tum/ cs/ network architectures and services/ ilab
internetlab-logo
[] Mon, 17 Dec 2018 02:01:58 +0100 | en
>
view_structure
iLab 2018ws Course Content
You can find the schedule here.
Demonstration Lab content...
0 Demonstration Lab - This lab module makes you familiar with the web based learning system.
a Cisco IOS Tutorial - This tutorial gives an introduction to the basics of Cisco IOS.
b Lab room and Linux tutorial - This tutorial introduces the lab room environment and our GNU/Linux machines.
1 The basics - We introduce IPv6 and IPv4 with Neighbour Discovery and friends. We'll also do a simple spoofing attack.
2 Lab Slot Preference -
3 Static routing - Continuing on IP layer, we have a closer look at routing. The Cisco routers are introduced.
4 Dynamic routing - On our journey towards the “real Internet”, we learn how automatic routing works inside the different autonomous systems.
5 Transport Layer - After looking at IP fragmentation, we climb up one layer to the transport layer. Now we are interested in preventing congestion in the network.
6 Fragmentation and DNS - Most of the time we address machines using names instead of network addresses. How does the Domain Name System work? After this lab you should know exactly what happens, when you type https://ilab.net.in.tum.de into the URL field of your browser.
7 NAT and DHCP - Coming closer to a home setup, we look inside Network Address Translation as technique to use one external address to allow multiple internal machines to access the Internet. NAT is important today, as we have run out of IPv4 addresses. NAT also causes quite a bit of trouble as we will see. Another important mechanism is the Dynamic Host Configuration Protocol (DHCP), allowing computers to be automatically configured for networking. As the migration towards IPv6 is ongoing and the new protocol provides interesting mechanisms besides DHCPv4, we will also have a look at DHCPv6 and some of its features.
8 TLS and packet filtering - In this lab we get to know how packet filters help secure our network. We will also configure TLS for a secure web server.
9 Onion routing - The separation of network identity and routing will be used to protect communication metadata. This approach is implemented with onion routing in an overlay network.
10 Wireless LAN - Often used but how is it really working? We address physical aspects as well as protocol aspects before we come to security. We will explore how fast we can crack a WEP-Key and more important why. We will look at WPA and Radius to set up a more secure wireless infrastructure.
*:0.0662sec | © Chair of Network Architectures and Services | labsystem mop