How to create your own server on Windows. Creation and configuration of a local network. How to create and configure a server over a local network

“MODELING OF NETWORK OPERATION IN NET-SIMULATOR Compiled by: Korobetskaya A.A. Installing NET-Simulator NET-Simulator is a freely distributed program that allows you to simulate the work...”

SIMULATION OF NETWORK OPERATION IN NET-SIMULATOR

Compiled by: Korobetskaya A.A.

Installing NET-Simulator

NET-Simulator is a freely distributed program,

allowing you to simulate the operation of computer networks.

You can download the program from the official website: http://www.netsimulator.org

On the same site there are installation instructions, help and

description of an example network.

To run the program you need to install a Java machine:

http://java.com/ru/download/index.jsp To launch NET-Simulator, simply unzip the archive and run the run.bat file.

Attention! The path to the folder with NET-Simulator must not contain Russian characters!

If everything is done correctly, the command prompt will start first, and then a window with an example network will open.

In practice, more complex network simulators are used, in which many real devices are available.

Examples of simulators:

– ns-3 (free);

– NetSim (proprietary);

– HP Network Simulator (free);

– Cisco CCNA Labs Simulation (proprietary).

Task 1. (2 points) Read the documentation and an example of a network.

Answer the questions.

– What network devices can be used in NetSimulator?

– How to add and remove devices to a project?

– How to connect the cable to the device?



– How to launch the terminal to configure devices?

– What commands does the NET-Simulator terminal support?

2. (4 points) Implement examples of networks from the manual.

– point-to-point network;

– a network with a “bus” topology on a common hub;

– a network with a “passive star” topology using a switch;

– connecting networks manually through a switch;

– connection of various networks through a router.

3. (6 points) Implement your own network according to the option and generate a report. Describe the subnets that make up the network using the following diagram:

– network address;

– network mask;

– network topology;

– number of hosts in the network;

– maximum allowed number of hosts;

– which devices are included in the network;

– default gateway address (if any);

Total for work: 12 points.

For work, a report is drawn up in Word, which should contain answers to each item of the task.

Instructions for performing the work These instructions do not duplicate information from the NETSimulator website. Read it yourself and, if necessary, refer to the program documentation!

Each example is saved in a separate project.

Point-to-point network Point-to-point is the simplest network consisting of 2 workstations connected by cable.

Create new project.

Place 2 computers on the sheet and connect them with a cable. At correct connection 2 green lights on the computers will light up.

Double-click on the computer “Desktop 0”. A terminal window will open.

Type help to see a list of available commands.

The ifconfig command will allow you to view and configure the parameters of network interfaces (network cards, router connectors, etc.).

While we have not configured our network, the network cards of the computers are disabled and do not have their own address. To see this, enter the command



ifconfig with -a parameter:

eth0 is the interface name (in reality it can be arbitrary);

Link encap: Ethernet – connection standard used;

HWaddr – physical address (MAC address), unchangeable;

Let's assign the first computer the IP address 192.168.1.1 with a mask 255.255.255.0 (addresses 192.168.x.x/24 are standardly used for small local networks):

Similarly, configure the second computer to the address 192.168.1.2/24 (the address must be from the same network, for example, 192.168.20.2 will not work, but 192.168.1.100 will do).

Now let’s check the network’s functionality using the ping command (Ctrl+C – stop transmission, in total you need to send 7-10 test packets). Please note that while data is being transmitted/received, the green lights on the nodes flash and the cable lights up blue.

During the transfer, not a single packet was lost. We have a working point-to-point network.

Save the result as a separate project.

Control questions:

What is a netmask?

What is the address of the network created in the example (net id)?

What are the host addresses (host ids) on the network?

Hub-based network. Bus topology (passive star) We will continue to improve the previously created point-to-point network, but it needs to be saved in a separate project.

Let's say we want to create a network of three computers. It will no longer be possible to connect them directly, because... Each computer has only one interface (network card).

Even if the computer has two network cards on a real network, configure shared network without network devices it is quite difficult - one of the computers will have to be turned into a server.

In the example, we implement a simple network based on a hub.

It can be considered both as a “bus” and as a passive star. A real bus with one common cable cannot be created in Net-Simulator, because Exactly 2 devices are connected to the cable.

So, add another computer, a hub, to the previously created point-to-point network and connect it with a cable, as shown in the figure (the location of the nodes on the sheet can be any):

We will leave the network address the same, so there is no need to reconfigure the first two nodes. They will still be functional.

Tip To repeat previous command terminal, press the up arrow on your keyboard.

It is necessary to configure only the third node, giving it an address from the same network, for example 192.168.1.3:

The hub itself is not an active device and is not configurable.

Let's check the availability of the new computer:

The first packet from the new computer was lost (possibly a network problem), then the transfer proceeded without failure.

Please note that when data is being transferred, the lights on all computers blink, i.e. The data is received by all devices on the network. Therefore, such a network will be very busy.

Similarly, you can add a fourth, fifth, etc. node If the number of nodes is greater than the number of hub connectors, then you can use multiple hubs, or even dedicate a hub to each computer to make the network look like a “bus.”

The network setup will be the same in all cases. And in any case, the network can be considered implemented using a “bus” topology.

Examples (no need to implement).

Control questions

1. Which one network address at the hub?

2. How many nodes can there be in a network with a “bus” topology (real and model)?

Networks using a switch. Passive star To reduce network load, you can use a switch instead of a hub. This device can analyze the physical address and does not transmit packets to all nodes, but only to a specific recipient.

Such a network has a “passive star” topology: the switch located in the center does not control the network, but transmission does not go to all computers, as in a “bus,” but only to the necessary ones.

To do this, the switch has a physical address table (mactab), which records which interface is connected to which node.

This table is filled in automatically. When attempting to transmit, the switch first polls all connected devices and learns their addresses. The addresses are entered into a table, and then the switch transmits only to the required address through the required interface.

