CS 206 Final Term Preparation
CS 206 Final Term Preparation
"Also, you can make phones calls and surf (send IP packets) at the same time."
"DSL allows the same old analog voice signal to be sent over the line by a phone.
At the same time, DSL allows a separate digital signal to go over the same phone
line."
"The DSLAM splits out the digital signal and analog signal from the local loop."
"Cable Internet access makes use of the cable television company’s existing
cable television infrastructure."
"Fiber optics connects the cable head end to neighborhood-level junctions, from
which traditional coaxial cable is then used to reach individual houses."
"The second 'A' in AAA is for Authorization. It refers to the process of figuring out
what a particular user is allowed to do."
"The last 'A' in AAA is accounting. The same servers that perform authentication
and authorization services can keep a record of each request to authenticate or
authorize a user."
"ISPs authenticate users before they can even use the network."
"Password Authentication Protocol (PAP) and Challenge Handshake
Authentication Protocol (CHAP) are used by ISPs."
"To protect against password theft, CHAP does not send the password as clear-
text."
"These days, it is common for users to encrypt data before sending it over the
Internet."
"For Barney to use the VPN, he must encrypt the packet as he creates it."
"A VPN device inside the corporate network is called a VPN concentrator."
"When you connect an enterprise network to the Internet, one of the first things
you must decide is what you want to allow to pass to and from the Internet."
"To secure Fredsco's network, two things have to be kept in mind: Between which
two hosts do packets need to flow? Which host begins that communication?"
"Traffic that is typically not allowed between an enterprise and the Internet."
"A network engineer configures the firewall with a set of rules that tells it what's
legal and what isn't."
"The firewall allows some packets to pass through it and discards others to
enforce the rules."
"As a firewall watches the traffic entering the network, it knows the nature of the
traffic that is allowed to flow through it."
"A host who is initiating a new flow can be recognized by looking at: The first TCP
segment used to create a TCP connection SYN flag bit =1, and source IP address
of the packet."
"They have at least two physical interfaces. They can have more than two
interfaces. Outside interface connects to Internet. Inside interface connects to
internal network."
"A stronger firewall rule: No TCP connections can be initiated from outside to the
inside. The only flows allowed are for servers in the DMZ."
"They look for things in the packets to determine if someone is cheating the
firewall and doing bad things to servers in the network."
"Some IDS devices sit in the network, watching packets that pass over a LAN and
are called network-based IDSs."
"Those IDS software that sit on the servers are called host-based IDSs."
For Topic 80: Introduction to Wireshark, here are some important lines:
"Features of Wireshark: available for UNIX and Windows, live packet data capture,
detailed protocol information display, packet filtering, and saving captured packet
data."
"Content Redirection"
"Asymmetric Routing"
"Packet Loss"
"Bandwidth Throttling"
"Delayed ACK"
"Route Redirections"
"Switch Loop"
"Client Misconfiguration"
"Slow Application"
Topic 87: A Four-Part Analysis Methodology:
Setting the time display format to measure delta time between packets
Topic 95:
Wireshark Lab 7 focuses on locating buffer problems using the Calculated Window Size
field in Wireshark. The steps involved are as follows:
Step 2: Expand any TCP header in the Packet Details pane. Right-click on the Calculated
window size field and select "Prepare a Filter | Selected."
Step 3: Change the display filter value to "tcp.window_size < 1000" and click Apply. This
filter will display Packet 374, where the client is advertising a 536-byte receive buffer.
The purpose of this exercise is to understand the impact of a low Window Size value on
data transmission. When the Window Size value reaches zero, the host cannot accept
any more data, leading to a Zero Window condition. In Packet 374, the client's window
size is only 536 bytes, which means it can't accept more data. Consequently, data
transmission is halted until the client's buffer size increases.
Topic 96:
Step 2: In the display filter area, type "! tcp && !arp" and click Apply. This filter excludes
TCP and ARP traffic, displaying 40 packets that match the filter.
Step 3: To remove DNS and DHCP from view, expand the filter by adding "&& !dns &&
!bootp." This will further narrow down the displayed packets to eight.
By applying these filters, you can isolate and analyze specific types of traffic, allowing
you to focus on anomalies or specific network behavior.
