Cisco CCNA 1
LLaabb BBooookk
www.supinfo.com Copyright SUPINFO. All rights reserved Campus Booster ID : 318 Version 3.0
Contents
1. MODULE 1: INTRODUCING TO NETWORKS ......................................................................................... 3 1.1. EXERCISE 1 – HARDWARE CONFIGURATION..................................................................................................... 3 1.2. EXERCISE 2 – BASE CONVERTING.................................................................................................................... 4 1.3. QUESTION 1 – TERMS AND UNITS..................................................................................................................... 4
2. MODULE 2: OSI AND TCP/IP MODELS..................................................................................................... 6 2.1. QUESTION 1 – OSI MODEL ............................................................................................................................... 6 2.2. QUESTION 2 ..................................................................................................................................................... 6 2.3. QUESTION 3 ..................................................................................................................................................... 6 2.4. QUESTION 4 – COMPARAISON BETWEEN OSI AND TCP/IP MODELS................................................................. 7 2.5. QUESTION 5 ..................................................................................................................................................... 7
3. MODULE 3: LAYER 1 – MEDIA AND NETWORK DEVICES ................................................................ 8 3.1. EXERCISE 1 – COLOR CODES INDENTIFICATION................................................................................................ 8 3.2. TP 1 – CREATION OF UTP CABLE.................................................................................................................... 9 3.3. QUESTION 1 – THEORY ON UTP CABLES.......................................................................................................... 9 3.4. EXERCISE 2 – VERIFICATION OF CABLES.......................................................................................................... 9 3.5. EXERCISE 3 – OPTICAL MEDIUM .................................................................................................................... 10 3.6. EXERCISE 4 – WIRELESS NETWORKS – GENERALITIES ................................................................................... 10 3.7. EXERCISE 5 – WIRELESS NETWORKS – CASE OF INSTALLATION..................................................................... 10
4. MODULE 4: LAYER 2 – ETHERNET TECHNOLOGIES....................................................................... 12 4.1. EXERCISE 1 – FRAME ANALYSIS .................................................................................................................... 12 4.2. EXERCISE 2 – COLLISION DOMAINS................................................................................................................ 13
5. MODULE 6: LAYER 3 – IP PROTOCOL................................................................................................... 16 5.1. EXERCISE 1 – ADDRESSES RESOLUTION ......................................................................................................... 16 5.2. EXERCISE 2 – ADRESSES CLASSES.................................................................................................................. 16 5.3. EXERCISE 3 – BROADCAST DOMAINS ............................................................................................................. 17
6. MODULE 7: LAYER 3 – SUBNETTING .................................................................................................... 18 6.1. EXERCISE 1 – OBSERVATIONS........................................................................................................................ 18 6.2. EXERCISE 2 – EASY EXERCISES ...................................................................................................................... 18 6.3. EXERCISE 3 – CASE N°1 ................................................................................................................................. 19 6.4. EXERCISE 4 – CASE N° 2 ................................................................................................................................ 20 6.5. EXERCISE 5 – CASE N° 3 ................................................................................................................................ 21 6.6. EXERCISE 6 .................................................................................................................................................... 22 6.7. EXERCISE 7 .................................................................................................................................................... 24
7. MODULE 8: LAYER 3 – INTRODUCTION TO ROUTING.................................................................... 25 7.1. EXERCISE 1 – CASE STUDY ............................................................................................................................ 25
8. MODULE 9: LAYERS 4, 5, 6 AND 7............................................................................................................ 26 8.1. QUESTION 1 – PORT NUMBERS ....................................................................................................................... 26 8.2. EXERCISE 1 – WEB REQUEST ANALYSIS ......................................................................................................... 26 8.3. EXERCISE 2 – RESEARCH AND DOCUMENTATION ........................................................................................... 30 8.4. EXERCISE 3 – DATA ANLYSIS ......................................................................................................................... 33
Lab Book – Cisco CCNA 1 3 / 35
1. Module 1: Introducing to networks
1.1. Exercise 1 – Hardware configuration
• We wish to assemble a PC computer using various hardware knowing the needs are : ο Network connectivity ο Audio connectivity ο Video connectivity ο Internal and external hard disk drive (Free choice concerning connection) ο Possibility to read external optical media (CD-ROM, DVD-ROM)
Indicate below the different components needed for this configuration: Configuration
Lab Book – Cisco CCNA 1 4 / 35
1.2. Exercise 2 – Base converting
• Fill in the following 2 tables: Base Number Base Number 10 125 2 10 92 2 10 27 2 10 203 2 10 255 2 2 0000 0110 10 2 0110 0101 10 2 1000 1110 10 2 1010 1111 10 2 1100 0000 10
16 A1 10 16 F2 10 16 E2A 10 16 3B 10 16 14D 10 16 1F 2 16 2C 2 16 9E 2 16 3B 2 16 B6 2
Base Number Base Number 10 18 8 10 24 7 10 44 6 10 19 5 10 120 4 16 80 10 16 D7 10 16 3F 10 16 AD 10 16 FF 10 2 0001 0110 16 2 0010 0101 16 2 1100 1110 16 2 1000 1111 16 2 1100 0011 16
10 112 16 10 28 16 10 236 16 10 59 16 10 18 16
1.3. Question 1 – Terms and units
• What is the acronym used to indicate a geographically limited area, what does this acronym mean? ________________________________________________________________________________
• What type of emergent network do we usually find in public area in town?