Because devices can come and go, the MAC table is periodically cleared and the switch polls the devices again. This allows you to keep the table up to date.

To implement such a network, simply replace the hub in the previous project with a switch. There is no need to reconfigure computers.

Now, if you check the network’s functionality, it will first send to all hosts, and then the switch will send data only to the required one (from 192.168.1.1 to 192.168.1.2):

Without stopping ping, check the switch's MAC address table:

Simultaneously start a transfer from host 192.168.1.2 to 192.168.1.3 and check the MAC table again:

After stopping the transfer, the table will be cleared in a few seconds.

Save the resulting network as a separate project.

Two networks on a common switch We can connect two different networks to one switch as if they were separate networks.

Add two more computers to the previous project and assign them addresses 192.168.100.1/28 and 192.168.100.2/28. Connect the new computers to the available connectors on the switch.

Thus, we have two subnets:

1) 192.168.1.0 with mask 255.255.255.0, computers Desktop 0, Desktop 1, Desktop 2 2) 192.168.100.0 with mask 255.255.255.240, computers Desktop 4, Desktop 5 If we check the network operation, we will see that inside each of subnets, packets circulate freely, but cannot get from one subnet to another, even though these networks are connected to the same device.

The reason is that the computers do not have routing tables configured, i.e. computers do not know how to transfer data to another network. They simply won't start transmitting to an unknown address.

When we assigned IP addresses to computers, one single line was automatically added to their routing tables: with the computer’s own network.

You can view and configure the routing table with the command

route. For computers on the first subnet it looks like this:

And in the second subnet like this:

Destination – destination address for which the route is specified in this line Gateway – which gateway to send packets to, * – none, transmission within the local subnet Flags – flags (set automatically): U – route is active, G

– the route uses a gateway, H – the destination address is the address of an individual host, not the network Metric – a metric that determines the priority of routes Iface – the interface through which the transmission is carried out I.e. computers on the first subnet “know” only their own local addresses from the range 192.168.1.0, and the second subnet - only from 192.168.100.0.

To connect networks together, you need to add them to the routing tables of each computer.

For computers on the first subnet (Desktop 0, Desktop 1, Desktop 2):

For the second subnet (Desktop 4, Desktop 5):

Tip If you make a mistake when adding a route, you need to first remove the incorrect route from the table and then add the correct one:

1. Use the up arrow to scroll through the commands to the one in which you made a mistake.

2. Replace –add with –del and run the command.

3. Go through the commands again and correct the error.

Now (only after setting up both subnets!) they can transmit packets to each other.

Thus, we have two subnets connected to a common router.

Save the resulting network as a separate project.

Control questions:

1. Where did the second subnet mask 255.255.255.240 come from? How many maximum computers can be connected to the network with such a mask?

2. Does the switch have a routing table?

Connecting different networks through a router If two small networks, as in the previous example, can be combined using a single switch, then for large networks, which include many hosts and subnets, this option is not suitable because:

a) the physical address table of the switch becomes very large, which requires additional memory and slows down its operation;

b) to update the table, the switch requests the physical addresses of all network devices, and this is additional traffic;

c) each computer will have to enter the addresses of all subnets into the routing table.

In reality, a router (router) is used to connect networks. It distributes traffic between subnets and determines the delivery path of each packet.

Then each computer does not need to know the addresses of all networks, it only needs to know the address of its router, which will already decide where to send the packet.

Switches and hubs are also used in such networks, but they operate within a subnet. The traffic they generate goes no further than the nearest router.

Open a project where we have created a passive star network on the switch, but have not yet added a second subnet.

Add a router, another hub, two computers and the necessary cables to the project as shown in the figure.

Set the addresses for the two new computers to 172.16.0.101/16 and 172.16.0.110/16. Check the functionality of each subnet.

Now let's configure the router.

Unlike computers, the router has 8 ports, each of which has its own interface (eth0-eth7) and its own IP address.

We connected the first subnet (192.168.1.0/24) to the eth0 interface, and the second (172.16.0.0/16) to the eth7 interface. These interfaces need to be given addresses from the appropriate network range, for example 192.168.1.100 and 172.16.1.100.

Note In real networks, traditionally the router receives an address with the last byte equal to 1 (for example, 10.0.0.1), and other devices - starting with 100 (for example, 10.0.0.101, 10.0.0.102, etc.). Follow this rule when performing your variation.

All that remains is to tell the computers on the network the address of their router (enter it into the routing table).

We need to specify that packets for all addresses except local addresses should be sent to the router.

“All addresses” are entered into the table as destination 0.0.0.0 with mask 0.0.0.0

– “default gateway”.

Setting up Desktop 0 (Desktop 1 and Desktop 2 are configured in the same way):

Setting up Desktop 6 (Desktop 7 is set up in the same way):

Checking the availability of a neighboring subnet:

In order to find out the physical address, the router uses ARP requests.

During the transfer, you can view its ARP table (then it is cleared):

If you start transmission simultaneously on all network nodes:

Note Real devices usually do not have a command similar to arp. It was added to Net-Simulator for clarity.

Full network settings can be viewed through an html report (see.

example below).

Save the project to separate file and generate a report for it.

Security question What devices will need to be configured to connect another subnet with the address 10.10.10.0/24 and three nodes to the router?

NET-SIMULATOR PROJECT REPORT

Project file:

Description:

Project created at:

Report generated at: 2014-10-2 0:56:6


Similar works:

“Processing of materials by pressure No. 2 (27), 2011 135 UDC 621.771.01: 621.982.45 Satonin A.V. Kubersky S.V. Strichenko S.M. Zavgorodniy A.V. ENGINEERING TECHNIQUES FOR STRESS-STRAIN STATE OF CONTINUOUS METAL.. .” Varshavsky A.E., Grubman S.A. 17.1. Concentration of production in the field of high technologies: analysis of the development strategy of a large company (using the example of IBM Corporation) (author's version) Innovation management in Russia...” General information 2.1. Purpose of the device 2.2. Set..."