Topic 97:
Wireshark Lab 9 demonstrates how to create filter expression buttons in Wireshark. The
steps involved are:
Step 2: Right-click on the TCP header of Packet 11 (the first SYN packet) and select
"Expand Subtrees." This will show the SYN bit set to 1.
Step 3: Right-click on the "SYN: Set" line and select "Prepare a Filter | Selected."
Wireshark will place the first part of the filter in the display filter area.
Step 4: Scroll down to the TCP Options area and click on the "TCP SACK Permitted
Option: True" line. This will display "tcp.options.sack_perm" in the Status Bar area.
Step 6: Add "|| !tcp.options.wscale.multiplier" and put parentheses around the options.
Step 7: Click the Save button, name your new button "TCP-HS," and click OK.
Step 8: Click your new TCP-HS button to display the 38 packets that match the filter.
By creating filter expression buttons, you can quickly apply display filters to your traffic,
allowing you to identify common network problems or specific packet characteristics.
Topic 98:
Wireshark Lab 10 explains how to launch and navigate through the Expert Infos in
Wireshark. The steps are as follows:
Step 2: Click the Expert Infos button in the bottom left corner of the Status Bar. This will
open the Expert Infos window.
Step 3: The Expert Infos window is divided into six tabs: Errors, Warnings, Notes, Chats,
Details, and Packet Comments. Explore these.
"Response Code in the Info column for Packet 6 cannot be seen because the
Allow subdissector to reassemble TCP streams preference setting is enabled."
"The Time Since Request (http.time) field indicates the HTTP response time was
over 276 seconds."
"To find the actual HTTP response time, in the Packet Details pane of any packet,
right-click the TCP header, select Protocol Preferences and toggle off the Allow
subdissector to reassemble TCP streams preference setting."
"Now click the Go to First Packet button. Notice we see that Packet 6 actually
contains the 200 OK response. Examine the HTTP response time value in Packet
6. It is just over 300 ms."
"We are interested in the most active TCP conversation (in bytes) in this trace file.
Click the TCP tab and then click the Bytes column heading twice to sort from
high to low."
"Right-click on this top conversation and select Apply as Filter | Selected A <- >B.
Wireshark applies the filter and displays the 123 packets of this conversation."
"By default, Wireshark displays the packets per second rate (packet per tick with
a default tick rate of one second)."
"Click on the first drop in throughput in the graph. Wireshark jumps to that point
in the trace file so we can investigate the problem further."
"Click on the second problem point in the graph. From Wireshark’s window, we
can see what is happening at this point in the file download process."
"When the Reply Code field inside the Flags section contains a 0, the DNS
response was successful. If it contains any other value, the response indicates
there is a DNS error."
"Right-click on the Reply Code field and select Colorize with Filter | New Coloring
Rule."
"Enter DNS Errors as the name of your new coloring rule. Change the String value
to dns.flags.rcode > 0."
"Your new coloring rule appears at the top of the list of color filters. Packets are
processed in order through this list. Now, DNS errors will appear with an orange
background."
"With dns filter still in place, scroll through the packets to see if you notice the
two DNS errors in the trace file. Packets 83 & 84 appear with orange."
"In order to capture the traffic between the client and the upstream switch (and
ultimately a remote host), you need to either (a) Install Wireshark or another
capture tool on the user's machine, (b) Make the switch send a copy of the traffic
down your analyzer port, or (c) Tap in and obtain a copy of the traffic between the
client and the switch."
"Use a Test Access Port ('Tap'): A tap is a simple device that copies all the traffic
flowing through it (including those corrupt packets) out to a monitor port."
"You are lucky if your native WLAN adapter can capture WLAN Management and
Control traffic. In Monitor Mode, you should be able to see traffic from any
network as well."
"To test the capture capabilities of your WLAN Native Adapter, follow the given
steps."
"If your native adapter is suitable for network capture, you should see some
WLAN management and Control traffic (such as Beacon packets and Probe
Request/Probe Response packets)."
"Also, when you look at the data packets you should see an 802.11 header on the
data packets. If your adapter strips off the 802.11 header, Wireshark will apply an
Ethernet header. In case, you do not see these traffic types or characteristics,
consider another solution for WLAN capture."