________________________________________________________________________________
• What kind of network needs a lot of bandwidth? ________________________________________________________________________________
• What kind of network do we use with Bluetooth peripheral?
________________________________________________________________________________ • Which term is used to name the capacity of throughput of a network?
________________________________________________________________________________
• Which unit is used to measure it? ________________________________________________________________________________
Lab Book – Cisco CCNA 1 5 / 35
• What is the equivalent for 512 Kbits/s in the standard unit?
________________________________________________________________________________
• A download process occurs at a rate of 37 KB/s. In theory, the link rate is 512 Kbits/s. What is the percentage of bandwidth used? ________________________________________________________________________________
Lab Book – Cisco CCNA 1 6 / 35
2. Module 2: OSI and TCP/IP models
2.1. Question 1 – OSI model
• Fill in the name and main function of the corresponding OSI layer:
Layer number Name Main function 7 6 5 4 3 2 1
2.2. Question 2
• Give the Protocol Data Unit corresponding to each layer:
Layer number PDU name 7 6 5
4 3 2 1
2.3. Question 3
• For each layer, give an example of used protocols and devices:
Layer number Protocol Devices 7 6 5 4
3
2
1
Lab Book – Cisco CCNA 1 7 / 35
2.4. Question 4 – Comparaison between OSI and TCP/IP models
• Give the corresponding layer of the OSI model in the TCP/IP model :
OSI model layers TCP/IP model layers
Application Presentation
Session
Transport Network Data link Physical
2.5. Question 5
• What are the uses of the OSI model? ________________________________________________________________________________
• Why do two models exist?
________________________________________________________________________________ • Why was the TCP/IP model created?
________________________________________________________________________________
Lab Book – Cisco CCNA 1 8 / 35
3. Module 3: Layer 1 – Media and network devices
3.1. Exercise 1 – Color codes indentification
The 2 diagrams above represent the 2 extremities of a category 5 RJ45 cable facing you. Identify the type of the cable.
1 2 3 4 5 6 7 8
The 2 diagrams above represent the 2 extremities of a category 5 RJ45 cable facing you. Identify the type of the cable.
The 2 diagrams above represent the 2 extremities of a category 5 RJ45 cable facing you. Identify the type of the cable.
Lab Book – Cisco CCNA 1 9 / 35
3.2. TP 1 – Creation of UTP cable
• Select a type of cable and realize it: ο Straight through cable ο Crossover cable
• You can find help about normalized colors in the essential course. • Then test your cable with a cable tester, to ensure that it is properly working.
3.3. Question 1 – Theory on UTP cables
• What is the advantage of using twisted pairs? ________________________________________________________________________________ ________________________________________________________________________________
• What sort of devices can cause noise on a signal transmitted on a copper cable?
________________________________________________________________________________ ________________________________________________________________________________
• According to the EIA/TIA-568 norm, which pairs are used to send/receive data?
________________________________________________________________________________ ________________________________________________________________________________
3.4. Exercise 2 – Verification of cables
• The dB is a measurement unit to calculate power variations of a signal (also called gain). It is used to check the quality of a cable or, more generally, for a transmission (radio or with optic fiber).