“Ministry of General and Professional Education of the Russian Federation Novgorod State University named after Yaroslav the Wise Department of Geography, Regional Studies and Tourism “APPROVED” Head of the Department GTS D.A. Subetto "_"_20 Course of lectures on the subject "LOCAL STUDIES" Developed by: Art. teacher..."

“Boris Sadovskoy The Dead Swimmer (1834) Maria Mikhailovna Blum Kitty is sixteen years old today. In a transparent cloud of wavy pink muslin, smoothly, like a big woman, she descended from the terrace into the flower garden to her favorite rose. Both of them bloomed in full spring color that day; both are tender..."

"E. V. Shilova PHILIPPINE WORKS V.V. VERESHCHAGIN Few Russian artists, even those who were members of the Russian Geographical Society or the Maritime Ministry, were able to visit the Philippines. To the famous battle painter and traveler artist Vasily Vasilyevich Vereshchagi..."

2017 www.site - “Free digital library- electronic materials"

The materials on this site are posted for informational purposes only, all rights belong to their authors.
If you do not agree that your material is posted on this site, please write to us, we will remove it within 1-2 business days.

Creation principle local network at any Windows versions(XP, 7, 8, 10) practically nothing is not different. Exceptions are complex multi-level corporate networks, where several subnets, proxy servers and VPN are used.

But in this article we will look at how to create home network without resorting to purchasing expensive equipment, but using a regular switch or router with Wi-Fi support.

What is needed to create a network

First of all, to create a local network of a certain number of computers, we need equipment:

note: If a direct connection will be used (i.e. twisted pair insert into both devices without using a router), then you will need not a standard cable, but crossover, except when modern network cards with MDI-X support are installed. In this case you can use standard method crimping.

How to create a local network

Now let's proceed directly to creation. First we need to prepare:

  • Install all equipment in its place - computers, routers, etc.
  • We crimp cable, if necessary.
  • Let's do wiring, i.e. we extend the twisted pair to the equipment.
  • Connecting twisted pair equipment.

Costs note, that when the connection is made and all devices are started, the connection connectors on the computers should shine. The same applies to routers with routers, only they have light bulbs located on front panel. If any light is not lit, then the connection has been made. wrong.

When the connection is made, you need to configure the network in the operating system.

To start checking working group, for which we go to properties " My computer" You don’t have to open the properties, but use the combination Win+ R and enter in the window sysdm. cpl.

On all devices working group must be is the same, otherwise the computers will not see each other.

To change the group, just click on the button change and enter the group name. Name must be entered Latin alphabet, and match on all devices.

Then we look for network icon in the notification area and with its help we get to Network and Sharing Center.

Here we are interested in the link change additional parameters, it's third from the left and will allow you to edit sharing settings. In each profile we select: Enable network discovery, auto-tuning And general access to files and printers.

Scrolling page and below turn off shared access with password protection. All other settings can be left. Click Save changes and exit.

This completes the setup. The network should work, but only if your router distributes dynamic addresses.

If you used a router, or the devices were connected directly with a cable, then you need to make a few more settings.

Network settings

When direct connection or using a router, we need change IP addresses of computers. For this necessary:

We will not describe what each setting is responsible for, because... This is quite a large topic. It is enough to enter the addresses described above on all computers.

After making all the above settings, the network should work. However, do not forget that a firewall or antivirus software can completely block the network. Therefore, if nothing works, check their settings or temporarily disable them altogether.

Local network via WiFi router

Setting up a network through a router is absolutely nothing is not different from what we described above.

If the device is configured to distribute dynamic addresses, then there is no need to change the addresses. Well, what if IP users static, then you will have to use the previous section.

Also, there will be no difference between whether the device is connected by cable or via Wi-Fi; in most routers, the settings for distributing addresses are configured simultaneously and wireless and on wired connection.

How to make shared folders

After everything is configured, you need to create shared folders for information exchange.

However, this is not yet enough. Now on the folder properties window you need to find the bookmark safety. And then press successively ChangeAdd.

In this instruction, I will teach you how to create your own Minecraft server without Hamachi help and other applications. So, let's get started!

To create a server, you need to meet several requirements. Most of them depend on the provider providing their services to you. Your IP must be static, otherwise they won’t be able to connect to you. If it is dynamic, then you can use third-party sites to third level domain registration. Also, your ports must be open.

If you don’t have a static IP or are too lazy to open ports, you can use the instructions.

Instructions(we do everything in order):

1) First, download the server itself. For Windows, select file Minecraft_Server.exe You can download it on the official Mojang page.

2) After downloading this file, place it in the folder where the server will be located. Then, run it and it will create the necessary folders and server files. After the world is generated, we turn off the server and start setting up.

(This is what the server folder looks like)

3) After this, you need to find out your IP in order to subsequently enter it in the required settings line. You can find out the IP.

4) The main server configuration file is server.properties, it looks like this:


The main setting is the field: server-ip=, in which you need to enter the address of your computer (IP) after the "=".

This is what it should look like: server-ip= 109.169.230.149

Apart from this, here you can also set up your server according to some of the parameters, for example, disable monster spawning, install your own map, whitelist, online mod and much more.

Save the settings and start the server!

5) The server is ready and to connect to it, players just need to enter your IP in the server connection field.

6) This is what the server log will look like when they try to connect to it.

If you want to play with friends on pirate Minecraft versions, disable authentication by replacing the line:

online-mode= true

to the value:

online-mode= false

================================================

If you have problems creating a server, please describe it in detail in the comments. Our specialists will try to help you.