"Capturing to file sets is an important task when you are working in high traffic
situations."
"File sets are groups of trace files that are linked based on their file name."
"In this lab exercise, we will use an autostop condition to only capture three files."
"Capture filters can reduce the traffic that you need to examine."
"Here, we will create and use a capture filter based on the MAC address."
"This will enable us to see all of the traffic to or from our machine."
"The first step of any analysis process is to verify that the hosts are able to
communicate and you can see their traffic in the trace file."
"If hosts are not able to communicate, there can be several reasons for this."
"Check Your Capture Process: If you do not see any traffic, something may have
gone wrong during the capture process."
"If a client does not know the IP address of a target (either in cache or a local
hosts file), the client can send a DNS query to obtain this information."
"Step 2: Type dns in the display filter area and click Apply."
"You can observe from the Status Bar that 32 packets match this filter."
"From the Info column, you can see a number of No Such Name responses
indicating the name resolution process failed."
"Before a client can send a packet to a local target or a local router, it must obtain
the MAC (Media Access Control) address of that local target or router."
"If the client does not have the MAC address information in cache, the client
sends out an Address Resolution Protocol (ARP) request."
"If no response is received when trying to acquire the local target's MAC address,
the client is done."
"Step 2: Scroll through this trace file. Look at the ARP requests sent to discover
the MAC address of 192.168.1.45. There are no responses."
"There are several reasons why a server may not respond to a TCP connection
attempt."
"The TCP handshake request packet (SYN) may not arrive at the server."
"A firewall along the path dropped the SYN packet, or a host-based firewall on the
server blocked access to the port."
"Step 2: Scroll through this trace file. This trace file contains only SYN packets
from 192.168.1.72 to 192.168.1.66. None of the SYN packets have received
SYN/ACK responses."
"The client requests the default file from the web site's root directory in Packet
4."
"Packet 5 contains acknowledgment no. 288, which indicates that the server has
received every sequence no. up to 287, and it expects sequence no. 288 next."
"The client's browser appears to time out and sends a FIN/ACK after almost 8
seconds."
"The symptoms indicate the application has failed at the server side."
"A large delay before the SYN/ACK is an indication of a high round trip time
between the hosts."
"Time between SYN/ACK and client’s ACK to finish TCP handshake can be used
by server to determine the round trip time."
"If you observe that a server quickly sent an ACK to a client's request, but there is
a long delay before the server’s response, then this is not a path latency issue."
"There can be several reasons for delays that occur during a file download or file
upload process."
"This situation arises when ACKs from a receiver get delayed because of the path
latency or delayed ACK function."
"A host must wait for a Window Update before sending a packet if it finds that
the Window Size advertised is too small to fit a full-sized data segment."
"UDP conversation statistics such as packet rate, bps rate, etc. can be obtained
with Conversations Window."
"In Wireshark, the default Time column setting is Seconds Since Beginning of
Capture."
"It becomes easier to locate delays when a time column displays delta times."
"We can locate the largest delays in a trace file by sorting the delta time column."
"Let’s create such a time column to show the delta times of DNS traffic only."
"Cause for Delays: If a local DNS server does not have these names in its cache,
it needs to perform recursive queries to obtain the data."
Step 5: Select the MAX(*) Graph 1 Calc option and enter frame.time_delta_displayed in
the Calc area.
Step 6: Click the Graph 1 button to plot the results. If your trace file contains both UDP
and TCP-based traffics and you want to plot UDP delays, then enter udp in the Graph 1
filter area before you click the Graph 1 button.
There is a sudden increase in the delta time at approx. 1.2 seconds of the trace file. On
clicking these points, Wireshark jumps to that point in the trace file and enables to do
additional analysis.
Step 4: Right-click on the top entry and select Apply as Filter | Selected | A <–> B.
Wireshark creates a filter based on the source/destination address and
source/destination port fields.
Step 5: Click Clear to remove your filter when you are finished. If there are many TCP
conversations contained in your trace file, the method we learned in this topic can be
used to find the most active conversation and then quickly apply a filter on that
conversation.
Step 3: Right-click on the [Stream index: 7] field in the TCP header. Select Apply as Filter
| Selected.