• Here are the formulas allowing you to do the calculations: G = 10 log (Pfinal/Pinit) G = Gain in dB, P = Power of the signal in Watts G = 20 log (Vfinal/Vinit) V = Voltage of the signal in Volts Inverse of f(x) = log (x) is f(y) = 10y
• Then fill in the table:
Media type Initial signal Final signal Gain Possible cause(s)
UTP Cable 1 Volt 2 μV
UTP Cable 5 Volts 3 dB
Radio Liaison 1 mW 2 μW
Optical Fiber 1 mW -84 dB
Lab Book – Cisco CCNA 1 10 / 35
3.5. Exercise 3 – Optical medium
• Fill in the table of comparison between mono-mode and multimode transmissions:
Feature Mono-mode Multi-mode Light source used
Jack used Number of light rays Maximum distance
Utilization place
• What are the three different materials in fiber cable, and what are there functions?
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
3.6. Exercise 4 – Wireless networks – Generalities
• Give the specifications of the 3 types of standardized Wireless IEEE 802.11 networks now used:
Norm Maximum speed Used frequency band
• An enterprise is using a wireless IEEE 802.11b network. The bandwidth needs to be upgraded
without changing all the users’ devices. Which norm would you choose for the new Access Points to meet the requirements? ________________________________________________________________________________ ________________________________________________________________________________
• What cable device can be compared to an Access Point?
________________________________________________________________________________
3.7. Exercise 5 – Wireless networks – Case of installation
• In a hall which is 80 meters width, without any obstacles (optimal conditions of propagation),
your enterprise wants you to install a WLAN. You have 2 Access Points at your disposal, and you have to implement roaming too.
• Draw a schema of your implementation. Pay attention to give maximum detailed information:
Lab Book – Cisco CCNA 1 11 / 35
Implementation scheme
• What is the maximum range of action of an Access Point in these optimal conditions?
________________________________________________________________________________
• What is the maximum distance between the 2 Access Points? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• What is the maximum length that we can cover?
________________________________________________________________________________
• Check that the width of the roaming zone is large enough: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• Interferences are detected on the WLAN. What sort of devices can be the cause of those
interferences? ________________________________________________________________________________ ________________________________________________________________________________
Lab Book – Cisco CCNA 1 12 / 35
4. Module 4: Layer 2 – Ethernet Technologies
4.1. Exercise 1 – Frame Analysis
• Here is a capture of an ARP frame: Frame capture Frame 1 (60 bytes on wire, 60 bytes captured) Arrival Time: Aug 23, 2004 10:51:56.093398000 Time delta from previous packet: 0.000000000 seconds Time since reference or first frame: 0.000000000 seconds Frame Number: 1 Packet Length: 60 bytes Capture Length: 60 bytes Ethernet II, Src: 00:04:23:8b:ac:1b, Dst: ff:ff:ff:ff:ff:ff Destination: ff:ff:ff:ff:ff:ff (Broadcast) Source: 00:04:23:8b:ac:1b (172.16.104.4) Type: ARP (0x0806) Trailer: 00000000000000000000000000000000... Address Resolution Protocol (request) Hardware type: Ethernet (0x0001) Protocol type: IP (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (0x0001) Sender MAC address: 00:04:23:8b:ac:1b (172.16.104.4) Sender IP address: 172.16.104.4 (172.16.104.4) Target MAC address: 00:00:00:00:00:00 (00:00:00_00:00:00)
Target IP address: 172.16.157.63 (172.16.157.63)
• What is the role of the ARP frames? ________________________________________________________________________________
• What is the length of an ARP frame?
________________________________________________________________________________
• In an Ethernet frame, the type of protocol (ARP, TCP, etc.) is specified in a hexadecimal value. What is the hexadecimal value for the ARP protocol? ________________________________________________________________________________
• Which layer 3 protocol are the ARP requests based on? What is the hexadecimal value used to
represent it? ________________________________________________________________________________
Lab Book – Cisco CCNA 1 13 / 35
4.2. Exercise 2 – Collision domains
• In the following cases, fill in the number of collision domains resulting :
Context Number of collision domains 2 stations, a hub, 2 stations
4 stations linked to a hub with a server 1 hub with 3 stations, linked to another hub linking 4
stations
1 hub with 4 stations, linked to 1 router linking 1 hub with 3 stations
Network topology n°1
• What is the number of collision domains in this topology?
________________________________________________________________________________
Lab Book – Cisco CCNA 1 14 / 35
Network topology n°2
• What is the number of collision domains in this topology?