Greetings, active diggers in Minecraft! I’ll be honest, a couple of years ago I myself became actively addicted to this toy and killed a lot of time in it, which I now regret (the toy is very interesting but takes a lot of time). After playing a single-player game and building everything that was interesting to me, I got bored, and it was decided to play with friends online, and then on the Internet...

How to create a Minecraft server (Hamachi and LAN)

This note promises to be long, but we will not consider various mods and additions, we will create an original Minecraft server. Perhaps in the future I will try some interesting additions in practice, but now I don’t see the point in rewriting other people’s articles for show. So let's look at how to create a Minecraft server (Original)

About two years ago I bought myself a premium account of this wonderful game, but this is an optional condition for the server, we can download the server from the official website and allow pirate users to play with you. Surely there is a desire to play with friends, but friends have no desire to buy the game (personally, I’m more interested in playing with friends from offline than with strangers from nowhere.) So to speak, let’s create our own Minecraft server with blackjack and sh….

In fact, creating a server is as easy as shelling pears, but setting up a connection to it is exactly the most interesting thing, because this is no longer relevant to the game, but it is on these things that we will focus our attention, since little has been written about this, and questions arise like the rule is precisely in these moments.

1. Create and configure a Minecraft server

If anyone doesn't know, the Minecraft game is written in JAVA language and requires appropriate software, the server was no exception. So we need to download and install current version Java, but if Minecraft works for you without problems, then you have everything you need installed on your system and no additional programs no need!

We have downloaded and installed everything we need, now let’s move directly to setting up the Minecrfat server. The most latest version always available on the official website on the downloads page. You can download the server directly from there without any registration, absolutely free.

We download the Minecraft server to our computer and, for convenience, put it in a separate folder (for example, in the MINE_SERVER folder - this is necessary because when you first start the server, it will create configuration files, and I don’t like a mishmash of unknown things in one folder)

We start the server and wait until the world is generated, and at the same time the configuration files are created, after which we close the Minecraft server

After the first launch, a server.properties file will be created, in which all our settings are stored (you can open it using notepad, if you don’t know how to do this, read the article:). We are considering basic settings Minecraft server and therefore I will make minimal changes, namely, I will allow pirate owners to use the server. To do this, I will write false in the online-mode parameter, this will command the server not to check those connecting for the presence of a premium account.

Now we restart the Minecraft server (but with our settings) and try to connect to it. Since the server is located on our computer, we write in the server address localhost.

And now we are already in the game...

The same can be seen in the server.

This completes the creation of the server, now let's move on to the most interesting part - we are trying to provide our friends with access to this server.

2. Set up a connection to the Minecraft server via Hamachi

The most in a simple way games via the Internet I believe the creation virtual network using Hamachi programs However, there is one drawback: free version will allow you to create a network of up to 5 computers. Let's take a closer look at this option:

Installing Hamachi to create a Minecraft server is very simple, you just need to create a connection on the main one and connect to it on the client ones, that's all)

Hamachi installation(Click to view)

Launch the installer and select the language

Program information

License agreement

Installation options

Install Google Chrome as desired

Installation…

Installation completed

Now let's get straight to hamachi settings. Click the “Enable” button

Come up with a computer name on the network and click Create

Then go to “Network” “Create a new network”

We come up with a name and password for new network(be sure to come up with a good password, because you will essentially be creating an ordinary local network, and you expose your computer to additional vulnerability if someone can guess the password)

After you have created your network, your comrades should launch Hamachi at their place, and select “Network” “Connect to an existing network”

Enter the name and password for the created network

Now on the main computer you can see who is connected

Create a Minecraft server on client machine there is no point, now we need to connect the lane to the server. To do this, we need the IP address of the server, since we use hamachi, we look at the IP in the program on the computer where the Minecraft SERVER is installed.

Then we enter it into the server address

...and we see that the Minecraft server is running and is ready to provide us with access to the game

That's all, as you can see, playing Minecraft online is very easy through Hamachi!

3. How to open port 25465

In order for the Minecraft server to be accessible for play from the Internet, we need to open port 25465. I will open it using the example of a standard firewall in Windows 8.1, but keep in mind that if you have third-party software, you need to configure it in it. Go!

In the Control Panel, go to “System and Security”

Open "Windows Firewall"

Click on “Advanced options”

Select incoming connections on the left and in the menu select “Actions”, “Create rule...”

for port

write the port number and select the protocol...

...and allow the connection...

...Check all the boxes...

Please note that this action must be performed for both protocols (TCP and UDP)

We are coming up with names for the ports...

...and the rules should look something like what I have in the picture below

We do the same for outgoing connections.

At this point, the opening of the port is completed, sometimes in order to process changes correctly it may be necessary to restart the computer (I don’t know what this is connected with)

4. Set up a connection to the Minecraft server without third-party applications

Actually, there’s nothing special to configure. We need to find out our external IP address, which can be done by going to the website 2ip.ru

You can also check if the port is open...

Enter the port number and click “Check”

After a short wait, you will receive a message that the port is open, if, of course, you have configured everything correctly

The next point is port forwarding from external IP to internal IP. This looks different for each router; you can read about DIR 300 and port forwarding there.

Therefore, you need to connect to such a server using its external IP address (for clients); the server owner can log in via localhost.

P.S. Well, now you know how to create a Minecraft server, if you have mastered this material, then you will figure out your further settings yourself and customize everything for yourself. All the best!