We can see that Wireshark creates a filter for tcp.stream==7 in the filter display area
and applies it to the trace file. There are 66 packets matching this filter as indicated on
the Status Bar.
Step 2: Expand the TCP header in Packet 1. Right-click on the [Stream index: 0] line and
select Apply as Column.
Step 3: Click on your Stream index column once to sort the trace file by conversations.
Jump to the end of the trace file and you find that there are 23 TCP conversations.
Counting TCP streams starts at 0.
Step 2: Expand the TCP header in Packet 1. Right click anywhere on the TCP header,
select Protocol Preferences and ensure that Calculate conversation timestamps is
enabled.
Step 3: At the end of the TCP header, go to the [Timestamps] section, locate and right-
click on the Time since previous frame in this TCP stream field. Select Apply as Column.
Step 6: Click the new TCP Delta column heading twice to sort from high to low. The
packets with the largest delays before them in a TCP conversation appear at the top of
the list.
Step 2: In the display filter area, enter the following filter: tcp.time_delta > 1
Step 3: Click the Save button on the display filter toolbar. Enter TCP Delay as the
label when prompted. Click OK to save your new button.
Step 4: Click your new TCP Delay button. You will find that 37 packets match the
filter.
Step 5: Select Edit | Preferences | Filter Expressions, update TCP Delay filter
expression to: tcp.time_delta > 1 && tcp.flags.fin==0 && tcp.flags.reset==0 and
then click OK.
Step 6: Click your TCP Delay button again. 23 packets are displayed because TCP
FIN and RST packets have been removed. Let’s further remove HTTP GET
requests from the TCP Delay button. Add the following string to the end of your
filter: && !http.request.method=="GET". The highest TCP Delta delay is under 6
seconds and is a SYN retransmission pkt. There are 12 SYN retransmissions
between the client and 184.73.250.227. There is one SYN/ACK as the RTT is
1.28957 seconds.
Step 2: Enter tcp.flags.syn==1 in the display filter area and then click Apply.
Step 3: Click your TCP Delta column heading twice to sort from high to low. We
are interested in the delays preceding SYN/ACK packets.
We can see that there are three packets that are marked as Retransmissions.
These are because of connection establishment problems. We can also observe
the RTT to various servers.
The SYN/ACK packet can be detected by applying the filter: tcp.flags.syn==1 &&
tcp.flags.ack==1.
Step 2: Enter the filter tcp.flags.syn==1 in the display filter area and then click
Apply.
The first two packets are sent from the client port 35,621. Packet 3 and Packet 4
are the first two packets of a new TCP connection.
The RTT is about 17 ms between the TCP SYN from port 35,622 and the
SYN/ACK to that same port.
Step 4: Select the MAX(*) Graph 1 Calc option and enter tcp.time_delta in the
Calc area.
From the graph, a spike in the RTT values around 25 seconds can be observed.
Step 2: Packet 3 is the first DNS response packet in the trace file. Expand the
Domain Name System (response) section.
Step 3: Right-click on the [Time: 0.107083000 seconds] line and click Apply as
Column.
Step 4: The newly created column appears to the left of the Info column. Drag the
new column to the right of the TCP Delta column.
Step 5: Right-click on the new column heading, select Edit Column Details, and
rename the new column to DNS Delta.
Step 6: Click the DNS Delta column heading twice to sort it from high to low.
Step 2: Type dns.time > 1 in the display filter area and click Save.
Step 4: Select the MAX(*) Graph 1 Calc option and enter dns.time in the Calc area.
Step 6: Click on the highest point in the graph to locate the corresponding packet
(in this case, packet 3).
Step 2: Right-click on the TCP header in Packet 5 and select Protocol Preferences.
Uncheck "Allow subdissector to reassemble TCP streams" to disable it.
Step 2: Packet 10 (HTTP 303 See Other) is the first HTTP response packet in the
trace file. Right-click on the Hypertext Transfer Protocol section and select
"Expand Subtrees".
Step 3: Right-click on the "[Time since request: 0.026416000 seconds]" line and
select "Apply as Column".
Step 5: Right-click on the column heading, select "Edit Column Details", and
rename it to "HTTP Delta".
Step 6: Click the "HTTP Delta" column heading twice to sort HTTP responses
from high to low.
