tum/ cs/ network architectures and services/ ilab
internetlab-logo
[] Wed, 31 May 2023 18:07:59 +0200 | en
>
view_structure
ilab summer 2012 Course Content
You can find the schedule here.
Preface
a Demonstration lab - This lab module makes you familiar with the web-based learning system and the didactical principles behind the course.
b Cisco IOS Tutorial - This tutorial give an introduction into the basics of Cisco IOS.
c Environment Tutorial Lab Room - This tutorial introduces the lab room environment.
0 The basics - Our main concern in the first lab exercise is to get familiar with the basic tools we are using. You‘ll have a look at Linux‘ network capabilities experimenting on Layer 2 and 3 of the ISO-model.
1 Static routing - Continuing on Layer 3 we have a deeper look into IP-Routing.
2 Dynamic routing - On our journey towards the "real Internet" we learn how automatic routing works inside the different domains of the net.
3 TCP/ UDP - After looking at IP fragmentation, we climb up one Layer to Layer 4: The end-to-end-communication is of our interest now.
4 DNS - Most of the time we address machines using names instead of (IP-)numbers... but how does the Domain Name System work? After this lab you should know exactly what happens, when you type http://ilab.net.in.tum.de into your browsers url-field...
5 NAT/ DHCP/ IPv6 - Coming closer to our home setup we look inside Network Address Translation as technique to use one external address to allow multiple intern machines to access the Internet. NAT is especially important today since we are getting out of Ipv4 addresses. Besides ist usefulness NAT causes some trouble as we will see. Another important mechanism is Dynamic Host Control Protocol allowing computers to be partly automatically configured. As the migration towards Ipv6 is ongoing and since the new protocol provides intersting mechanisms we have a look at it here.
6 Security I - In this lab we get to know how Firewalls help to secure our network-nodes. As example we use a webserver using TLS.
7 Security II - How can we establish secure connections over insecure networks?
8 Wireless LAN - Often used but how is it really working? We address physical aspects as well as protocol aspects before we come to security. We will explore how fast we can crack a WEP-Key and more important why. We will look at WPA and Radius for a more secure wireless infrastructure.
*:0.2502sec | © Chair of Network Architectures and Services | labsystem mop