port into a wire, and attach multiple wireless devices to it. Read up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39 -\ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1026{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Access Point: +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The WAP (Wireless Access Point) is a simple device, which allows you to plug o\hich\af39\dbch\af31505\loch\f39 +ne Ethernet port into a wire, and attach multiple wireless devices to it. Read up on General Wireless for more information on how to configure it. }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 +\hich\af39\dbch\af31505\loch\f39 +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1056{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 21}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -10380,11 +10394,11 @@ de4135480dd9de47197821ffab13f0b0cd927be1819bce11e3a15b50ccc6717e01070fdf944e0de0 {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag-1837271951\blipupi95{\*\blipuid 927d7471fcd0e3d1418850009d192cea} 0100090000033f06000000004105000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000 -0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff -ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000002bffaa800000000000 -d500000000000000ff00000000000000fd00000000000000fa000000000000005700000000000000fe000000000000005e00002e690d00006e000067c80f0000 -34000000000000003e000000000000003c000000000000003c000000000000001400000000000000380000000000000018000000000000001800000000000000 +0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000 +000000000000022222220041494c01fffffe0000000003ffffff8000000001ffffff0000000003ffffff80143d6f01ffffffc000000003ffffffc00080ca01ff +ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fffffc000400000ffffffe0000000007fffffc0143d6f002bffaa80ffffff0000 +d500000000000000ff000000803f0000fd00000000000000fa000000000000005700000000000000fe000000000000005e000000000000006e00000000000000 +34000000000000003e000000000000003c000000000000003c0000000000000014000041494c000038000000803f000018000000000000001800000000000000 10000000000000003800000000000000000000000000000000000000000041050000410bc6008800280028000000000032003200000000002800000028000000 280000000100080000000000000000000000000000000000000000000000000000000000ffffff00feeeee00371b1300c5968d00c67762004b312d00b1563f00 542b1f00fccabe005d2c2100af563e000d06040041252100c3705a006a5f5e009b847e003d37360080514500321d180089716900915e4e008d4836002b141000 @@ -10428,10 +10442,10 @@ d06ad0cc6acdd06acdcbcfcdd1d2c96ad3d40101010101010101010101014ab6b76ab8b9babbbcbd 01010101010101010101010101010101010101040101010101010101010101010101010101010101010101010101010101010101010101010101020300010101 0101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010800000026060f000600544e50500701040000002701ffff030000000000}}} {\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Bridge: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wireless client connec\hich\af39\dbch\af31505\loch\f39 -tion, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of a wireless link, and allows you to attach multiple wired devices. The Wireless Bridge is also call -\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 d Wireless Client Mode (when referring to wireless devices.) -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid6042682\charrsid6042682 {\*\shppict{\pict{\*\picprop\shplid1025{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +A Wireless Bridge is the opposite end of a Wireless Access Point. It has one wireless client connection, to connect to something that serves a wireless signal, and a built in Ethernet switch to connect to the wired connections. It goes at the far end of +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 a wireless link, and allows you to attach multiple wired devices. The Wireless Bridge is also called Wireless Client Mode (when referring to wireless devices.) +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang1024\langfe1024\noproof\insrsid2259517\charrsid2259517 {\*\shppict{\pict{\*\picprop\shplid1055{\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}} {\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pictureGray}{\sv 0}}{\sp{\sn pictureBiLevel}{\sv 0}}{\sp{\sn fFilled}{\sv 0}} {\sp{\sn fNoFillHitTest}{\sv 0}}{\sp{\sn fLine}{\sv 0}}{\sp{\sn wzName}{\sv Picture 22}}{\sp{\sn wzDescription}{\sv Image}}{\sp{\sn dhgt}{\sv 251658240}}{\sp{\sn fHidden}{\sv 0}}{\sp{\sn fLayoutInCell}{\sv 1}}} @@ -10469,11 +10483,11 @@ fb970bbcdfc1741b719a247b0991bf143f59624df88b34e1b7ae56fe8e02d96fc5286432993f1a72 {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0\picw1058\pich1058\picwgoal600\pichgoal600\wmetafile8\bliptag991145542\blipupi95{\*\blipuid 3b13ae462c7cca9c1834cac9a3ab36d8} 0100090000037f0a000000008109000000000400000003010800050000000b0200000000050000000c0233003300030000001e00040000000701040004000000 070104000800000026060f000600544e50500601c5000000410b8600ee0028002800000000003200320000000000280000002800000028000000010001000000 -0000000000000000000000000000000000000000000000000000ffffff00000000000080c80f00000000000000000000000000000000000000000007d3110000 -0000001ef32e022222220000000001fffffe0000000003ffffff8000000001ffffff00ff574003ffffff80ff574001ffffffc03f000003ffffffc000000001ff -ffffc07b690d03ffffffe000000001ffffffc000000001ffffffe0202600007fffffc000000000ffffffe0000000007fffffc0000000007eebfe800000000024 -413600000000003f81be00000000003d815c00000000003f80fe000000000015003400000000003f80fc00000000001f00dc002e690d001f80fc0067c80f0017 -005000000000000f007800000000000d005800000000000e0078000000000006007000000000000e0038000000000004003000000000000e0030000000000006 +0000000000000000000000000000000000000000000000000000ffffff00000000000024570e000000000000c0ff000000000000400000000000000000000000 +000000000000022222220041494c01fffffe0000000003ffffff8000000001ffffff0000000003ffffff80143d6f01ffffffc000000003ffffffc00080ca01ff +ffffc000004b03ffffffe0ffffff01ffffffc041494c01ffffffe000c0ff007fffffc000400000ffffffe0000000007fffffc0143d6f007eebfe80ffffff0024 +413600000000003f81be0000803f003d815c00000000003f80fe000000000015003400000000003f80fc00000000001f00dc00000000001f80fc000000000017 +005000000000000f007800000000000d005800000000000e007800000000000600700041494c000e00380000803f0004003000000000000e0030000000000006 00300000000000020020000000000000000000000000000000000000000081090000410bc6008800280028000000000032003200000000002800000028000000 280000000100180000000000c012000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff @@ -10550,72 +10564,74 @@ ffffffffffff8c6352ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0800000026060f000600544e50500701040000002701ffff030000000000}}} -{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Repeater: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless has a limited distance it can travel, but sometimes you would prefer to stretch the w\hich\af39\dbch\af31505\loch\f39 -ireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allows you to attach other wireless clients to it. When you are rolling out wireless in a building, it -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 -is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data it can transport. Adding a repeater does extend the distance and increases the number of devices t -\hich\af39\dbch\af31505\loch\f39 h\hich\af39\dbch\af31505\loch\f39 at works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much more bandwidth used. -\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packet Corruption: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There are a number of things that can cause packets not to su\hich\af39\dbch\af31505\loch\f39 -ccessfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets drop but some get through. With Internet packets, this is often due to using too much bandwidth. But -\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does not have error counts.) -\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though sometimes they will \hich\af39\dbch\af31505\loch\f39 only corrupt packets when you have enough traffic. -\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the cables will bleed over into the network wires, which can cause a lot of packets to drop on that link. -\par \hich\af39\dbch\af31505\loch\f39 Network wires running too close to fluorescent lights can also get corrupted. Again, it is the pulsing of the electricity that can cause bleed-over into network cables. -\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 General Wireless: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 A wireless connection uses an antenna in both the client and server\hich\af39\dbch\af31505\loch\f39 - to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match. -\par \hich\af39\dbch\af31505\loch\f39 Wireless works the way a hub works instead of working like a switch. A switch figures out which wire a par\hich\af39\dbch\af31505\loch\f39 -ticular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the different computers. Instead, it broadcasts out the signal on the radio channel, and all the individua -\hich\af39\dbch\af31505\loch\f39 l\hich\af39\dbch\af31505\loch\f39 computers listen to the packet to determine if it is for them. -\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices connected to the network. For example, if you have a 54 MBps wireless G device with 10 devices connec -\hich\af39\dbch\af31505\loch\f39 ted to it, each device gets roughly 5.4 MBps. -\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of 10 devices on the one wireless, you now have 20. That divides up the signal farther, breaking up t -\hich\af39\dbch\af31505\loch\f39 he 54 MBps to 2.7 MBps per person. -\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure the device. There is some overhead in encrypting and decrypting the packet, particularly since the +{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Repe\hich\af39\dbch\af31505\loch\f39 ater: +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +Wireless has a limited distance it can travel, but sometimes you would prefer to stretch the wireless out farther. A wireless repeater has a wireless client connection, which connects it to a wireless server, and it has a wireless server, which allo \hich\af39\dbch\af31505\loch\f39 -access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soho) equipment for their wireless networks until they realize the amount of pain those can impose on a +ws you to attach other wireless clients to it. When you are rolling out wireless in a building, it is important to realize that wireless repeaters are usually a bad idea. Each wireless access point usually has a maximum capability for the amount of data \hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 -larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bulk. Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and better quality. - -\par \hich\af39\dbch\af31505\loch\f39 -Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireless device can only function on one channel at a time. What this usually means is that, if one wirel -\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 -ss G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas allow you to be running one network on N while the other runs on G. +it can transport. Adding a repeater does extend the distance and increases the number of devices that works on the one wireless antenna. Everything sent from the repeater gets sent up to the parent antenna, which means the parent antenna has that much m +\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 re bandwidth used. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Packet Corruption: +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +There are a number of things that can cause packets not to successfully get from one side of the network to the other. Even if your routing is fine, you may have problems with packet corruption where some packets dro\hich\af39\dbch\af31505\loch\f39 +p but some get through. With Internet packets, this is often due to using too much bandwidth. But if it is on your own network, you should check your managed switches to see if you have a lot of errors on the links in question. (This simulation does no +\hich\af39\dbch\af31505\loch\f39 t\hich\af39\dbch\af31505\loch\f39 have error counts.) +\par \hich\af39\dbch\af31505\loch\f39 Bad wires will usually stop a packet in its tracks, though sometimes they will only corrupt packets when you have enough traffic. +\par \hich\af39\dbch\af31505\loch\f39 If a network wire runs too close to electrical cables for too long, the electricity going through the c\hich\af39\dbch\af31505\loch\f39 +ables will bleed over into the network wires, which can cause a lot of packets to drop on that link. +\par \hich\af39\dbch\af31505\loch\f39 Network wires running too close to fluorescent lights can also get corrupted. Again, it is the pulsing of the electricity that can cause bleed-over into n\hich\af39\dbch\af31505\loch\f39 etwork cables. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 General Wireless: +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +A wireless connection uses an antenna in both the client and server to connect the two using a radio signal. To secure the connection, it uses a name (the SSID) and a password (the wireless key) which much match. +\par \hich\af39\dbch\af31505\loch\f39 Wireles\hich\af39\dbch\af31505\loch\f39 +s works the way a hub works instead of working like a switch. A switch figures out which wire a particular computer is attached to, and it sends the packet only to that one computer. A wireless device does not have individual wires connecting to the dif +\hich\af39\dbch\af31505\loch\f39 f\hich\af39\dbch\af31505\loch\f39 erent computers. Instead, it broadcasts out the signal on the radio channel, and all the individual computers listen to the packet to determine if it is for them. +\par \hich\af39\dbch\af31505\loch\f39 The problem with this, is that it affectively divides up the bandwith between the devices co\hich\af39\dbch\af31505\loch\f39 +nnected to the network. For example, if you have a 54 MBps wireless G device with 10 devices connected to it, each device gets roughly 5.4 MBps. +\par \hich\af39\dbch\af31505\loch\f39 A wireless repeater extends the wireless signal, but it mainly adds more people to one antenna. So instead of\hich\af39\dbch\af31505\loch\f39 + 10 devices on the one wireless, you now have 20. That divides up the signal farther, breaking up the 54 MBps to 2.7 MBps per person. +\par \hich\af39\dbch\af31505\loch\f39 Wireless adds latency to each link. Some of that is due to the fact that most wireless devices use encryption to secure \hich\af39\dbch\af31505\loch\f39 +the device. There is some overhead in encrypting and decrypting the packet, particularly since the access-point has a pretty wimpy CPU. The amount of latency depends a lot on the quality of the wireless equipment. Many people use small home/office (soh +\hich\af39\dbch\af31505\loch\f39 o\hich\af39\dbch\af31505\loch\f39 +) equipment for their wireless networks until they realize the amount of pain those can impose on a larger network. Better, big name-brand equipment (HP, Cisco, etc) makes a huge difference in the amount of latency, as well as being able to manage in bul +\hich\af39\dbch\af31505\loch\f39 k\hich\af39\dbch\af31505\loch\f39 . Intermediate equipment (like Ubiquiti) has a pretty good mix of good price and better quality. +\par \hich\af39\dbch\af31505\loch\f39 Many devices have MIMO (Multiple Input, Multiple Output) antennas. This usually allows you to work on two channels simultaneously. Without MIMO, a wireles\hich\af39\dbch\af31505\loch\f39 +s device can only function on one channel at a time. What this usually means is that, if one wireless G device connects to a wireless N (150 MBps) access point, everything on that access point switches to the lower speed of wireless G. The MIMO antennas +\hich\af39\dbch\af31505\loch\f39 \hich\af39\dbch\af31505\loch\f39 allow you to be running one network on N while the other runs on G. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless SSID: \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless SSID\hich\af39\dbch\af31505\loch\f39 (Service Set Identifier) is basically the name of the wireless connection. Advanced devices can have multiple SSIDs on one access-point (this simulator does not allow for that). The SSID is usually public information which is broadcast out from the dev \hich\af39\dbch\af31505\loch\f39 i\hich\af39\dbch\af31505\loch\f39 ce. You need to specify the key when you connect to make sure you have permission to access the network. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Wireless Key: -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless Key is a password for accessing the particular SSID that the key is associated with. The key is used in -\hich\af39\dbch\af31505\loch\f39 encrypting packets between the device and the wireless Access-point. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 The wireless Key is a password for accessing the particular SSID that the key is associated with. The key is used in encrypting packets +\hich\af39\dbch\af31505\loch\f39 between the device and the wireless Access-point. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 ADVANCED TOPICS:}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Subnetting: }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 (Based heavily off of LordFlasheart's post, "Subnetting Made Easy" here: }{\field{\*\fldinst {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 -HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html\hich\af39\dbch\af31505\loch\f39 }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield +HYPERLINK http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid13008245 {\*\datafield 00d0c9ea79f9bace118c8200aa004ba90b0200000003000000e0c9ea79f9bace118c8200aa004ba90bae00000068007400740070003a002f002f007700770077002e0074006500630068006500780061006d0073002e006e00650074002f0066006f00720075006d0073002f00630063006e0061002d006300630065006e00 -74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a0200}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0 +74002f00330038003700370032002d007300750062006e0065007400740069006e0067002d006d006100640065002d0065006100730079002e00680074006d006c000000795881f43b1d7f48af2c825dc485276300000000a5ab000302880000009a020000}}}{\fldrslt {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of\hich\af39\dbch\af31505\loch\f39 32 bits, split into 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host. +\par \hich\af39\dbch\af31505\loch\f39 An IP address is made up of 32 bits, split in\hich\af39\dbch\af31505\loch\f39 to 4 octets (octet = 8 bits). Some bits are reserved for identifying the network and the other bits are left to identify the host. \par \hich\af39\dbch\af31505\loch\f39 Below shows you how, for each class, the address is split in terms of network (N) and host (H) portions. -\par }{\rtlch\fcs1 \af50 \ltrch\fcs0 \f50\lang9\langfe1033\langnp9\insrsid6700708 \hich\af50\dbch\af31505\loch\f50 NN\hich\af50\dbch\af31505\loch\f50 NNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH /8 -\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16 -\par \hich\af50\dbch\af31505\loch\f50 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24 -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember. Th -\hich\af39\dbch\af31505\loch\f39 e first move in doing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32. -\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) or in dotted decimal (255.2\hich\af39\dbch\af31505\loch\f39 55.255.0). The first thing to do is to determine the block size: how big the subnet is. +\par }{\rtlch\fcs1 \af40 \ltrch\fcs0 \f40\lang9\langfe1033\langnp9\insrsid6700708 \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.HHHHHHHH.HH\hich\af40\dbch\af31505\loch\f40 HHHHHH.HHHHHHHH /8 +\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH /16 +\par \hich\af40\dbch\af31505\loch\f40 NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH /24 +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 +There is a boundary at each dot, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember. The first move in do\hich\af39\dbch\af31505\loch\f39 +ing any work with subnets is to figure out which boundary segment you are working within. So you will need to remember the 8, 16, 24, 32. +\par \hich\af39\dbch\af31505\loch\f39 We will either be working with the netmask given in CIDR notation (/24) or in dotted decimal (255.255.255.0). The fi\hich\af39\dbch\af31505\loch\f39 rst thing to do is to determine the block size: how big the subnet is. -\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next boundary up is /24. We the\hich\af39\dbch\af31505\loch\f39 -n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the first number is lost to the "n -\hich\af39\dbch\af31505\loch\f39 e\hich\af39\dbch\af31505\loch\f39 twork address" and the last number is the "broadcast address". -\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 256. For example, if you are -\hich\af39\dbch\af31505\loch\f39 - doing 255.255.255.240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense. -\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet doe\hich\af39\dbch\af31505\loch\f39 s 192.168.12.37/29 belong to? +\par \hich\af39\dbch\af31505\loch\f39 With CIDR (/24) we do this by first finding the nearest boundary higher than our number. For example, we are using a /20 subnet. The next boundary up is /24. We then subtract our sub\hich\af39\dbch\af31505\loch\f39 +net from the boundary. 