Step 2: Type "http.time > 1" in the display filter area and click Save. Name the
button "HTTP Delay".
Step 3: Expand the SMB section and the SMB Header section of Packet 5. Right-
click on the "[Time from request: 0.000766000 seconds]" line and click "Apply as
Column".
Step 5: Right-click on the column heading, select "Edit Column Details", and
rename it to "SMB Delta".
Step 6: Click the "SMB Delta" column heading twice to sort packets from high to
low.
Step 2: Select Statistics | Service Response Time | SMB. Click "Create Stat"
when prompted by Wireshark.
The SMB Service Response Time statistics window shows the minimum,
maximum, and average Service Response Time (SRT).
Step 2: Type "smb.time > 1 || smb2.time > 1" in the display filter area and click
Save. Name the button "SMB/SMB2 Delay".
Step 4: Select the MAX(*) Graph 1 Calc option and enter "smb.time" in the Calc
area.
Step 5: Click the Graph 1 button to plot the SMB response times.
Step 7: Clicking on the highest points in the graph will take you to the
corresponding packets for further analysis.
Wireshark's Expert Infos System provides alerts and packet comments for
network concerns seen in the trace file.
The Expert Infos button in the Status Bar opens the Expert Infos window.
Expert infos are classified into categories: Errors, Warnings, Notes, Chats, Details,
and Packet Comments.
The nextseq value is used to determine the next expected sequence number, and
Wireshark detects lost packets when the sequence number jumps beyond
nextseq.
TCP provides packet loss recovery mechanisms, while UDP does not.
The columns help determine the number of lost packets when Wireshark
displays "Previous Segment Not Captured."
The mismatch between SEQ# and NEXTSEQ# values indicates lost packets.
A bad TCP filter expression is built in Wireshark to view key TCP problems.
The Bad TCP button is created to apply the filter and view packets matching the
expression.
The Warnings tab shows 5 packet losses due to a sudden jump in sequence
numbers.
The Expert Infos window can be expanded to analyze specific packet problems.
Duplicate ACKs indicate Fast Recovery and request sequence number 9,164,761.
Duplicate ACKs inform the sender about packet loss or indicate out-of-order
packets.
Duplicate ACKs are generated if Fast Recovery is supported and a packet arrives
with a sequence number beyond the calculated next sequence number.
Out-of-Order packets are marked if the missing sequence number packet arrives
within 3 ms.
The Duplicate ACKs are requests for a single missing packet with sequence
number 9,164,761.
Fast Recovery process is launched multiple times, and recovery occurs with
varying numbers of Duplicate ACKs.
The TCP receiver requested the missing packet 809 times, indicating a
significant recovery time.
SACK Left Edge (SLE) and SACK Right Edge (SRE) information can be found in
the packet's Options area of the TCP header.
TCP cannot pass received data to the application layer until all bytes are in the
correct order.
Multiple out-of-order packets in close proximity suggest a set of lost packets that
are retransmissions arriving within 3 ms.
The Out-of-Order segment section is expanded to locate the first entry and
examine the packet.
Sequence number (SEQ#) and Next Sequence Number (NSEQ#) columns are
created to analyze the order of packets.
Fast retransmissions occur when three identical ACKs (original ACK and two
Duplicate ACKs) arrive at the receiving host.
Fast retransmissions are a sign of packet loss and are part of the Fast Recovery
process.
Wireshark has detected two Fast Retransmissions in the provided trace file.
Expert Infos in Wireshark mark the Fast Retransmission packet and indicate it as
a Retransmission.
The first entry (Packet 12,035) in the Fast Retransmissions section is examined.
There are 808 Duplicate ACKs before the Fast Retransmission packet.
The RTO timer is used to ensure data delivery continues even if the TCP peer
stops communicating.
The sender retransmits the unacknowledged data packet if the RTO timer expires
without receiving an ACK.
Wireshark detected 580 Retransmissions in the trace file, including two Fast
Retransmissions.
ACKed Unseen Segments occur when Wireshark sees an ACK but did not see the
corresponding data packet.
Expert Infos in Wireshark are used to find ACKed Unseen Segment indications.
Keep Alives are TCP packets used to detect dead connections, dead TCP peers,
and prevent connection termination when idle.
