tum/ cs/ network architectures and services/ ilab
[] Sat, 10 Jun 2023 09:28:48 +0200 | en

Index of the labs

0 The demonstration lab - This is just to get familar with the lab system.
Getting started - Hints and a Linux tutorial to make your life easier.
1 The basics - Our main concern in the first lab exercise is to get familiar with the basic tools we are using. You‘ll have a look at Linux‘ network capabilities experimenting on Layer 2 and 3 of the ISO-model.
2 Static routing - Continuing on Layer 3 we have a deeper look into IP-Routing.
3 Dynamic routing - On our journey towards the „real Internet“ we learn how automatic routing works inside the different domains of the net.
4 TCP/UDP - After looking at IP fragmentation, we climb up one Layer to Layer 4: The end-to-end-communication is of our interest now.
5 DNS - Most of the time we address machines using names instead of (IP-)numbers... but how does the Domain Name System work? After this lab you should know exactly what happens, when you type http://ilab.net.in.tum.de into your browsers url-field...
6 NAT/ DHCP/ IPv6 - Coming closer to our home setup we look inside Network Address Translation as technique to use one external address to allow multiple intern machines to access the Internet. NAT is especially important today since we are getting out of Ipv4 addresses. Besides ist usefulness NAT causes some trouble as we will see. Another important mechanism is Dynamic Host Control Protocol allowing computers to be partly automatically configured. As the migration towards Ipv6 is ongoing and since the new protocol provides intersting mechanisms we have a look at it here.
7 Security I - In this lab we get to know how Firewalls help to secure our network-nodes. As example we use a webserver using TLS.
8 Security II - How can we establish secure connections over insecure networks?
9 Wireless Lan - Often used but how is it really working? We address physical aspects as well as protocol aspects before we come to security. We will explore how fast we can crack a WEP-Key and more important why. We will look at WPA and Radius for a more secure wireless infrastructure.
This element's history...
2009-10-22 11:47:08: Marc Fouquet
2009-10-22 11:46:42: Marc Fouquet
2009-10-22 11:45:44: Marc Fouquet
2009-10-22 11:44:28: Marc Fouquet
2008-11-10 18:02:31: Marc-Oliver Pahl
*:0.0621sec | © Chair of Network Architectures and Services | labsystem mop