Cisco CCNA 1
Lab Book
www.supinfo.com Copyright SUPINFO. All rights reserved Campus Booster ID : 318 Version 3.0
Contents 1. MODULE 1: INTRODUCING TO NETWORKS ......................................................................................... 3 1.1. EXERCISE 1 – HARDWARE CONFIGURATION ..................................................................................................... 3 1.2. EXERCISE 2 – BASE CONVERTING .................................................................................................................... 4 1.3. QUESTION 1 – TERMS AND UNITS ..................................................................................................................... 4 2. MODULE 2: OSI AND TCP/IP MODELS..................................................................................................... 6 2.1. QUESTION 1 – OSI MODEL ............................................................................................................................... 6 2.2. QUESTION 2 ..................................................................................................................................................... 6 2.3. QUESTION 3 ..................................................................................................................................................... 6 2.4. QUESTION 4 – COMPARAISON BETWEEN OSI AND TCP/IP MODELS ................................................................. 7 2.5. QUESTION 5 ..................................................................................................................................................... 7 3. MODULE 3: LAYER 1 – MEDIA AND NETWORK DEVICES ................................................................ 8 3.1. EXERCISE 1 – COLOR CODES INDENTIFICATION................................................................................................ 8 3.2. TP 1 – CREATION OF UTP CABLE .................................................................................................................... 9 3.3. QUESTION 1 – THEORY ON UTP CABLES .......................................................................................................... 9 3.4. EXERCISE 2 – VERIFICATION OF CABLES .......................................................................................................... 9 3.5. EXERCISE 3 – OPTICAL MEDIUM .................................................................................................................... 10 3.6. EXERCISE 4 – WIRELESS NETWORKS – GENERALITIES ................................................................................... 10 3.7. EXERCISE 5 – WIRELESS NETWORKS – CASE OF INSTALLATION ..................................................................... 10 4. MODULE 4: LAYER 2 – ETHERNET TECHNOLOGIES ....................................................................... 12 4.1. EXERCISE 1 – FRAME ANALYSIS .................................................................................................................... 12 4.2. EXERCISE 2 – COLLISION DOMAINS................................................................................................................ 13 5. MODULE 6: LAYER 3 – IP PROTOCOL................................................................................................... 16 5.1. EXERCISE 1 – ADDRESSES RESOLUTION ......................................................................................................... 16 5.2. EXERCISE 2 – ADRESSES CLASSES .................................................................................................................. 16 5.3. EXERCISE 3 – BROADCAST DOMAINS ............................................................................................................. 17 6. MODULE 7: LAYER 3 – SUBNETTING .................................................................................................... 18 6.1. EXERCISE 1 – OBSERVATIONS ........................................................................................................................ 18 6.2. EXERCISE 2 – EASY EXERCISES ...................................................................................................................... 18 6.3. EXERCISE 3 – CASE N°1 ................................................................................................................................. 19 6.4. EXERCISE 4 – CASE N° 2 ................................................................................................................................ 20 6.5. EXERCISE 5 – CASE N° 3 ................................................................................................................................ 21 6.6. EXERCISE 6 .................................................................................................................................................... 22 6.7. EXERCISE 7 .................................................................................................................................................... 