________________________________________________________________________________
Lab Book – Cisco CCNA 1 15 / 35
Network topology n°3
• What is the number of collision domains in the network above :
________________________________________________________________________________
Lab Book – Cisco CCNA 1 16 / 35
5. Module 6: Layer 3 – IP protocol
5.1. Exercise 1 – Addresses resolution
• The following table shows IP and MAC addresses of 5 interconnected stations, belonging to the same IP subnet:
Address Station 1 Station 2 Station 3 Station 4 Station 5
MAC 0028AF86CE51 0028AF86CF51 0028AFG6CD51 0028AF86CFF1 0028AF86CD1IP 126.0.0.128 126.0.0.213 126.0.0.317 126.0.0.244 126.0.0.99
• Pick up the three errors in the 5 stations addresses:
Station
Problem / explanations
5.2. Exercise 2 – Adresses classes
• Fill in the following table:
IP Address Class Private/public/reserved? 10.0.3.45
B Private 121.34.0.34 134.156.87.5 192.168.0.2
D Reserved 221.12.21.75 172.16.8.3
C Private 127.0.0.1
E Reserved
• In the following addresses, which one could be assigned by your ISP?
Address Assigned by an ISP? 10.0.1.2 115.3.4.5 244.0.1.7
151.34.65.2 127.34.78.2 172.23.89.23 181.45.63.89
192.168.34.73
Lab Book – Cisco CCNA 1 17 / 35
5.3. Exercise 3 – Broadcast domains
Network topology n°1
• How many broadcast domains exist in this topology?
________________________________________________________________________________
Lab Book – Cisco CCNA 1 18 / 35
6. Module 7: Layer 3 – Subnetting 6.1. Exercise 1 – Observations
• Let a network of class B with a subnet mask of 255.255.240.0. • How many bits have been borrowed from the host part?
________________________________________________________________________________
• How many subnets can we use in this context? ________________________________________________________________________________
• Now let the network 192.168.33.0/28. In the following table, which addresses can be assigned
to a host?
IP Address Usable? If not, why? 192.168.33.3
192.168.33.15 192.168.33.16 192.168.33.17 192.168.33.63 192.168.33.65
• Let a station of a network with an IP of 134.157.130.45. • What is the address class used?
________________________________________________________________________________
• The subnet mask used is 255.255.255.128. How many subnets can be used? ________________________________________________________________________________
• What is the subnet address for this station?
________________________________________________________________________________
6.2. Exercise 2 – Easy exercises
• The IP address of a station is 136.14.2.174/28. Is this a valid IP? What is the subnet address of this station? ________________________________________________________________________________
• The IP address of a station is 10.1.35.14/17. Is this a valid IP? What is the broadcast address
of this station? ________________________________________________________________________________
• A router interface has an IP of 192.168.17.3/30. Is this a valid IP? What is the subnet address
of this router interface? ________________________________________________________________________________
Lab Book – Cisco CCNA 1 19 / 35
6.3. Exercise 3 – Case n°1
Network topology n°1
• How many subnets must be created at least? ________________________________________________________________________________
• How many bits have to be borrowed and how many subnets will be created?
________________________________________________________________________________
• What is the subnet mask created? ________________________________________________________________________________
• Now let’s use the address class 192.168.1.0/24. • Fill in the table of assignation of the IP ranges:
Subnet Subnet IP Broadcast IP Range of usable addresses
LAN n°1
LAN n°2
LAN n°3
LAN n°4
LAN n°5
WAN n°1
WAN n°2
WAN n°3
Lab Book – Cisco CCNA 1 20 / 35
6.4. Exercise 4 – Case n° 2
• An enterprise has a network composed with 60 hosts, bearing the TCP/IP protocol. • Here are the information for this network:
o Used addresses class: 193.250.17.0 o 3 departments: Administrative, commercial and production o These departments are linked by routers (2 WAN links)
• Here are constraints for the network: o Each department must have its own subnet. o Some stations of the production department have already a range of IP addresses
statically assigned (not to be modified). This range is from 193.250.17.110 to 193.250.17.117.
o The administrative department contains 25 hosts, the commercial department 15, and the production department 20.
• Suggest a subnet mask and justify your choice: ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• How many hosts can be contained in each subnet?