Wireshark detects Keep Alives by tracking the Sequence Number field values in
TCP streams.
Applications written to use Keep Alives generate them, and three parameters are
defined: Keep Alive Time, Keep Alive Interval, and Keep Alive Probes.
Only two packets match the filter in the provided trace file.
Expert Infos in Wireshark are used to find Keep Alive/Keep Alive ACK packets.
Keep Alives and Keep Alive ACKs are used to check for dead TCP peers and
avoid timeouts of idle connections.
Keep Alive Packets used in Zero Window Conditions are identified in Wireshark.
TCP hosts can send Keep Alives when the peer is advertising a Zero Window
condition.
Wireshark marks SYN packets with the Reused Ports Expert Analysis definition
when it detects a previous SYN packet with the same IP address/port number
combination.
The [SEQ/ACK analysis] section of the reused port packet (number 317) is
expanded and colored cyan.
The sequence number field is used to determine if the SYN packet belongs to a
unique connection request, retransmission, or reused port.
Faulty Network Interface Cards (NICs) or devices that alter packet content can
cause checksum errors.
Checksum validation for IPv4, TCP, and UDP can be enabled in Wireshark's
Preferences.
Packets with bad IPv4, TCP, and UDP checksums are highlighted in the Packet
List pane.
Expert Infos in Wireshark display the number of bad checksums for each
protocol.
Topic 171: Wireshark Lab 77:
DNS errors include server failure (Reply Code 2) and name error (Non-Existent
Domain, Reply Code 3).
DNS error responses can be due to a server upstream from the local server not
responding to recursive DNS queries.
A button is created to identify HTTP errors in trace files using the filter
http.response.code >= 400.
Clicking the button identifies the two HTTP error responses in the trace file (404
"Not Found" errors).
Packet 61 is analyzed using the Follow TCP Stream option to determine the item
that was not found on the server.
Packet Tracer is a network simulator from Cisco that allows users to simulate
Cisco devices and troubleshoot networks.
Packet Tracer has two operating modes: real-time mode and simulation mode.
The latest version of Packet Tracer can be downloaded for free from the given
website.
The layout of Packet Tracer includes components like the menu bar, main toolbar,
physical/logical workspace tabs, common tools bar, workspace, and real-
time/simulation tabs.
The user-created packet box and network component box are used to create
customized packets and access network devices.
Steps are provided for creating a simple topology in Packet Tracer, including
selecting end devices, connecting them using Copper Cross-Over, configuring IP
addresses, and testing connectivity.
"Routers, switches are used to Interconnect end devices such as PCs, laptops,
servers."
Explanation of Bridge PT, Generic Switch PT, Hub PT, Repeater PT, and Coaxial
Splitter PT.
Description of accessing CLI through the CLI Tab and Console port.
Explanation of configuring routers and switches using the Config tab in Packet
Tracer.
"End devices (PCs, servers) are the ones that use this core."
"NTP: Network Time Protocol ensures that the clocks of all devices are
synchronized properly."
"FTP Services: Users can be created and permissions can be granted to them."
"IP Configuration: With this utility, you can assign a dynamic or static IP address
to an end device."
"Dial-up: End devices such as PC-PT and Laptop-PT have the PC-HOST-NM-1AM.
This utility allows simulating a modem dialer."
"Terminal: This utility can be used for accessing the CLI through the console
port."
"VPN: Virtual private network (VPN) is used to create a connection for secure
communication."
"Email: You can send and receive emails with the help of this utility."
"Text Editor: You can use this utility to create, edit, and save text files."
"In Packet Tracer’s simulation mode, you can observe packets flowing from one
device to another."
"Step 5: Click on the real time/simulation tab and switch to the simulation mode."
"Step 6: Click on the Auto Capture / Play button. Packet capture begins."
"To view a packet’s TCP/IP layers information, click on a packet (the envelope
icon)."
"The simulation mode has control buttons: Back, Auto Capture / Play,
Capture/Forward."
"In Packet Tracer, there are a number of cables available to connect devices."
"Console: The console port of a network device can be connected to the RS-232
port on a PC/laptop."
"Copper cross-over: This Ethernet cable connects devices such as hub to hub, PC
to PC, PC to router, and PC to printer."