24 7. MODULE 8: LAYER 3 – INTRODUCTION TO ROUTING .................................................................... 25 7.1. EXERCISE 1 – CASE STUDY ............................................................................................................................ 25 8. MODULE 9: LAYERS 4, 5, 6 AND 7............................................................................................................ 26 8.1. QUESTION 1 – PORT NUMBERS ....................................................................................................................... 26 8.2. EXERCISE 1 – WEB REQUEST ANALYSIS ......................................................................................................... 26 8.3. EXERCISE 2 – RESEARCH AND DOCUMENTATION ........................................................................................... 30 8.4. EXERCISE 3 – DATA ANLYSIS ......................................................................................................................... 33
Lab Book – Cisco CCNA 1
3 / 35
1. Module 1: Introducing to networks 1.1. Exercise 1 – Hardware configuration •
We wish to assemble a PC computer using various hardware knowing the needs are : ο Network connectivity ο Audio connectivity ο Video connectivity ο Internal and external hard disk drive (Free choice concerning connection) ο Possibility to read external optical media (CD-ROM, DVD-ROM)
Indicate below the different components needed for this configuration: Configuration
Lab Book – Cisco CCNA 1
4 / 35
1.2. Exercise 2 – Base converting • Base 10 10 10 10 10 2 2 2 2 2 16 16 16 16 16 16 16 16 16 16
Fill in the following 2 tables: Number Base 125 2 92 2 27 2 203 2 255 2 0000 0110 10 0110 0101 10 1000 1110 10 1010 1111 10 1100 0000 10 A1 10 F2 10 E2A 10 3B 10 14D 10 1F 2 2C 2 9E 2 3B 2 B6 2
Number
Base 10 10 10 10 10 16 16 16 16 16 2 2 2 2 2 10 10 10 10 10
Number Base 18 8 24 7 44 6 19 5 120 4 80 10 D7 10 3F 10 AD 10 FF 10 0001 0110 16 0010 0101 16 1100 1110 16 1000 1111 16 1100 0011 16 112 16 28 16 236 16 59 16 18 16
Number
1.3. Question 1 – Terms and units •
What is the acronym used to indicate a geographically limited area, what does this acronym mean? ________________________________________________________________________________
•
What type of emergent network do we usually find in public area in town? ________________________________________________________________________________
•
What kind of network needs a lot of bandwidth? ________________________________________________________________________________
•
What kind of network do we use with Bluetooth peripheral? ________________________________________________________________________________
•
Which term is used to name the capacity of throughput of a network? ________________________________________________________________________________
•
Which unit is used to measure it? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
5 / 35
•
What is the equivalent for 512 Kbits/s in the standard unit? ________________________________________________________________________________
•
A download process occurs at a rate of 37 KB/s. In theory, the link rate is 512 Kbits/s. What is the percentage of bandwidth used? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
6 / 35
2. Module 2: OSI and TCP/IP models 2.1. Question 1 – OSI model •
Fill in the name and main function of the corresponding OSI layer:
Layer number 7 6 5 4 3 2 1
Name
Main function
2.2. Question 2 •
Give the Protocol Data Unit corresponding to each layer: Layer number 7 6 5 4 3 2 1
PDU name
2.3. Question 3 •
For each layer, give an example of used protocols and devices:
Layer number 7 6 5 4 3 2 1
Protocol
Devices
Lab Book – Cisco CCNA 1
7 / 35
2.4. Question 4 – Comparaison between OSI and TCP/IP models •
Give the corresponding layer of the OSI model in the TCP/IP model : OSI model layers Application Presentation Session Transport Network Data link Physical
TCP/IP model layers
2.5. Question 5 •
What are the uses of the OSI model? ________________________________________________________________________________
•
Why do two models exist? ________________________________________________________________________________
•
Why was the TCP/IP model created? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
8 / 35
3. Module 3: Layer 1 – Media and network devices 3.1. Exercise 1 – Color codes indentification
The 2 diagrams above represent the 2 extremities of a category 5 RJ45 cable facing you. Identify the type of the cable.
1 2 3 4 5 6 7 8
The 2 diagrams above represent the 2 extremities of a category 5 RJ45 cable facing you. Identify the type of the cable.
The 2 diagrams above represent the 2 extremities of a category 5 RJ45 cable facing you. Identify the type of the cable.
Lab Book – Cisco CCNA 1
9 / 35
3.2. TP 1 – Creation of UTP cable • • •
Select a type of cable and realize it: ο Straight through cable ο Crossover cable You can find help about normalized colors in the essential course. Then test your cable with a cable tester, to ensure that it is properly working.