In contact with

Transcript

1 SIMULATION OF NETWORK OPERATION IN NET-SIMULATOR Installation of NET-Simulator Compiled by: Korobetskaya A.A. NET-Simulator is a freely distributed program that allows you to simulate the operation of computer networks. You can download the program from the official website: The same website contains installation instructions, help and a description of an example network. For the program to work, you need to install a Java machine: To start NET-Simulator, simply unzip the archive and run the run.bat file. Attention! The path to the folder with NET-Simulator must not contain Russian characters! If everything is done correctly, the command prompt will start first, and then a window with an example network will open. In practice, more complex network simulators are used, in which many real devices are available. Examples of simulators: ns-3 (free); NetSim (proprietary); HP Network Simulator (free); Cisco CCNA Labs Simulation (proprietary). 1

2 Task 1. (2 points) Read the documentation and an example of a network. Answer the questions. What network devices can be used in Net-Simulator? How to add and remove devices to a project? How to connect the cable to the device? How to launch the terminal to configure devices? What commands does the NET-Simulator terminal support? 2. (4 points) Implement examples of networks from the manual. point-to-point network; network with a “bus” topology on a common hub; network with a “passive star” topology using a switch; connecting networks manually through a switch; connecting various networks through a router. 3. (6 points) Implement your own network according to the option and generate a report. Describe the subnetworks that make up the network using the following scheme: network address; netmask; network topology; number of hosts on the network; maximum allowed number of hosts; what devices are on the network; default gateway address (if any); broadcast address. Total for work: 12 points. For work, a report is drawn up in Word, which should contain answers to each item of the task. Instructions for performing the work These instructions do not duplicate information from the NET-Simulator website. Read it yourself and, if necessary, refer to the program documentation! Each example is saved in a separate project. Point-to-point network Point-to-point is the simplest network consisting of 2 workstations connected by cable. Create a new project. Place 2 computers on the sheet and connect them with a cable. When connected correctly, 2 green lights on the computers will light up. 2

3 Double-click Desktop 0. A terminal window will open. Type help to see a list of available commands. The ifconfig command will allow you to view and configure the parameters of network interfaces (network cards, router connectors, etc.). 3

4 While we have not configured our network, the network cards of the computers are disabled and do not have their own address. To see this, enter the ifconfig command with the -a parameter: eth0 is the interface name (in reality it can be arbitrary); 4

5 Link encap: Ethernet connection standard used; HWaddr physical address (MAC address), unchangeable; DOWN state (off); Next comes the data transfer statistics. Let's assign an IP address with a mask to the first computer (x.x/24 addresses are standardly used for small local networks): A line with IP address settings was added to the interface description and the status changed from DOWN to UP. Similarly, we will configure the second computer to the /24 address (the address must be from the same network, for example, it will not work, but it will). Now let’s check the network’s functionality using the ping command (Ctrl+C stop transmission, in total you need to send 7-10 test 5

6 packages). Please note that while data is being transmitted/received, the green lights on the nodes flash and the cable lights up blue. During the transfer, not a single packet was lost. We have a working point-to-point network. Save the result as a separate project. Security questions: What is a network mask? What is the address of the network created in the example (net id)? What are the host addresses (host ids) on the network? Hub-based network. Bus topology (passive star) We will continue to improve the previously created point-to-point network, but it needs to be saved in a separate project. 6

7 Suppose we want to create a network of three computers. It will no longer be possible to connect them directly, because... Each computer has only one interface (network card). Even if a computer has two network cards in a real network, it is quite difficult to set up a shared network without network devices; one of the computers will have to be turned into a server. In the example, we implement a simple network based on a hub. It can be considered both as a “bus” and as a passive star. A real bus with one common cable cannot be created in Net-Simulator, because Exactly 2 devices are connected to the cable. So, add another computer, a hub, to the previously created point-to-point network and connect it with a cable, as shown in the figure (the location of the nodes on the sheet can be any): We will leave the network address the same, so we do not need to reconfigure the first two nodes need to. They will still be functional. Tip To repeat the previous terminal command, press the up arrow on your keyboard. It is necessary to configure only the third node, giving it an address from the same network, for example: 7

8 The hub itself is not an active device and is not configurable. Let's check the availability of the new computer: 8

9 The first packet from the new computer was lost (possibly a network problem), then the transfer proceeded without failure. Please note that when data is being transferred, the lights on all computers blink, i.e. The data is received by all devices on the network. Therefore, such a network will be very busy. Save the resulting network as a separate project. Similarly, you can add a fourth, fifth, etc. node If the number of nodes is greater than the number of hub connectors, then you can use multiple hubs, or even dedicate a hub to each computer to make the network look like a “bus.” The network setup will be the same in all cases. And in any case, the network can be considered implemented using a “bus” topology. Examples (no need to implement). 9

10 Test questions 1. What is the network address of the hub? 2. How many nodes can there be in a network with a “bus” topology (real and model)? Networks using a switch. Passive star To reduce network load, you can use a switch instead of a hub. This device can analyze the physical address and does not transmit packets to all nodes, but only to a specific recipient. Such a network has a “passive star” topology: the switch located in the center does not control the network, but transmission does not go to all computers, as in a “bus,” but only to the necessary ones. To do this, the switch has a physical address table (mactab), which records which interface is connected to which node. 10

11 This table is filled in automatically. When attempting to transmit, the switch first polls all connected devices and learns their addresses. The addresses are entered into a table, and then the switch transmits only to the required address through the required interface. Because devices can come and go, the MAC table is periodically cleared and the switch polls the devices again. This allows you to keep the table up to date. To implement such a network, simply replace the hub in the previous project with a switch. There is no need to reconfigure computers. Now, if you check the network’s functionality, it will first send to all hosts, and then the switch will send data only to the required one (from to): 11

12 Without stopping the ping, check the switch's MAC address table: At the same time, start a transfer from host to and check the MAC table again: 12

13 After stopping the transmission, after a few seconds the table will be cleared. Save the resulting network as a separate project. Two networks on a common switch We can connect two different networks to one switch as if they were separate networks. 13

14 Add two more computers to the previous project and assign them addresses /28 and /28. Connect the new computers to the available connectors on the switch. Thus, we have two subnets: 1) with a mask, computers Desktop 0, Desktop 1, Desktop 2 14