________________________________________________________________________________
• Fill in the following subnet assigning table:
Subnet Subnet IP Broadcast IP
Range of usable addresses
Addresses that must be configured on the
DHCP
Administrative
Commercial
Production
WAN line n°1
WAN line n°2
Lab Book – Cisco CCNA 1 21 / 35
• Complete the following scheme:
Commercial
Administrative Production
Network =
Network =
Network =
Network = Network =
IP =
IP =IP =
IP =IP =
IP =IP =
6.5. Exercise 5 – Case n° 3
• An enterprise has a total number of 600 machines equally divided into 6 services. • The network architecture must be built on a unique IP class. Furthermore, each service must
have access to specific resources (that other services can’t access). • Which address class will be employed?
________________________________________________________________________________
• Explain, with calculation, which subnet mask you will use to answer to the constraints: ________________________________________________________________________________
• What are the 6 subnets that you will use for the network of this enterprise?
Subnet n°1 Subnet n°2 Subnet n°3 Subnet n°4 Subnet n°5 Subnet n°6
Lab Book – Cisco CCNA 1 22 / 35
6.6. Exercise 6
• We have the C class network address 201.125.52.0. We want to make 20 subnets. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have the A class network address 10.0.0.0. We want to make 502 subnets. What
subnet mask will we use?
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have the C class network address 192.168.5.0. We want to cut it into 4 subnets.
What subnet mask will we use?
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have the B class network address 172.16.0.0. We want to separate it into subnets
of 20 hosts each. What subnet mask will we use?
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have the C class network address 192.168.4.0. We want to make subnets
containing 80 hosts each. What subnet mask will we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have the A class network address 21.0.0.0. We want to make subnets containing
500 hosts each. What subnet mask will we use?
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have the A class network address 21.0.0.0. We want to make subnets containing
12 hosts each. What subnet mask will we use?
Lab Book – Cisco CCNA 1 23 / 35
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We want the 192.168.1.25, 192.168.1.26 and 192.168.1.27 IP addresses to be in the
same subnet. What minimal subnet mask can we use?
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We want the 192.168.1.23, 192.168.1.24, 192.168.1.25 IP addresses to be in the same
subnet. What minimal subnet mask can we use?
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• Now for the 192.168.1.30, 192.168.1.31, 192.168.1.32 IP addresses, what subnet mask
should we use? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have a subnet mask of 225.255.255.224 for a C class network address,
192.168.1 .x.. give the possible pool of addresses:
________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have a the 25.0.0.0 network address, we wish to make 4 subnet with 80 hosts, give
the best mask(s) ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• We have a the 192.168.10.0 network address, we wish to make 2 subnet with 50 hosts,
give the best mask(s) ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
Lab Book – Cisco CCNA 1 24 / 35
• We have a the 192.168.10.0 network address, we wish to make 3 subnet with 50 hosts, give the best mask(s)
________________________________________________________________________________ ________________________________________________________________________________
6.7. Exercise 7
• Find the pool of addresses of each of these IP addresses associated with their subnet mask and indicate if the address is : • A host address • An network address • A broadcast address
A class: 10.35.177.132 /19 10.164.19.143 /11 10.244.137.111 /10 10.163.13.125 /12 10.18.7.84 /15 10.141.215.63 /14 10.15.72.32 /20 10.123.2.255 /13 10.1.114.0 /15 10.172.12.144 /12 10.37.88.101 /21 B class: 172.16.67.191 /22 172.16.14.217 /25 172.16.153.129 /19 172.16.149.93 /20 172.16.161.35 /21 172.16.53.0 /23 172.16.172.138 /22 172.16.210.64 /18 172.16.178.201 /28 172.16.31.93 /26 172.16.207.155 /20 172.16.33.252 /23 C Class: 192.168.1.217 /28 192.168.2.159 /29 192.168.1.114 /27 192.168.3.142 /26 192.168.2.61 /30 192.168.4.225 /28 192.168.3.187 /29
Lab Book – Cisco CCNA 1 25 / 35
7. Module 8: Layer 3 – Introduction to routing
7.1. Exercise 1 – Case study
BA
E
FC
H
D
GPath
Complete the table with the good layer 2 and 3 addresses:
Source MAC address
Destination MAC
address
Source
IP address
Destination IP address
A
Arriving on B
Depart from B
Arriving on C
Depart from C
Arriving on D
Depart from D
Arriving on E
Depart from E
Arriving on F
Depart from F
Arriving on G
Depart from G