3.3. Question 1 – Theory on UTP cables •
What is the advantage of using twisted pairs? ________________________________________________________________________________ ________________________________________________________________________________
•
What sort of devices can cause noise on a signal transmitted on a copper cable? ________________________________________________________________________________ ________________________________________________________________________________
•
According to the EIA/TIA-568 norm, which pairs are used to send/receive data? ________________________________________________________________________________ ________________________________________________________________________________
3.4. Exercise 2 – Verification of cables • •
The dB is a measurement unit to calculate power variations of a signal (also called gain). It is used to check the quality of a cable or, more generally, for a transmission (radio or with optic fiber). Here are the formulas allowing you to do the calculations:
G = 10 log (Pfinal/Pinit) G = Gain in dB, P = Power of the signal in Watts G = 20 log (Vfinal/Vinit) V = Voltage of the signal in Volts Inverse of f(x) = log (x) is f(y) = 10y •
Then fill in the table:
Media type
Initial signal
Final signal
UTP Cable
1 Volt
2 μV
UTP Cable
5 Volts
Radio Liaison
1 mW
Optical Fiber
1 mW
Gain
3 dB 2 μW -84 dB
Possible cause(s)
Lab Book – Cisco CCNA 1
10 / 35
3.5. Exercise 3 – Optical medium •
Fill in the table of comparison between mono-mode and multimode transmissions:
Feature Light source used Jack used Number of light rays Maximum distance
Mono-mode
Multi-mode
Utilization place •
What are the three different materials in fiber cable, and what are there functions? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
3.6. Exercise 4 – Wireless networks – Generalities •
Give the specifications of the 3 types of standardized Wireless IEEE 802.11 networks now used: Norm
Maximum speed
Used frequency band
•
An enterprise is using a wireless IEEE 802.11b network. The bandwidth needs to be upgraded without changing all the users’ devices. Which norm would you choose for the new Access Points to meet the requirements? ________________________________________________________________________________ ________________________________________________________________________________
•
What cable device can be compared to an Access Point? ________________________________________________________________________________
3.7. Exercise 5 – Wireless networks – Case of installation • •
In a hall which is 80 meters width, without any obstacles (optimal conditions of propagation), your enterprise wants you to install a WLAN. You have 2 Access Points at your disposal, and you have to implement roaming too. Draw a schema of your implementation. Pay attention to give maximum detailed information:
Lab Book – Cisco CCNA 1
11 / 35
Implementation scheme
•
What is the maximum range of action of an Access Point in these optimal conditions? ________________________________________________________________________________
•
What is the maximum distance between the 2 Access Points? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
What is the maximum length that we can cover? ________________________________________________________________________________
•
Check that the width of the roaming zone is large enough: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
Interferences are detected on the WLAN. What sort of devices can be the cause of those interferences? ________________________________________________________________________________ ________________________________________________________________________________
Lab Book – Cisco CCNA 1
12 / 35
4. Module 4: Layer 2 – Ethernet Technologies 4.1. Exercise 1 – Frame Analysis •
Here is a capture of an ARP frame:
Frame capture Frame 1 (60 bytes on wire, 60 bytes captured) Arrival Time: Aug 23, 2004 10:51:56.093398000 Time delta from previous packet: 0.000000000 seconds Time since reference or first frame: 0.000000000 seconds Frame Number: 1 Packet Length: 60 bytes Capture Length: 60 bytes Ethernet II, Src: 00:04:23:8b:ac:1b, Dst: ff:ff:ff:ff:ff:ff Destination: ff:ff:ff:ff:ff:ff (Broadcast) Source: 00:04:23:8b:ac:1b (172.16.104.4) Type: ARP (0x0806) Trailer: 00000000000000000000000000000000... Address Resolution Protocol (request) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: 00:04:23:8b:ac:1b (172.16.104.4) Sender IP address: 172.16.104.4 (172.16.104.4) Target MAC address: 00:00:00:00:00:00 (00:00:00_00:00:00) Target IP address: 172.16.157.63 (172.16.157.63) •
What is the role of the ARP frames? ________________________________________________________________________________
•
What is the length of an ARP frame? ________________________________________________________________________________
•
In an Ethernet frame, the type of protocol (ARP, TCP, etc.) is specified in a hexadecimal value. What is the hexadecimal value for the ARP protocol? ________________________________________________________________________________
•
Which layer 3 protocol are the ARP requests based on? What is the hexadecimal value used to represent it? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
13 / 35
4.2. Exercise 2 – Collision domains •
In the following cases, fill in the number of collision domains resulting : Context 2 stations, a hub, 2 stations 4 stations linked to a hub with a server 1 hub with 3 stations, linked to another hub linking 4 stations 1 hub with 4 stations, linked to 1 router linking 1 hub with 3 stations
Number of collision domains
Network topology n°1
•
What is the number of collision domains in this topology? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
14 / 35
Network topology n°2
•
What is the number of collision domains in this topology? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
15 / 35
Network topology n°3
•
What is the number of collision domains in the network above : ________________________________________________________________________________
Lab Book – Cisco CCNA 1
16 / 35
5. Module 6: Layer 3 – IP protocol 5.1. Exercise 1 – Addresses resolution •
The following table shows IP and MAC addresses of 5 interconnected stations, belonging to the same IP subnet:
Address Station 1 MAC 0028AF86CE51 IP 126.0.0.128 •
Station 2 0028AF86CF51 126.0.0.213
Station 3 Station 4 0028AFG6CD51 0028AF86CFF1 126.0.0.317 126.0.0.244
Station 5 0028AF86CD1 126.0.0.99
Pick up the three errors in the 5 stations addresses:
Station Problem / explanations
5.2. Exercise 2 – Adresses classes •
Fill in the following table: IP Address 10.0.3.45
Class
Private/public/reserved?