24 - 20 = 3. There are three bits that make up the size of the subnet. the number of numbers in 3 bits = 2 ^ 3 (two to the power of 3, or 2 * 2 * 2), which is 8. Remember that the first number is lost to the "network address" an +\hich\af39\dbch\af31505\loch\f39 d\hich\af39\dbch\af31505\loch\f39 the last number is the "broadcast address". +\par \hich\af39\dbch\af31505\loch\f39 It is very simple to determine the block size when using the dotted decimal (255.255.255.0) format. You find the last number that is not 255, and subtract it from 256. For example, if you are doing 255.255.255 +\hich\af39\dbch\af31505\loch\f39 .240, the last number is 240. 256 - 240 = 16. So the block size is 16. But, what do we do with the block size? Well, the easiest thing to do is to look at a number of examples, and it should make more sense. +\par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 192.168.12.37/29\hich\af39\dbch\af31505\loch\f39 belong to? \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 You may wonder where to begin. We always start with determining which boundary we are working with for this address. -\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e.\hich\af39\dbch\af31505\loch\f39 2 to the power of 3 equals 8. +\par \hich\af39\dbch\af31505\loch\f39 Our mask is a /29. The next boundary up is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e. 2 to the power of\hich\af39\dbch\af31505\loch\f39 3 equals 8. \par \hich\af39\dbch\af31505\loch\f39 We have borrowed from the last octet as the 29th bit is in the last octet. We start from zero and count up in our block size. Therefore it follows that the subnets are:- \par \par \hich\af39\dbch\af31505\loch\f39 192.168.12.0 @@ -10623,12 +10639,12 @@ n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits tha \par \hich\af39\dbch\af31505\loch\f39 192.168.12.16 \par \hich\af39\dbch\af31505\loch\f39 192.168.12.24 \par \hich\af39\dbch\af31505\loch\f39 192.168.12.32 -\par \hich\af39\dbch\af31505\loch\f39 192.168.12.40 +\par \hich\af39\dbch\af31505\loch\f39 192\hich\af39\dbch\af31505\loch\f39 .168.12.40 \par \hich\af39\dbch\af31505\loch\f39 .............etc. \par \hich\af39\dbch\af31505\loch\f39 Our address is 192.168.12.37 so it must sit on the 192.168.12.32 subnet. \par \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 172.16.116.4/19 sit on? -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is /19 and our next boundary is 24. Therefore 24\hich\af39\dbch\af31505\loch\f39 - 19 = 5. The block size is 2^5 = 32. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is /19 and our next boundary is 24. Therefore 24 - 19 = 5. The block size is 2^5 = 32. \par \hich\af39\dbch\af31505\loch\f39 We have borrowed into the third octet as bit 19 is in the third octet so we count up our block size in that octet. The subnets are:- \par \hich\af39\dbch\af31505\loch\f39 172.16.0.0 \par \hich\af39\dbch\af31505\loch\f39 172.16.32.0 @@ -10636,21 +10652,21 @@ n subtract our subnet from the boundary. 24 - 20 = 3. There are three bits tha \par \hich\af39\dbch\af31505\loch\f39 172.16.96.0 \par \hich\af39\dbch\af31505\loch\f39 172.16.128.0 \par \hich\af39\dbch\af31505\loch\f39 172.16.160.0 -\par ...........\hich\af39\dbch\af31505\loch\f39 ..etc. -\par \hich\af39\dbch\af31505\loch\f39 Our address is 172.16.116.4 so it must sit on the 172.16.96.0 subnet. Easy eh? +\par \hich\af39\dbch\af31505\loch\f39 .............etc. +\par \hich\af39\dbch\af31505\loch\f39 Our address is 172.16.116.4 so i\hich\af39\dbch\af31505\loch\f39 t must sit on the 172.16.96.0 subnet. Easy eh? \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What subnet does 10.34.67.234/12 sit on? \par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Our mask is 12. Our next boundary is 16. Therefore 16 - 12 = 4. 2^4 = 16 which gives us our block size. -\par \hich\af39\dbch\af31505\loch\f39 We have borrowe\hich\af39\dbch\af31505\loch\f39 d from the second octet as bit 12 sits in the second octet so we count up the block size in that octet. The subnets are:- +\par \hich\af39\dbch\af31505\loch\f39 We have borrowed from the second octet as bit 12 sits \hich\af39\dbch\af31505\loch\f39 in the second octet so we count up the block size in that octet. The subnets are:- \par \hich\af39\dbch\af31505\loch\f39 10.0.0.0 \par \hich\af39\dbch\af31505\loch\f39 10.16.0.0 \par \hich\af39\dbch\af31505\loch\f39 10.32.0.0 \par \hich\af39\dbch\af31505\loch\f39 10.48.0.0 \par \hich\af39\dbch\af31505\loch\f39 .............etc. \par \hich\af39\dbch\af31505\loch\f39 Our address is 10.34.67.234 which must sit on the 10.32.0.0 subnet. -\par \hich\af39\dbch\af31505\loch\f39 Hopefully\hich\af39\dbch\af31505\loch\f39 the penny is starting make sense. We will now change the type of question so that we have to give a particular host range of a subnet. +\par \hich\af39\dbch\af31505\loch\f39 Hopefully the penny is starting make sense. We w\hich\af39\dbch\af31505\loch\f39 ill now change the type of question so that we have to give a particular host range of a subnet. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Question: What is the valid host range of the 4th subnet of 192.168.10.0/28? -\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 16 since 32 \hich\af39\dbch\af31505\loch\f39 -- 28 = 4 and 2^4 = 16. We need to count up in the block size in the last octet as bit 28 is in the last octet. +\par }{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 Easy as pie! The block size is 16 since 32 - 28 = 4 and 2^4 = 16. We need to count\hich\af39\dbch\af31505\loch\f39 + up in the block size in the last octet as bit 28 is in the last octet. \par \hich\af39\dbch\af31505\loch\f39 192.168.10.0 \par \hich\af39\dbch\af31505\loch\f39 192.168.10.16 \par \hich\af39\dbch\af31505\loch\f39 192.168.10.32 @@ -10697,7 +10713,7 @@ subnetting is no longer critical for making a small network function. But subne \hich\af39\dbch\af31505\loch\f39 c\hich\af39\dbch\af31505\loch\f39 . And Subnetting networks that are connected via VPNs is still a very important part of planning large scale networks. \par \hich\af39\dbch\af31505\loch\f39 There are a few main rules for how to subnet: \par \hich\af39\dbch\af31505\loch\f39 * All IP subnets should use natural boundaries. -\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\hich\af39\dbch\af31505\loch\f39 subnets makes them easier to control. +\par \hich\af39\dbch\af31505\loch\f39 \hich\f39 * Grouping like objects into \'93\loch\f39 \hich\f39 natural\'94\loch\f39 sub\hich\af39\dbch\af31505\loch\f39 nets makes them easier to control. \par \hich\af39\dbch\af31505\loch\f39 * Smaller adjacent subnets should fit into larger subnets, most of the time. \par \hich\af39\dbch\af31505\loch\f39 * Smaller routing tables require less management and resources. \par }{\rtlch\fcs1 \ab\af39 \ltrch\fcs0 \b\f39\lang9\langfe1033\langnp9\insrsid6700708 \hich\af39\dbch\af31505\loch\f39 All IP subnets should use natural boundaries. @@ -10727,7 +10743,7 @@ Most managed switches can be configured for VLANs. }{\rtlch\fcs1 \af39 \ltrch\fc (Virtual LANs) allow you to segment y}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6970211 \hich\af39\dbch\af31505\loch\f39 our network for security sake. Any computer, or device, that is on one VLAN can communicate with anything else on that VLAN. If it is not on the same VLAN, you need a router to route the packets between VLANs.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid6700708 -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028 +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft5229\shptop-284\shpright9668\shpbottom2039\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz0\shplid1028 {\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0 \picw7807\pich4101\picwgoal4426\pichgoal2325\pngblip\bliptag228299346{\*\blipuid 0d9b9252bce41f38f6369a69367bfc61}89504e470d0a1a0a0000000d49484452000001270000009b080600000157226d6d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 @@ -13074,7 +13090,7 @@ A VLAN. The purple computers can talk to each-other, the yellow computers can t to each-other. But, for the green computers to talk to the yellow computers, the packet must go through the firewall.}{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6970211 \par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2891341 \hich\af31506\dbch\af31505\loch\f31506 The firewall lets us set up rules to allow, or disallow packets to go between VLANs. In this way, you can have a staff network, which is \hich\af31506\dbch\af31505\loch\f31506 protected from the guest network. Your server is something that you do not want strangers to have access to. But, you could have a printer on the guest network, which the staff could use. -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027 +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft6265\shptop621\shpright9594\shpbottom1766\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz2\shplid1027 {\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0 \picw5847\pich2011\picwgoal3315\pichgoal1140\pngblip\bliptag1600046003{\*\blipuid 5f5ec3b36b805056fe5c7e987ea64bf1}89504e470d0a1a0a0000000d49484452000000dd0000004c0802000001119b153d000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 @@ -14016,7 +14032,7 @@ Forbidden VLANs allow you to keep certain VLANs from being accessed in different k, guest network, and a student network, you may not want the staff network accessible in the student dorms. If the network is forbidden there, then the students cannot hack into it from there without going through your firewall.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid3887485 \hich\af39\dbch\af31505\loch\f39 There are a number of wa\hich\af39\dbch\af31505\loch\f39 ys to hack into VLANs, and so there are certainly some times to forbid VLANs from places where they do not need to be.