15 2) with a mask, computers Desktop 4, Desktop 5 If we check the operation of the network, we will see that within each of the subnets packets circulate freely, but cannot get from one subnet to another, even though these networks are connected to the same device. The reason is that the computers do not have routing tables configured, i.e. computers do not know how to transfer data to another network. They simply won't start transmitting to an unknown address. When we assigned IP addresses to computers, one single line was automatically added to their routing tables: with the computer’s own network. You can view and configure the routing table with the route command. For computers on the first subnet it looks like this: And on the second subnet it looks like this: 15

16 Destination destination address for which the route is specified in this line Gateway to which gateway to send packets, * none, transmission within the local subnet Flags flags (set automatically): U route is active, G route uses a gateway, H destination address is an address of an individual host, and not of the network, the Metric metric determines the priority of the Iface routes, the interface through which the transmission is carried out. i.e. computers on the first subnet “know” only their local addresses from the range, and the second subnet only from. To connect the networks to each other, you need to add them to the routing tables of each computer. For computers on the first subnet (Desktop 0, Desktop 1, Desktop 2): For the second subnet (Desktop 4, Desktop 5): 16

17 Tip If you make a mistake when adding a route, you need to first remove the incorrect route from the table and then add the correct one: 1. Use the “up” arrow to scroll through the commands to the one in which you made a mistake. 2. Replace add with del and run the command. 3. Go through the commands again and correct the error. Now (only after setting up both subnets!) they can transmit packets to each other. Thus, we have two subnets connected to a common router. Save the resulting network as a separate project. Security questions: 1. Where did the second subnet mask come from? How many maximum computers can be connected to the network with such a mask? 2. Does the switch have a routing table? Connecting different networks through a router If two small networks, as in the previous example, can be combined using a single switch, then for large networks that include many hosts and subnets, this option is not suitable because: a) the physical address table of the switch becomes very large, which requires additional memory and slows down its operation; b) to update the table, the switch requests the physical addresses of all network devices, and this is additional traffic; c) each computer will have to enter the addresses of all subnets into the routing table. In reality, a router (router) is used to connect networks. It distributes traffic between subnets and determines the delivery path of each packet. Then each computer does not need to know the addresses of all networks, it only needs to know the address of its router, which will already decide where to send the packet. Switches and hubs are also used in such networks, but they operate within a subnet. The traffic they generate goes no further than the nearest router. 17

18 Open a project in which we have created a passive star network on the switch, but have not yet added a second subnet. Add a router, another hub, two computers and the necessary cables to the project as shown in the figure. Give the two new computers the addresses /16 and /16. Check the functionality of each subnet. 18

19 Now let's configure the router. Unlike computers, the router has 8 ports, each of which has its own interface (eth0-eth7) and its own IP address. We connected the first subnet (/24) to the eth0 interface, and the second (/16) to the eth7 interface. These interfaces need to be given addresses from the range of the corresponding network, for example and Note In real networks, traditionally the router receives an address with the last byte equal to 1 (for example,), and other devices starting with 100 (for example, etc.). Follow this rule when performing your variation. 19

20 All that remains is to tell the computers on the network the address of their router (enter it into the routing table). We need to specify that packets for all addresses except local addresses should be sent to the router. “All addresses” are entered into the table as a destination with the “default gateway” mask. Setting up Desktop 0 (Desktop 1 and Desktop 2 are configured in the same way): 20

21 Configuring Desktop 6 (Desktop 7 is configured in the same way): Checking the availability of a neighboring subnet: 21

22 In order to find out the physical address, the router uses ARP requests. During the transfer, you can view its ARP table (then it is cleared): If you start the transfer simultaneously on all network nodes: Note Real devices usually do not have a command similar to arp. It was added to Net-Simulator for clarity. Full network settings can be viewed through an html report (see example below). Save the project in a separate file and generate a report for it. Security question What devices will need to be configured in order to connect another subnet with a /24 address and three nodes to the router? 22

23 NET-SIMULATOR PROJECT REPORT Project file: Author: Description: Project created at: Report generated at: :56:6 Name: Desktop 0 Description: Desktop Interfaces: Name Status IP Address Netmask Broadcast eth0 UP Routing table: Target Netmask Gateway Metric Interface * 1 eth eth0 Name: Desktop 1 Description: Desktop Interfaces: Name Status IP Address Netmask Broadcast eth0 UP Routing table: Target Netmask Gateway Metric Interface 23

24 * 1 eth eth0 Name: Desktop 2 Description: Desktop Interfaces: Name Status IP Address Netmask Broadcast eth0 UP Routing table: Target Netmask Gateway Metric Interface * 1 eth eth0 Name: 3 Description: Name: 4 Description: Interfaces: Name Status IP Address Netmask Broadcast eth0 UP eth1 DOWN eth2 DOWN eth3 DOWN eth4 DOWN eth5 DOWN eth6 DOWN eth7 UP Routing table: Target Netmask Gateway Metric Interface * 1 eth * 1 eth7 24

25 Name: 5 Description: Name: Desktop 6 Description: Desktop Interfaces: Name Status IP Address Netmask Broadcast eth0 UP Routing table: Target Netmask Gateway Metric Interface * 1 eth eth0 Name: Desktop 7 Description: Desktop Interfaces: Name Status IP Address Netmask Broadcast eth0 UP Routing table: Target Netmask Gateway Metric Interface * 1 eth eth0 25

26 Task options Option 1. Option 2. 26

27 Option 3. Option 4. 27

28 Option 5. Option 6. 28

29 Option 7. Option 8. 29

30 Option 9. Option

31 Option 11. Option

32 Option 13. Option

33 Option 15. Option


Local Area Network Modeling and Analysis If two PCs need to communicate with each other, they must use the same set of rules to do so. These rules are implemented by software

FEDERAL COMMUNICATIONS AGENCY Federal State Budgetary Educational Institution of Higher Education "VOLGA STATE UNIVERSITY OF TELECOMMUNICATIONS AND INFORMATION" Department of Automatic