B
Private
D
Reserved
C
Private
E
Reserved
121.34.0.34 134.156.87.5 192.168.0.2 221.12.21.75 172.16.8.3 127.0.0.1 •
In the following addresses, which one could be assigned by your ISP? Address 10.0.1.2 115.3.4.5 244.0.1.7 151.34.65.2 127.34.78.2 172.23.89.23 181.45.63.89 192.168.34.73
Assigned by an ISP?
Lab Book – Cisco CCNA 1
17 / 35
5.3. Exercise 3 – Broadcast domains
Network topology n°1
•
How many broadcast domains exist in this topology? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
18 / 35
6. Module 7: Layer 3 – Subnetting 6.1. Exercise 1 – Observations • •
Let a network of class B with a subnet mask of 255.255.240.0. How many bits have been borrowed from the host part? ________________________________________________________________________________
•
How many subnets can we use in this context? ________________________________________________________________________________
•
Now let the network 192.168.33.0/28. In the following table, which addresses can be assigned to a host?
IP Address 192.168.33.3 192.168.33.15 192.168.33.16 192.168.33.17 192.168.33.63 192.168.33.65
Usable?
If not, why?
• •
Let a station of a network with an IP of 134.157.130.45. What is the address class used? ________________________________________________________________________________
•
The subnet mask used is 255.255.255.128. How many subnets can be used? ________________________________________________________________________________
•
What is the subnet address for this station? ________________________________________________________________________________
6.2. Exercise 2 – Easy exercises •
The IP address of a station is 136.14.2.174/28. Is this a valid IP? What is the subnet address of this station? ________________________________________________________________________________
•
The IP address of a station is 10.1.35.14/17. Is this a valid IP? What is the broadcast address of this station? ________________________________________________________________________________
•
A router interface has an IP of 192.168.17.3/30. Is this a valid IP? What is the subnet address of this router interface? ________________________________________________________________________________
Lab Book – Cisco CCNA 1
19 / 35
6.3. Exercise 3 – Case n°1
Network topology n°1
•
How many subnets must be created at least? ________________________________________________________________________________
•
How many bits have to be borrowed and how many subnets will be created? ________________________________________________________________________________
•
What is the subnet mask created? ________________________________________________________________________________
• •
Now let’s use the address class 192.168.1.0/24. Fill in the table of assignation of the IP ranges: Subnet LAN n°1 LAN n°2 LAN n°3 LAN n°4 LAN n°5 WAN n°1 WAN n°2 WAN n°3
Subnet IP Broadcast IP
Range of usable addresses
Lab Book – Cisco CCNA 1
20 / 35
6.4. Exercise 4 – Case n° 2 • •
•
•
An enterprise has a network composed with 60 hosts, bearing the TCP/IP protocol. Here are the information for this network: o Used addresses class: 193.250.17.0 o 3 departments: Administrative, commercial and production o These departments are linked by routers (2 WAN links) Here are constraints for the network: o Each department must have its own subnet. o Some stations of the production department have already a range of IP addresses statically assigned (not to be modified). This range is from 193.250.17.110 to 193.250.17.117. o The administrative department contains 25 hosts, the commercial department 15, and the production department 20. Suggest a subnet mask and justify your choice: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
How many hosts can be contained in each subnet? ________________________________________________________________________________