}{\rtlch\fcs1 \af39 \ltrch\fcs0 \f39\lang9\langfe1033\langnp9\insrsid1076115 -\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid6042682 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026 +\par }{\rtlch\fcs1 \af0 \ltrch\fcs0 \lang1024\langfe1024\noproof\insrsid2259517 {\shp{\*\shpinst\shpleft5040\shptop9\shpright9361\shpbottom3335\shpfhdr0\shpbxcolumn\shpbxignore\shpbypara\shpbyignore\shpwr4\shpwrk0\shpfblwtxt1\shpz1\shplid1026 {\sp{\sn shapeType}{\sv 75}}{\sp{\sn fFlipH}{\sv 0}}{\sp{\sn fFlipV}{\sv 0}}{\sp{\sn fLockRotation}{\sv 0}}{\sp{\sn fLockAspectRatio}{\sv 1}}{\sp{\sn fLockPosition}{\sv 0}}{\sp{\sn fLockAgainstSelect}{\sv 0}} {\sp{\sn fLockCropping}{\sv 0}}{\sp{\sn fLockVerticies}{\sv 0}}{\sp{\sn fLockAgainstGrouping}{\sv 0}}{\sp{\sn pib}{\sv {\pict\picscalex100\picscaley100\piccropl0\piccropr0\piccropt0\piccropb0 \picw7595\pich5847\picwgoal4306\pichgoal3315\pngblip\bliptag2097857432{\*\blipuid 7d0ac39839b3515cea3f364371a51431}89504e470d0a1a0a0000000d494844520000011f000000dd0806000001f50746d0000000017352474200aece1ce90000000467414d410000b18f0bfc61050000 @@ -17885,8 +17901,8 @@ fffffffffffffffffdfffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff -ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e50000000000000000000000001018 -7683339ad201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000 +ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e50000000000000000000000008075 +e3e0fd9bd201feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000105000000000000}} \ No newline at end of file diff --git a/EduNetworkBuilder/Resources/Level0_Traceroute.enbx b/EduNetworkBuilder/Resources/Level0_Traceroute.enbx new file mode 100644 index 0000000..6b20ea6 --- /dev/null +++ b/EduNetworkBuilder/Resources/Level0_Traceroute.enbx @@ -0,0 +1,1372 @@ + + + + + A traceroute tests the path from one computer to the other. Every routing device along the path will respond (but switches do not). +This is done by adding a TTL (Time to Live) number on every packet. Each device that routes packets will subtract one from the TTL. When the TTL reaches zero, the devices will send a response back. Traceroute catches these responses and uses it to determine what each step is along the path. +Have server0 traceroute to server1 + Traceroute + 1024 + 1024 + 100 + False + 0 + 7 + 160 + hints + True + False + + net_switch0 + 100 + 112 + 109,397 + net_switch + False + False + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 112 + 113 + net_switch0 + lo0 + + lo + 113 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + management_interface + management_interface0 + + 112 + 114 + net_switch0 + management_interface0 + + management_interface + 114 + False + + management_interface0 + + 192.168.1.4 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + port + port1 + + 112 + 115 + net_switch0 + port1 + + port + 115 + False + + port1 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port2 + + 112 + 116 + net_switch0 + port2 + + port + 116 + False + + port2 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port3 + + 112 + 117 + net_switch0 + port3 + + port + 117 + False + + port3 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port4 + + 112 + 118 + net_switch0 + port4 + + port + 118 + False + + port4 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port5 + + 112 + 119 + net_switch0 + port5 + + port + 119 + False + + port5 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port6 + + 112 + 120 + net_switch0 + port6 + + port + 120 + False + + port6 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port7 + + 112 + 121 + net_switch0 + port7 + + port + 121 + False + + port7 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + net_switch1 + 100 + 122 + 736,397 + net_switch + False + False + + 192.168.2.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 122 + 123 + net_switch1 + lo0 + + lo + 123 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + management_interface + management_interface0 + + 122 + 124 + net_switch1 + management_interface0 + + management_interface + 124 + False + + management_interface0 + + 192.168.2.4 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + port + port1 + + 122 + 125 + net_switch1 + port1 + + port + 125 + False + + port1 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port2 + + 122 + 126 + net_switch1 + port2 + + port + 126 + False + + port2 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port3 + + 122 + 127 + net_switch1 + port3 + + port + 127 + False + + port3 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port4 + + 122 + 128 + net_switch1 + port4 + + port + 128 + False + + port4 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port5 + + 122 + 129 + net_switch1 + port5 + + port + 129 + False + + port5 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port6 + + 122 + 130 + net_switch1 + port6 + + port + 130 + False + + port6 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + port + port7 + + 122 + 131 + net_switch1 + port7 + + port + 131 + False + + port7 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + pc0 + 100 + 106 + 103,530 + pc + False + False + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 106 + 107 + pc0 + lo0 + + lo + 107 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 106 + 108 + pc0 + eth0 + + eth + 108 + True + + eth0 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + pc1 + 100 + 109 + 610,513 + pc + False + False + + 192.168.2.