Topology Tasks Part 1: Accessing a Host's Routing Table Part 2: Examining IPv4 Host's Routing Table Entries Part 3: Examining IPv6 Host's Routing Table Entries Background/Scenario

Laboratory work: Using IOS CLI with Switch MAC Address Tables Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/1

Laboratory work 4 Study of IP routing Purpose of work: Study the rules of network level addressing, learn how to distribute addresses between participants in the data network and organize routing

Working with network interfaces 1. Determine the network interfaces available on the PC. Explain the result obtained. ip link show 2. Determine the addresses of network devices available on the PC. Explain what you received

Topology B this document contains publicly available information from Cisco Corporation. Page 1 of 6 Addressing Table Device Interface IP Address Subnet Mask Default Gateway PC 1 PC 2 PCs 3 PCs 4 PCs

About General information o VIP and their configuration; interface redundancy in CSS 11000 switches Contents Introduction Before you begin Legend Prerequisites Components used

Arp Proxy Protocol Contents Introduction Prerequisites Requirements Components Used Conventions How does ARP proxy work? Network diagram Advantages of ARP proxy Disadvantages of ARP agent

Proxy-arp protocol Contents Introduction Prerequisites Requirements Components used Conventions How does the proxy-arp protocol work? Network diagram Advantages of the proxy-arp protocol Disadvantages

Topology This document contains publicly available information from Cisco. Page 1 of 6 Addressing table Device Interface IP address Subnet mask Default gateway R1 R2 R3 R4 G0/0 G0/0 S0/0/1

Laboratory work. Creating a network consisting of a switch and router Topology Addressing table Device Interface IP address Subnet mask Default gateway Tasks R1 G0/0 192.168.0.1 255.255.255.0

general description work This laboratory work is intended to gain practical experience in the field of wireless local computer networks(WiFi LAN). It is also suggested that you familiarize yourself with the possibilities

Practice 1. Setting up a simple network Goal: get acquainted with the Cisco Packet Tracer network simulator, learn how to assemble simple network, configure network hardware, create VLANs and use them for

Ural State Economic University Department of Business Informatics Laboratory work. Network Windows tools 10. Teacher: Biktimerov Vladimir Adygamovich Yekaterinburg, 2018 Purpose

1 Laboratory work 3. Routing The routing task is to determine the sequence of nodes for transmitting a packet from the source to the destination. Each router contains a table of networks connected

Laboratory work. Configuring Static and Default IPv4 Routes Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.0.1 255.255.255.0

Topology This document contains publicly available information from Cisco. Page 1 of 5 Addressing table Device Interface IP address Subnet mask Default gateway Tasks R1 R2 G0/0 G0/1 S0/0/0

Packet Tracer. Using the traceroute command to discover a network Topology Scenario The company you work for has purchased new branch office space. To create the network topology you requested

Setting up a connection under operating system Linux Ubuntu 12.04 VPN access type In graphical mode (GUI) Ubuntu uses the NetworkManager program to manage Internet connections. She

Laboratory work. Troubleshooting Basic EIGRP for IPv4 and IPv6 Topology This document contains public information from Cisco. Page 1 of 12 Addressing table

Settings network parameters in MAC OS Contents Connection diagram WITHOUT using a home router... 1 How to check the connection... 8 Connection diagram using a home router...

HSRP (Hot Standby Router Protocol) Questions and Answers Questions Introduction Does failover to the standby router occur if the LAN interface for the active router is in state

Laboratory work. Development and implementation of an addressing scheme for a subnetted IPv4 network Topology Addressing table Device Interface IP address Subnet mask Default gateway R1 G0/0 G0/1 Lo0 Lo1

Laboratory work. Troubleshooting IPv4 and IPv6 Static Routes Topology This document contains public information from Cisco. Page 1 of 12 Addressing table

Firewall Rules Firewall Rules For control network connections Firewall applies two types of rules: Packet rules. Used to apply general restrictions network activity

Selecting a Route in Cisco Routers Contents Introduction Prerequisites Requirements Components Used Conventions Related Processes Building a Routing Table Backups

Administration of local networks Lecture 10. Analysis and troubleshooting Contents of the lecture Identifying problems of the TCP/IP protocols. How client TCP/IP configuration affects performance

Laboratory work. Using the Command Line Interface (CLI) to Collect Information About Network Devices Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Tasks

Setting up a connection under the operating room Linux system Ubuntu 12.04 Access type NAT In graphical mode (GUI) Ubuntu uses the NetworkManager program to manage Internet connections. She

Laboratory work. Troubleshooting DHCPv6 Topology Addressing Table Device Interface IPv6 Address Prefix Length Default Gateway R1 G0/1 2001:DB8:ACAD:A::1 64 N/A S1

Laboratory work: development and implementation of an addressing scheme for a subnetted IPv4 network Topology Addressing table Device Interface IP address Subnet mask Default gateway Tasks R1 G0/0 Not available

IT Essentials 5.0 6.3.2.7 Lab configuring the network card for use DHCP server on Windows 7 Introduction Print and complete this lab. In this lab

Configuring access to IP video cameras and network recorders (NVRs) from the Internet. Version 1.0 Contents IP camera access to the Internet.... 3 1 Connecting an IP camera to a local network.... 3 1.1 Definition

Topology Addressing table Device Interface IP address Subnet mask Default gateway G0/0 192.168.10.1 255.255.255.0 Not available R1 R2 PC1 PC2 PC3 PC4 G0/1 192.168.11.1 255.255.255.0 Not available S0/0/0

Restoring the firmware of irz RUH/RUH2/RCA routers Connect the router directly to the computer using a cross connector network cable(usually marked with a red “crosswired” label) and connect it to the COM port