•
Fill in the following subnet assigning table:
Subnet Administrative Commercial Production WAN line n°1 WAN line n°2
Subnet IP Broadcast IP
Range of usable addresses
Addresses that must be configured on the DHCP
Lab Book – Cisco CCNA 1
•
21 / 35
Complete the following scheme: Network =
Commercial
IP =
IP = Network =
IP = Network =
IP =
IP =
IP =
IP =
Administrative
Network =
Production
Network =
6.5. Exercise 5 – Case n° 3 • • •
An enterprise has a total number of 600 machines equally divided into 6 services. The network architecture must be built on a unique IP class. Furthermore, each service must have access to specific resources (that other services can’t access). Which address class will be employed? ________________________________________________________________________________
•
Explain, with calculation, which subnet mask you will use to answer to the constraints: ________________________________________________________________________________
•
What are the 6 subnets that you will use for the network of this enterprise? Subnet n°1 Subnet n°2 Subnet n°3 Subnet n°4 Subnet n°5 Subnet n°6
Lab Book – Cisco CCNA 1
22 / 35
6.6. Exercise 6 •
We have the C class network address 201.125.52.0. We want to make 20 subnets. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have the A class network address 10.0.0.0. We want to make 502 subnets. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have the C class network address 192.168.5.0. We want to cut it into 4 subnets. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have the B class network address 172.16.0.0. We want to separate it into subnets of 20 hosts each. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have the C class network address 192.168.4.0. We want to make subnets containing 80 hosts each. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have the A class network address 21.0.0.0. We want to make subnets containing 500 hosts each. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have the A class network address 21.0.0.0. We want to make subnets containing 12 hosts each. What subnet mask will we use?
Lab Book – Cisco CCNA 1
23 / 35
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We want the 192.168.1.25, 192.168.1.26 and 192.168.1.27 IP addresses to be in the same subnet. What minimal subnet mask can we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We want the 192.168.1.23, 192.168.1.24, 192.168.1.25 IP addresses to be in the same subnet. What minimal subnet mask can we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
Now for the 192.168.1.30, 192.168.1.31, 192.168.1.32 IP addresses, what subnet mask should we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have a subnet mask of 225.255.255.224 for a C class network address, 192.168.1 .x.. give the possible pool of addresses: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have a the 25.0.0.0 network address, we wish to make 4 subnet with 80 hosts, give the best mask(s) ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
We have a the 192.168.10.0 network address, we wish to make 2 subnet with 50 hosts, give the best mask(s) ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
Lab Book – Cisco CCNA 1
•
24 / 35
We have a the 192.168.10.0 network address, we wish to make 3 subnet with 50 hosts, give the best mask(s) ________________________________________________________________________________ ________________________________________________________________________________
6.7. Exercise 7 •
Find the pool of addresses of each of these IP addresses associated with their subnet mask and indicate if the address is : • A host address • An network address • A broadcast address
