tum/ cs/ network architectures and services/ ilab
internetlab-logo
[] Wed, 07 Dec 2022 05:28:39 +0100 | en
>
view_structure
iLab summer 2015 Course Content
You can find the schedule here.
Preface
a Lab room and Linux tutorial - This tutorial introduces the lab room environment.
b Cisco IOS Tutorial - This tutorial gives an introduction to the basics of Cisco IOS.
c Lab Slot Preference - This lab is used for indicating your preferred lab slot times and isles
d Demonstration Lab - This lab module makes you familiar with the web-based learning system and the didactical principles behind the course.
0 The basics -
1 Static routing - Continuing on Layer 3 we have a deeper look into IP-Routing.
2 Dynamic routing - On our journey towards the "real Internet" we learn how automatic routing works inside the different domains of the net.
3 TCP/ UDP - After looking at IP fragmentation, we climb up one Layer to Layer 4: The end-to-end-communication is of our interest now.
4 DNS - Most of the time we address machines using names instead of (IP-)numbers... but how does the Domain Name System work? After this lab you should know exactly what happens, when you type http://ilab.net.in.tum.de into your browsers url-field...
5 NAT/ DHCP - Coming closer to our home setup we look inside Network Address Translation as technique to use one external address to allow multiple intern machines to access the Internet. NAT is especially important today since we are getting out of Ipv4 addresses. Besides ist usefulness NAT causes some trouble as we will see. Another important mechanism is Dynamic Host Control Protocol (DHCP) allowing computers to be partly automatically configured. As the migration towards Ipv6 is ongoing and since the new protocol provides interesting mechanisms, besides DHCPv4, we will also have a look at DHCPv6 and some of its features.
6 Security I - In this lab we get to know how Firewalls help to secure our network-nodes. As example we use a webserver using TLS.
7 Security II - How can we establish secure connections over insecure networks?
8 Wireless LAN - Often used but how is it really working? We address physical aspects as well as protocol aspects before we come to security. We will explore how fast we can crack a WEP-Key and more important why. We will look at WPA and Radius for a more secure wireless infrastructure.
*:0.1844sec | © Chair of Network Architectures and Services | labsystem mop