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 109 + 110 + pc1 + lo0 + + lo + 110 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 109 + 111 + pc1 + eth0 + + eth + 111 + False + + eth0 + + 192.168.2.3 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + pc2 + 100 + 152 + 212,530 + pc + False + False + + 192.168.1.1 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 152 + 153 + pc2 + lo0 + + lo + 153 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 152 + 154 + pc2 + eth0 + + eth + 154 + False + + eth0 + + 192.168.1.3 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + + pc3 + 100 + 155 + 733,516 + pc + False + False + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 155 + 156 + pc3 + lo0 + + lo + 156 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 155 + 157 + pc3 + eth0 + + eth + 157 + True + + eth0 + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + + router0 + 100 + 132 + 112,260 + router + False + False + + 192.168.3.2 + 255.255.255.0 + 192.168.4.2 + gw + + + lo + lo0 + + 132 + 133 + router0 + lo0 + + lo + 133 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 132 + 134 + router0 + eth0 + + eth + 134 + False + + eth0 + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth1 + + 132 + 135 + router0 + eth1 + + eth + 135 + False + + eth1 + + 192.168.3.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + 192.168.2.1 + 255.255.255.0 + 192.168.3.2 + route + + + 192.168.2.1 + 255.255.255.0 + 192.168.3.2 + route + + + + router1 + 100 + 136 + 736,257 + router + False + False + + 192.168.4.2 + 255.255.255.0 + 192.168.4.2 + gw + + + lo + lo0 + + 136 + 137 + router1 + lo0 + + lo + 137 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 136 + 138 + router1 + eth0 + + eth + 138 + False + + eth0 + + 192.168.4.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth1 + + 136 + 139 + router1 + eth1 + + eth + 139 + False + + eth1 + + 192.168.2.1 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + 192.168.1.0 + 255.255.255.0 + 192.168.4.2 + route + + + 192.168.1.0 + 255.255.255.0 + 192.168.4.2 + route + + + + router2 + 100 + 140 + 403,110 + router + False + False + + 0.0.0.0 + 0.0.0.0 + 0.0.0.0 + gw + + + lo + lo0 + + 140 + 141 + router2 + lo0 + + lo + 141 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 140 + 142 + router2 + eth0 + + eth + 142 + False + + eth0 + + 192.168.3.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth1 + + 140 + 143 + router2 + eth1 + + eth + 143 + False + + eth1 + + 192.168.4.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + 192.168.1.0 + 255.255.255.0 + 192.168.3.1 + route + + + 192.168.2.0 + 255.255.255.0 + 192.168.4.1 + route + + + 192.168.1.0 + 255.255.255.0 + 192.168.3.1 + route + + + 192.168.2.0 + 255.255.255.0 + 192.168.4.1 + route + + + + server0 + 100 + 100 + 8,520 + server + True + True + + 192.168.1.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 100 + 101 + server0 + lo0 + + lo + 101 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 100 + 102 + server0 + eth0 + + eth + 102 + False + + eth0 + + 192.168.1.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + 127.0.0.1 + 0.0.0.0 + 0.0.0.0 + route + + + 192.168.1.2 + 192.168.1.5 + 192.168.1.7 + route + + + + server1 + 100 + 103 + 862,520 + server + False + True + + 192.168.2.1 + 255.255.255.0 + 0.0.0.0 + gw + + + lo + lo0 + + 103 + 104 + server1 + lo0 + + lo + 104 + False + + lo0 + + 127.0.0.1 + 255.0.0.0 + 0.0.0.0 + ip + + Untagged + + + + eth + eth0 + + 103 + 105 + server1 + eth0 + + eth + 105 + False + + eth0 + + 192.168.2.2 + 255.255.255.0 + 0.0.0.0 + ip + + Untagged + + + + 127.0.0.1 + 0.0.0.0 + 0.0.0.0 + route + + + 192.168.2.2 + 192.168.2.5 + 192.168.2.10 + route + + + + + 100 + 102 + server0 + eth0 + + + 112 + 115 + net_switch0 + port1 + + + normal + 144 + + + + 140 + 143 + router2 + eth1 + + + 136 + 138 + router1 + eth0 + + + normal + 148 + + + + 109 + 111 + pc1 + eth0 + + + 122 + 127 + net_switch1 + port3 + + + normal + 151 + + + + 103 + 105 + server1 + eth0 + + + 122 + 126 + net_switch1 + port2 + + + normal + 150 + + + + 136 + 139 + router1 + eth1 + + + 122 + 125 + net_switch1 + port1 + + + normal + 149 + + + + 152 + 154 + pc2 + eth0 + + + 112 + 118 + net_switch0 + port4 + + + normal + 159 + + + + 132 + 135 + router0 + eth1 + + + 140 + 142 + router2 + eth0 + + + normal + 147 + + + + 112 + 117 + net_switch0 + port3 + + + 132 + 134 + router0 + eth0 + + + normal + 146 + + + + 106 + 108 + pc0 + eth0 + + + 112 + 116 + net_switch0 + port2 + + + normal + 145 + + + + 155 + 157 + pc3 + eth0 + + + 122 + 128 + net_switch1 + port4 + + + normal + 158 + + + server0 + server1 + SuccessfullyTraceroutes + + Traceroute + Default + + \ No newline at end of file diff --git a/EduNetworkBuilder/Resources/languages/edustrings.resx b/EduNetworkBuilder/Resources/languages/edustrings.resx index 70ee178..ae5cde3 100644 --- a/EduNetworkBuilder/Resources/languages/edustrings.resx +++ b/EduNetworkBuilder/Resources/languages/edustrings.resx @@ -1657,6 +1657,14 @@ Device cannot respond - Packet Failed ND_DoInputFromLink_PowerOff = Device cannot respond - Packet Failed + + Traceroute: + H_Traceroute_Key = Traceroute: + + + Traceroute + H_Traceroute_Title = Traceroute + TTL reached. ND_ProcessArrival_TracerouteArrived = TTL reached. @@ -1665,6 +1673,14 @@ Traceroute Destination Reached ND_ProcessArrival_TracertReply = Traceroute Destination Reached + + Needs to traceroute + NT_TstDiscriptTraceroute = Needs to traceroute + + + Needs to traceroute to + NT_TstDiscriptTraceroute2 = Needs to traceroute to + Traceroute _Traceroute = Traceroute