A class: 10.35.177.132 /19 10.164.19.143 /11 10.244.137.111 /10 10.163.13.125 /12 10.18.7.84 /15 10.141.215.63 /14 10.15.72.32 /20 10.123.2.255 /13 10.1.114.0 /15 10.172.12.144 /12 10.37.88.101 /21 B class: 172.16.67.191 /22 172.16.14.217 /25 172.16.153.129 /19 172.16.149.93 /20 172.16.161.35 /21 172.16.53.0 /23 172.16.172.138 /22 172.16.210.64 /18 172.16.178.201 /28 172.16.31.93 /26 172.16.207.155 /20 172.16.33.252 /23 C Class: 192.168.1.217 /28 192.168.2.159 /29 192.168.1.114 /27 192.168.3.142 /26 192.168.2.61 /30 192.168.4.225 /28 192.168.3.187 /29
Lab Book – Cisco CCNA 1
25 / 35
7. Module 8: Layer 3 – Introduction to routing 7.1. Exercise 1 – Case study
D B
Path
A
C
G
F
E
H
Complete the table with the good layer 2 and 3 addresses:
Source MAC address A Arriving on B Depart from B Arriving on C Depart from C Arriving on D Depart from D Arriving on E Depart from E Arriving on F Depart from F Arriving on G Depart from G H
Destination MAC address
Source IP address
Destination IP address
Lab Book – Cisco CCNA 1
26 / 35
8. Module 9: Layers 4, 5, 6 and 7 8.1. Question 1 – Port numbers •
Here is a list of port numbers and protocol names. Find the corresponding port number or protocol: Port
Layer 4 protocol
Port number 21
POP3 443 Telnet DNS 144 27015 HTTP SSH 69 25 •
Complete the table of the specific range of TCP ports: Application type Public Commercial
Corresponding port range
above 1023
8.2. Exercise 1 – Web request analysis •
A web request on the page http://www.labo-cisco.com (172.16.1.10) has been captured from a computer with the IP 172.16.104.38. Let’s look at the TCP and UDP segments:
Capture – Request traffic No. Time Source Destination Protocol Info 275 4.892953 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=20441 Win=52560 Len=0 276 4.893038 172.16.1.10 172.16.104.38 HTTP Continuation 277 4.893163 172.16.1.10 172.16.104.38 HTTP Continuation 278 4.893200 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=23361 Win=49640 Len=0 279 4.893286 172.16.1.10 172.16.104.38 HTTP Continuation 280 4.893335 172.16.1.10 172.16.104.38 HTTP Continuation 281 4.893365 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=25409 288 5.003410 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#1] 3073 > http [ACK] Seq=364 Ack=25409 Win=51352 Len=0 289 5.013453 172.16.1.10 172.16.104.38 TCP http > 3072 [ACK] Seq=80437 Ack=1373 Win=16148 Len=0
Lab Book – Cisco CCNA 1
27 / 35
290 5.013492 172.16.1.10 172.16.104.38 TCP http > 3073 [ACK] Seq=25409 Ack=364 Win=17157 Len=0 291 5.022946 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1373 Ack=80437 Win=63184 Len=0 292 5.027996 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#2] 3073 > http [ACK] Seq=364 Ack=25409 Win=64240 Len=0 293 5.040306 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/WebCisco_05N.gif HTTP/1.1 294 5.041092 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 295 5.041184 172.16.1.10 172.16.104.38 HTTP Continuation 296 5.041230 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1736 Ack=83045 Win=64240 Len=0 301 5.053659 62.161.94.199 172.16.104.38 TCP http > 3074 [SYN, ACK] Seq=0 Ack=1 Win=17520 Len=0 MSS=1460 302 5.053703 172.16.104.38 62.161.94.199 TCP 3074 > http [ACK] Seq=1 Ack=1 Win=64240 Len=0 303 5.054444 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_06.gif HTTP/1.1 304 5.055175 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 305 5.055212 172.16.1.10 172.16.104.38 HTTP Continuation 306 5.055254 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=732 Ack=27065 Win=64240 Len=0 307 5.059188 172.16.104.38 62.161.94.199 HTTP GET /hit.xiti?s=59384&p=&hl=16x24x10&r=1024x768xundefinedx32&ref= HTTP/1.1 308 5.063936 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_08.gif Capture – Detailed request No. Time Source Destination Protocol Info 148 4.639100 172.16.104.38 172.16.1.10 