H
Lab Book – Cisco CCNA 1 26 / 35
8. Module 9: Layers 4, 5, 6 and 7
8.1. Question 1 – Port numbers
• Here is a list of port numbers and protocol names. Find the corresponding port number or protocol:
Port Layer 4 protocol Port number
21 POP3
443 Telnet DNS
144 27015
HTTP SSH
69 25
• Complete the table of the specific range of TCP ports:
Application type Corresponding port range
Public Commercial
above 1023
8.2. Exercise 1 – Web request analysis
• A web request on the page http://www.labo-cisco.com (172.16.1.10) has been captured from a computer with the IP 172.16.104.38. Let’s look at the TCP and UDP segments:
Capture – Request traffic No. Time Source Destination Protocol Info 275 4.892953 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=20441 Win=52560 Len=0 276 4.893038 172.16.1.10 172.16.104.38 HTTP Continuation 277 4.893163 172.16.1.10 172.16.104.38 HTTP Continuation 278 4.893200 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=23361 Win=49640 Len=0 279 4.893286 172.16.1.10 172.16.104.38 HTTP Continuation 280 4.893335 172.16.1.10 172.16.104.38 HTTP Continuation 281 4.893365 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=25409 288 5.003410 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#1] 3073 > http [ACK] Seq=364 Ack=25409 Win=51352 Len=0 289 5.013453 172.16.1.10 172.16.104.38 TCP http > 3072 [ACK] Seq=80437 Ack=1373 Win=16148 Len=0
Lab Book – Cisco CCNA 1 27 / 35
290 5.013492 172.16.1.10 172.16.104.38 TCP http > 3073 [ACK] Seq=25409 Ack=364 Win=17157 Len=0 291 5.022946 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1373 Ack=80437 Win=63184 Len=0 292 5.027996 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#2] 3073 > http [ACK] Seq=364 Ack=25409 Win=64240 Len=0 293 5.040306 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/WebCisco_05N.gif HTTP/1.1 294 5.041092 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 295 5.041184 172.16.1.10 172.16.104.38 HTTP Continuation 296 5.041230 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1736 Ack=83045 Win=64240 Len=0 301 5.053659 62.161.94.199 172.16.104.38 TCP http > 3074 [SYN, ACK] Seq=0 Ack=1 Win=17520 Len=0 MSS=1460 302 5.053703 172.16.104.38 62.161.94.199 TCP 3074 > http [ACK] Seq=1 Ack=1 Win=64240 Len=0 303 5.054444 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_06.gif HTTP/1.1 304 5.055175 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 305 5.055212 172.16.1.10 172.16.104.38 HTTP Continuation 306 5.055254 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=732 Ack=27065 Win=64240 Len=0 307 5.059188 172.16.104.38 62.161.94.199 HTTP GET /hit.xiti?s=59384&p=&hl=16x24x10&r=1024x768xundefinedx32&ref= HTTP/1.1 308 5.063936 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_08.gif Capture – Detailed request No. Time Source Destination Protocol Info 148 4.639100 172.16.104.38 172.16.1.10 HTTP GET / HTTP/1.1 Frame 148 (351 bytes on wire, 351 bytes captured) Arrival Time: Aug 23, 2004 16:24:10.595293000 Time delta from previous packet: 0.000188000 seconds Time since reference or first frame: 4.639100000 seconds Frame Number: 148 Packet Length: 351 bytes Capture Length: 351 bytes Ethernet II, Src: 00:0a:e6:bb:cf:8d, Dst: 00:e0:18:c3:59:3b Destination: 00:e0:18:c3:59:3b (172.16.1.10) Source: 00:0a:e6:bb:cf:8d (172.16.104.38) Type: IP (0x0800) Internet Protocol, Src Addr: 172.16.104.38 (172.16.104.38), Dst Addr: 172.16.1.10 (172.16.1.10) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 337 Identification: 0x08e4 (2276) Flags: 0x04 (Don't Fragment) 0... = Reserved bit: Not set .1.. = Don't fragment: Set
Lab Book – Cisco CCNA 1 28 / 35
..0. = More fragments: Not set Fragment offset: 0 Time to live: 128 Protocol: TCP (0x06) Header checksum: 0x2f72 (correct) Source: 172.16.104.38 (172.16.104.38) Destination: 172.16.1.10 (172.16.1.10) Transmission Control Protocol, Src Port: 3072 (3072), Dst Port: http (80), Seq: 1, Ack: 1, Len: 297 Source port: 3072 (3072) Destination port: http (80) Sequence number: 1 (relative sequence number) Next sequence number: 298 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 20 bytes Flags: 0x0018 (PSH, ACK) 0... .... = Congestion Window Reduced (CWR): Not set .0.. .... = ECN-Echo: Not set ..0. .... = Urgent: Not set ...1 .... = Acknowledgment: Set .... 1... = Push: Set .... .0.. = Reset: Not set .... ..0. = Syn: Not set .... ...0 = Fin: Not set Window size: 64240 Checksum: 0x9668 (correct) Hypertext Transfer Protocol GET / HTTP/1.1\r\n Request Method: GET Accept: */*\r\n Accept-Language: fr\r\n Accept-Encoding: gzip, deflate\r\n User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)\r\n Host: www.labo-cisco.com\r\n Connection: Keep-Alive\r\n Cache-Control: no-cache\r\n Cookie: ASPSESSIONIDCQTRQQQB=PLCMIDDAPCCHGFEBDBIJFFAI\r\n \r\n
• Which ports are used for the communication during the request? ________________________________________________________________________________
• What is the initial window size?