"Fiber: Connects Fast Ethernet and Gigabit Ethernet ports of a fiber port."
"Link status: Once you have connected devices together, you will find a light, at
each end of the cable."
"Simple PDU: The Add Simple PDU tool relies on Internet Control Message
Protocol (ICMP)."
"Clustering combines several devices that you choose into a single cloud icon."
"Upon double-clicking the cluster, it will get expanded and will display the devices
normally."
"Step 1: Let’s create a topology that consists of three switches and nine PCs."
"Step 2: Combine PC0, PC1, PC2 and Switch0."
"Step 4: Repeat the same procedure done in Steps 2 and 3 for combining PC6,
PC7, PC8 and Switch2."
"Double-clicking on a cluster expands it and displays only the devices within it."
"Packet Tracer can simulate the required environment logically and physically."
"1-Intercity: Being the largest environment, it consists of cities. You can create
cities, buildings, and wiring closets in this layer."
"Step 2: As Ethernet has distance restrictions, switch off both the PCs and
replace their default modules with PT-HOST-NM-1FGE."
"Step 3: Connect both of the PCs with a fiber cable and assign IP addresses."
"Step 4: Switch to the physical view, and click on the New City button. Rename it
Lahore."
"Step 5: Use the NAVIGATION button and go to Home City | Corporate Office |
Main Wiring Closet. Both the PCs we inserted in the logical workspace are
located here."
"Step 6: Use the Move Object button and move one of the PCs to Lahore| Office
Building | Wiring Closet."
"In physical view, we can measure a cable’s distance by placing the pointer on the
cable."
"The length of Standard copper Ethernet cables can extend up to 100 meters."
"Step 1: Create a topology consisting of two PCs in the logical workspace."
"Step 2: Connect both of the PCs with a copper cable and assign IP addresses."
"Step 3: Switch to the physical view, and click on the New City button. Rename it
Lahore."
"Step 6: Check the distance between them. In case the distance is less than 100
meters, move them further apart, so that the distance becomes greater than 100
meters."
"In static routing algorithms, routes change very slowly over time, often as a
result of human intervention."
"Step 2: Click on a router icon, go to the Config tab, select an interface, and
configure the IP address."
"Step 4: Test the connectivity between all of the routers with the help of simple
PDU."
"Step 5: Let’s view the routing table of a router. Go to the Common tools bar, click
on the inspect icon. Select a router and click on it. Then select Routing Table."
"Step 2: Click on a router icon, go to the CLI tab. As the device boots up, then you
will see the prompt."
"Step 5: Test the connectivity between all of the routers with the help of simple
PDU."
"Dynamic Routing Protocols: A) Form 'neighbor ship' with other routers. B) Send
them the directly-connected routes and other received routes."
"A GUI to configure a dynamic routing protocol called Routing Information
Protocol (RIP) is available in Packet Tracer."
"Step 2: Click on a router icon, go to the Config tab, select an interface, and
configure the IP address."
"Step 4: Once the topology is configured, use the simple PDU to check for
connectivity."
"Step 5: Use the delete tool and remove one link. Let’s say we remove the link
between R1 and R2. Use the simulation mode and test connectivity with the
simple PDU. The packet takes the alternate, longer route and succeeds in
reaching the destination."
"Let’s assume a network consisting of four routers in a ring topology, with no PCs
or loopback interfaces."
"Step 2: Click on a router icon, go to the CLI tab. As the device boots up, then you
will see the prompt."
"Repeat Step 3 for the remaining routers with the following configurations for
their interfaces:"
"Step 6: Test the connectivity between all of the routers with the help of simple
PDU."
"When a source router has multiple paths to a target path, then it can load
balance traffic across them."
"Assume a network that consists of four routers in a ring topology with no PCs."
"Step 1: Drag and drop 4 routers in the workspace."
"Step 4: On Router 4, let’s add a loopback interface (a virtual interface that works
like a real interface and needs IP address)."
"Step 5: Go to the RIP config mode and enter the network IP for this loopback
interface."
"Step 7: Turn on the simulation mode. You will find that the first packet takes the
R1-R2-R4 route while the second takes the R1-R3-R4 route."