HTTP GET / HTTP/1.1 Frame 148 (351 bytes on wire, 351 bytes captured) Arrival Time: Aug 23, 2004 16:24:10.595293000 Time delta from previous packet: 0.000188000 seconds Time since reference or first frame: 4.639100000 seconds Frame Number: 148 Packet Length: 351 bytes Capture Length: 351 bytes Ethernet II, Src: 00:0a:e6:bb:cf:8d, Dst: 00:e0:18:c3:59:3b Destination: 00:e0:18:c3:59:3b (172.16.1.10) Source: 00:0a:e6:bb:cf:8d (172.16.104.38) Type: IP (0x0800) Internet Protocol, Src Addr: 172.16.104.38 (172.16.104.38), Dst Addr: 172.16.1.10 (172.16.1.10) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 337 Identification: 0x08e4 (2276) Flags: 0x04 (Don't Fragment) 0... = Reserved bit: Not set .1.. = Don't fragment: Set
Lab Book – Cisco CCNA 1
28 / 35
..0. = More fragments: Not set Fragment offset: 0 Time to live: 128 Protocol: TCP (0x06) Header checksum: 0x2f72 (correct) Source: 172.16.104.38 (172.16.104.38) Destination: 172.16.1.10 (172.16.1.10) Transmission Control Protocol, Src Port: 3072 (3072), Dst Port: http (80), Seq: 1, Ack: 1, Len: 297 Source port: 3072 (3072) Destination port: http (80) Sequence number: 1 (relative sequence number) Next sequence number: 298 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 20 bytes Flags: 0x0018 (PSH, ACK) 0... .... = Congestion Window Reduced (CWR): Not set .0.. .... = ECN-Echo: Not set ..0. .... = Urgent: Not set ...1 .... = Acknowledgment: Set .... 1... = Push: Set .... .0.. = Reset: Not set .... ..0. = Syn: Not set .... ...0 = Fin: Not set Window size: 64240 Checksum: 0x9668 (correct) Hypertext Transfer Protocol GET / HTTP/1.1\r\n Request Method: GET Accept: */*\r\n Accept-Language: fr\r\n Accept-Encoding: gzip, deflate\r\n User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)\r\n Host: www.labo-cisco.com\r\n Connection: Keep-Alive\r\n Cache-Control: no-cache\r\n Cookie: ASPSESSIONIDCQTRQQQB=PLCMIDDAPCCHGFEBDBIJFFAI\r\n \r\n •
Which ports are used for the communication during the request? ________________________________________________________________________________
•
What is the initial window size? ________________________________________________________________________________
•
Why are there 2 acknowledgements present? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
•
What is the difference between the TCP and UDP frames? ________________________________________________________________________________ ________________________________________________________________________________
Lab Book – Cisco CCNA 1
29 / 35
•
Give an example of an utilization of UDP: ________________________________________________________________________________
•
Transmission analysis
• • •
Edward wants to transfer a file to Bill using Microsoft Messenger. The transfer begins at a rate of 115 Kbits/s. While the transfer occurs, Bill starts a peer-to-peer application, which exploits a large bandwidth. Edward notices that his transfer rate is going down to 25 Kbits/s. He notices Bill, who closes his p2p application and ends the transfer. Explain the three different steps of the transfer concerning the window sizing:
• • •
Explanation
Lab Book – Cisco CCNA 1
8.3. Exercise 2 – Research and documentation • MD5
Explain the principle of the MD5 algorithm:
30 / 35
Lab Book – Cisco CCNA 1
• VPN
What is a VPN? How does it work and what is its utility?
31 / 35
Lab Book – Cisco CCNA 1 •
32 / 35
Decrypt the following message. The used algorithm is the Cesar number one:
Code
FY FUVILUNICLY MOJCHZI XYM NYWBHIFIACYM WCMWI PIOM LYGYLWCY X'UPICL XYWIXY WY GYMMUAY.
Lab Book – Cisco CCNA 1
33 / 35
8.4. Exercise 3 – Data anlysis 1) Data analysis •
A web request on the page http://www.labo-cisco.com (172.16.1.10) has been captured from a computer with the IP 172.16.104.38. Let’s look at the HTTP information.