________________________________________________________________________________
• Why are there 2 acknowledgements present? ________________________________________________________________________________ ________________________________________________________________________________ ________________________________________________________________________________
• What is the difference between the TCP and UDP frames?
________________________________________________________________________________ ________________________________________________________________________________
Lab Book – Cisco CCNA 1 29 / 35
• Give an example of an utilization of UDP:
________________________________________________________________________________
• Transmission analysis
• Edward wants to transfer a file to Bill using Microsoft Messenger. • The transfer begins at a rate of 115 Kbits/s. • While the transfer occurs, Bill starts a peer-to-peer application, which exploits a large
bandwidth. • Edward notices that his transfer rate is going down to 25 Kbits/s. • He notices Bill, who closes his p2p application and ends the transfer. • Explain the three different steps of the transfer concerning the window sizing:
Explanation
Lab Book – Cisco CCNA 1 30 / 35
8.3. Exercise 2 – Research and documentation
• Explain the principle of the MD5 algorithm: MD5
Lab Book – Cisco CCNA 1 31 / 35
• What is a VPN? How does it work and what is its utility?
VPN
Lab Book – Cisco CCNA 1 32 / 35
• Decrypt the following message. The used algorithm is the Cesar number one: Code FY FUVILUNICLY MOJCHZI XYM NYWBHIFIACYM WCMWI PIOM LYGYLWCY X'UPICL XYWIXY WY GYMMUAY.
Lab Book – Cisco CCNA 1 33 / 35
8.4. Exercise 3 – Data anlysis
1) Data analysis
• A web request on the page http://www.labo-cisco.com (172.16.1.10) has been captured from a computer with the IP 172.16.104.38. Let’s look at the HTTP information.
Capture – Request traffic No. Time Source Destination Protocol Info 275 4.892953 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=20441 Win=52560 Len=0 276 4.893038 172.16.1.10 172.16.104.38 HTTP Continuation 277 4.893163 172.16.1.10 172.16.104.38 HTTP Continuation 278 4.893200 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=23361 Win=49640 Len=0 279 4.893286 172.16.1.10 172.16.104.38 HTTP Continuation 280 4.893335 172.16.1.10 172.16.104.38 HTTP Continuation 281 4.893365 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=364 Ack=25409 288 5.003410 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#1] 3073 > http [ACK] Seq=364 Ack=25409 Win=51352 Len=0 289 5.013453 172.16.1.10 172.16.104.38 TCP http > 3072 [ACK] Seq=80437 Ack=1373 Win=16148 Len=0 290 5.013492 172.16.1.10 172.16.104.38 TCP http > 3073 [ACK] Seq=25409 Ack=364 Win=17157 Len=0 291 5.022946 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1373 Ack=80437 Win=63184 Len=0 292 5.027996 172.16.104.38 172.16.1.10 TCP [TCP Dup ACK 281#2] 3073 > http [ACK] Seq=364 Ack=25409 Win=64240 Len=0 293 5.040306 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/WebCisco_05N.gif HTTP/1.1 294 5.041092 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 295 5.041184 172.16.1.10 172.16.104.38 HTTP Continuation 296 5.041230 172.16.104.38 172.16.1.10 TCP 3072 > http [ACK] Seq=1736 Ack=83045 Win=64240 Len=0 301 5.053659 62.161.94.199 172.16.104.38 TCP http > 3074 [SYN, ACK] Seq=0 Ack=1 Win=17520 Len=0 MSS=1460 302 5.053703 172.16.104.38 