“WINDOWS NETWORK UTILITIES” TASK Compiled by: Korobetskaya A.A. In the team Windows line do: 1. Determine the local host name using the hostname utility. 2. Determine the MAC address of all network

Laboratory work. Using Wireshark to Analyze Ethernet Frames Topology Tasks Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Capture and Analyze Ethernet Frames Using

LABORATORY WORK 1 "Network utilities ipconfig, arp, ping, tracert, nslookup 1. PURPOSE OF THE WORK Familiarization with the network utilities ipconfig, arp, ping, tracert, nslookup. 2. INTRODUCTORY PROVISIONS. For computer operation

Description of OSPF Neighbor Problems Contents Introduction Prerequisites Requirements Components Used Conventions Adjacencies Neighbor States State Not Detected Neighbor in

Configuring the D-link DIR300NRU router for the Intek-M network. Access type NAT (direct access). First of all, you need to go to the properties of the Internet Protocol TCP/IP (Windows XP) or Internet Protocol version

Laboratory work 5.2.3. Configuring RIPv2 with VLSM and Default Route Propagation Encrypted Password Password Mask Mask Privileged-Virtualized-Subnet/Subnet/Subnet/Type Mask

Laboratory work. Troubleshooting Inter-VLAN Routing Topology This document contains public information from Cisco. Page 1 of 9 Addressing table

Route Redistribution in MPLS/VPN Networks Requirements There are no specific requirements for this document. Components used This document is not strictly tied to any specific versions

Laboratory work. Troubleshooting Enhanced EIGRP Topology This document contains public information from Cisco. Page 1 of 9 Addressing table

CCC CERTIFICATE OS 2 SP 0717 Digital transmission system MC04 DSL Network control module Vport (Eth-Ctrl) KV5.231.021 TO (rev. 2 / August 2010) ADS Perm Contents: 1. Description and specifications

Lab: Examining Ethernet Frames Using Wireshark Topology Objectives Part 1: Examining the Header Fields in an Ethernet II Frame Part 2: Capturing and Analyzing Ethernet Frames Using the Software

IT Essentials 5.0 6.3.2.8 Lab configuring the network card to use a DHCP server in the OS Windows Vista Introduction Print and complete this lab. In this lab

Configuring network settings in Windows XP Contents Connection diagram WITHOUT using a home router... 1 How to check the connection... 5 Connection diagram using a home router...

Instructions for setting up TP-LINK TL-WR1043ND via PPPoE protocol. Contents Connecting to the router via an Ethernet cable (LAN).... 2 Connecting to the router via wireless network(Wi-Fi)....

Packet Tracer: Ping and Trace to Verify Path Topology This document contains public information from Cisco. Page 1 of 6 Addressing table Device

Topology This document contains publicly available information from Cisco. Page 1 of 5 Addressing table Device Interface IP address Subnet mask Default gateway G0/0.15 G0/0.30 G0/0.45

INSTRUCTIONS FOR INSTALLING XPRINTER DRIVER SETUP V7.77 SOFTWARE Link to download the XPrinter Driver Setup V7.77 program: http://www.xprinter.com.ua/image/data/tovar/download/xprinter%20driver%20setup%20v7. 7

This device can be configured using any modern web browser, for example Internet Explorer 6 or Netscape Navigator 7.0 DP-G301 AirPlus TM G 2.4GHz wireless print server Previously

INSTRUCTIONS FOR SETUP AND OPERATION WITH T-11 INTERFACE CONVERTER. Version 1.0 Year 2011 Contents Introduction... 3 General information... 3 Topology for connecting converters to the Reverse ACS... 4 Changing settings

ZELAX ROUTERS Instructions for downloading software using the resident bootloader 2001-2005 ZELAX. All rights reserved. Revision 03 dated 05/18/2005 Russia, 124681 Moscow,

Lab 4: Setting up a router. Statistical routing A router is a device designed to transmit packets between networks. When determining the path of a packet, the router

Configuring network settings in Windows 7 Contents Connection diagram WITHOUT using a home router... 1 How to check the connection... 5 Connection diagram using a home router...

Configuring network settings in Windows 10 Contents Connection diagram WITHOUT using a home router... 1 How to check the connection... 5 Connection diagram using a home router...

Network server USB over IP with 4 USB ports 2.0 User Manual DA-70254 Contents 1. Introduction... 3 1.1 Device Overview... 3 1.2 Network Management... 3 1.3 Components and Functions... 3 1.4 Hardware

Laboratory work. Configuring a NAT pool with overload and PAT Topology Addressing table Device Interface IP address Subnet mask Default gateway Tasks Gateway G0/1 192.168.1.1 255.255.255.0 N/A S0/0/1

Short review connection procedure, installation and operating features of 1-4Eth modems-routers Zyxel P-660 xx VERSION 2 when connecting to ADSL from Ukrtelecom OJSC for Windows OS users

Understanding the ip unnumbered command and its configuration Contents Introduction Prerequisites Requirements Components Used Conventions What is an unnumbered interface? IP and unnumbered

LLC "Company "ALS and TEK" Software of the ALS-24000 switch family, ver. 6.01 Installation guide Sheets 13 2017 2 1. GENERAL INFORMATION 3 1.1. Purpose and scope 3 2. COMPUTER REQUIREMENTS

Restoring the firmware of the ER75iX Twin router Connect the router directly to the computer using a crossover network cable (usually marked with a red “crosswired” label) and connect it to the computer’s COM port

SKY Setting up the polling server VIEW When you start the program, a program icon appears in the system tray (the area of ​​the taskbar next to the clock). To open the SKY server settings window, click right click

Using VRRP on Moxa L3 Switches Configuring Default Gateway Redundancy Using VRRP VRRP (Virtual Router Redundancy Protocol) is a network protocol designed to increase

Laboratory work 14 topic: Routing in computer networks Brief theoretical information Routing is the process of determining the route for information in communication networks. Often used in Russian