Capture – Request traffic No. Time Source Destination Protocol Info 275 4.892953 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=20441 Win=52560 Len=0 276 4.893038 172.16.1.10 172.16.104.38 HTTP Continuation 277 4.893163 172.16.1.10 172.16.104.38 HTTP Continuation 278 4.893200 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=23361 Win=49640 Len=0 279 4.893286 172.16.1.10 172.16.104.38 HTTP Continuation 280 4.893335 172.16.1.10 172.16.104.38 HTTP Continuation 281 4.893365 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=25409 288 5.003410 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#1] 3073 > http [ACK] Seq=364 Ack=25409 Win=51352 Len=0 289 5.013453 172.16.1.10 172.16.104.38 TCP http > 3072 [ACK] Seq=80437 Ack=1373 Win=16148 Len=0 290 5.013492 172.16.1.10 172.16.104.38 TCP http > 3073 [ACK] Seq=25409 Ack=364 Win=17157 Len=0 291 5.022946 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1373 Ack=80437 Win=63184 Len=0 292 5.027996 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#2] 3073 > http [ACK] Seq=364 Ack=25409 Win=64240 Len=0 293 5.040306 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/WebCisco_05N.gif HTTP/1.1 294 5.041092 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 295 5.041184 172.16.1.10 172.16.104.38 HTTP Continuation 296 5.041230 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1736 Ack=83045 Win=64240 Len=0 301 5.053659 62.161.94.199 172.16.104.38 TCP http > 3074 [SYN, ACK] Seq=0 Ack=1 Win=17520 Len=0 MSS=1460 302 5.053703 172.16.104.38 62.161.94.199 TCP 3074 > http [ACK] Seq=1 Ack=1 Win=64240 Len=0 303 5.054444 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_06.gif HTTP/1.1 304 5.055175 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 305 5.055212 172.16.1.10 172.16.104.38 HTTP Continuation 306 5.055254 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=732 Ack=27065 Win=64240 Len=0 307 5.059188 172.16.104.38 62.161.94.199 HTTP GET /hit.xiti?s=59384&p=&hl=16x24x10&r=1024x768xundefinedx32&ref= HTTP/1.1 308 5.063936 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_08.gif
Lab Book – Cisco CCNA 1
34 / 35
Capture – Detailed request No. Time Source Destination Protocol Info 148 4.639100 172.16.104.38 172.16.1.10 HTTP GET / HTTP/1.1 Frame 148 (351 bytes on wire, 351 bytes captured) Arrival Time: Aug 23, 2004 16:24:10.595293000 Time delta from previous packet: 0.000188000 seconds Time since reference or first frame: 4.639100000 seconds Frame Number: 148 Packet Length: 351 bytes Capture Length: 351 bytes Ethernet II, Src: 00:0a:e6:bb:cf:8d, Dst: 00:e0:18:c3:59:3b Destination: 00:e0:18:c3:59:3b (172.16.1.10) Source: 00:0a:e6:bb:cf:8d (172.16.104.38) Type: IP (0x0800) Internet Protocol, Src Addr: 172.16.104.38 (172.16.104.38), Dst Addr: 172.16.1.10 (172.16.1.10) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 337 Identification: 0x08e4 (2276) Flags: 0x04 (Don't Fragment) 0... = Reserved bit: Not set .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 128 Protocol: TCP (0x06) Header checksum: 0x2f72 (correct) Source: 172.16.104.38 (172.16.104.38) Destination: 172.16.1.10 (172.16.1.10) Transmission Control Protocol, Src Port: 3072 (3072), Dst Port: http (80), Seq: 1, Ack: 1, Len: 297 Source port: 3072 (3072) Destination port: http (80) Sequence number: 1 (relative sequence number) Next sequence number: 298 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 20 bytes Flags: 0x0018 (PSH, ACK) 0... .... = Congestion Window Reduced (CWR): Not set .0.. .... = ECN-Echo: Not set ..0. .... = Urgent: Not set ...1 .... = Acknowledgment: Set .... 1... = Push: Set .... .0.. = Reset: Not set .... ..0. = Syn: Not set .... ...0 = Fin: Not set Window size: 64240 Checksum: 0x9668 (correct) Hypertext Transfer Protocol GET / HTTP/1.1\r\n
Lab Book – Cisco CCNA 1
35 / 35
Request Method: GET Accept: */*\r\n Accept-Language: fr\r\n Accept-Encoding: gzip, deflate\r\n User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)\r\n Host: www.labo-cisco.com\r\n Connection: Keep-Alive\r\n Cache-Control: no-cache\r\n Cookie: ASPSESSIONIDCQTRQQQB=PLCMIDDAPCCHGFEBDBIJFFAI\r\n \r\n •
Which HTML instruction is used to get a picture from the website? ________________________________________________________________________________
•
What is the role of the "Connection" frames? ________________________________________________________________________________
•
By making a comparison with the TCP protocol, what are the different steps of getting the HTTP frames? ________________________________________________________________________________ ________________________________________________________________________________
•
What is the hexadecimal value of the cookie sent by Xiti?