62.161.94.199 TCP 3074 > http [ACK] Seq=1 Ack=1 Win=64240 Len=0 303 5.054444 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_06.gif HTTP/1.1 304 5.055175 172.16.1.10 172.16.104.38 HTTP HTTP/1.1 200 OK (GIF89a) 305 5.055212 172.16.1.10 172.16.104.38 HTTP Continuation 306 5.055254 172.16.104.38 172.16.1.10 TCP 3073 > http [ACK] Seq=732 Ack=27065 Win=64240 Len=0 307 5.059188 172.16.104.38 62.161.94.199 HTTP GET /hit.xiti?s=59384&p=&hl=16x24x10&r=1024x768xundefinedx32&ref= HTTP/1.1 308 5.063936 172.16.104.38 172.16.1.10 HTTP GET /images/Charte/CharteWebCisco_08.gif
Lab Book – Cisco CCNA 1 34 / 35
Capture – Detailed request No. Time Source Destination Protocol Info 148 4.639100 172.16.104.38 172.16.1.10 HTTP GET / HTTP/1.1 Frame 148 (351 bytes on wire, 351 bytes captured) Arrival Time: Aug 23, 2004 16:24:10.595293000 Time delta from previous packet: 0.000188000 seconds Time since reference or first frame: 4.639100000 seconds Frame Number: 148 Packet Length: 351 bytes Capture Length: 351 bytes Ethernet II, Src: 00:0a:e6:bb:cf:8d, Dst: 00:e0:18:c3:59:3b Destination: 00:e0:18:c3:59:3b (172.16.1.10) Source: 00:0a:e6:bb:cf:8d (172.16.104.38) Type: IP (0x0800) Internet Protocol, Src Addr: 172.16.104.38 (172.16.104.38), Dst Addr: 172.16.1.10 (172.16.1.10) Version: 4 Header length: 20 bytes Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00) 0000 00.. = Differentiated Services Codepoint: Default (0x00) .... ..0. = ECN-Capable Transport (ECT): 0 .... ...0 = ECN-CE: 0 Total Length: 337 Identification: 0x08e4 (2276) Flags: 0x04 (Don't Fragment) 0... = Reserved bit: Not set .1.. = Don't fragment: Set ..0. = More fragments: Not set Fragment offset: 0 Time to live: 128 Protocol: TCP (0x06) Header checksum: 0x2f72 (correct) Source: 172.16.104.38 (172.16.104.38) Destination: 172.16.1.10 (172.16.1.10) Transmission Control Protocol, Src Port: 3072 (3072), Dst Port: http (80), Seq: 1, Ack: 1, Len: 297 Source port: 3072 (3072) Destination port: http (80) Sequence number: 1 (relative sequence number) Next sequence number: 298 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 20 bytes Flags: 0x0018 (PSH, ACK) 0... .... = Congestion Window Reduced (CWR): Not set .0.. .... = ECN-Echo: Not set ..0. .... = Urgent: Not set ...1 .... = Acknowledgment: Set .... 1... = Push: Set .... .0.. = Reset: Not set .... ..0. = Syn: Not set .... ...0 = Fin: Not set Window size: 64240 Checksum: 0x9668 (correct) Hypertext Transfer Protocol GET / HTTP/1.1\r\n
Lab Book – Cisco CCNA 1 35 / 35
Request Method: GET Accept: */*\r\n Accept-Language: fr\r\n Accept-Encoding: gzip, deflate\r\n User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)\r\n Host: www.labo-cisco.com\r\n Connection: Keep-Alive\r\n Cache-Control: no-cache\r\n Cookie: ASPSESSIONIDCQTRQQQB=PLCMIDDAPCCHGFEBDBIJFFAI\r\n \r\n
• Which HTML instruction is used to get a picture from the website? ________________________________________________________________________________
• What is the role of the "Connection" frames?
________________________________________________________________________________
• By making a comparison with the TCP protocol, what are the different steps of getting the HTTP frames? ________________________________________________________________________________ ________________________________________________________________________________
• What is the hexadecimal value of the cookie sent by Xiti?