<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cilson123</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cilson123"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/Cilson123"/>
	<updated>2026-04-30T15:30:52Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5568</id>
		<title>Chapter 12 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5568"/>
		<updated>2012-04-19T21:03:31Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Chapter 12 study guide; all information gathered and edited by Clay Wilson&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Network Configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NETWORK CONFIGURATION&#039;&#039;&lt;br /&gt;
==Networks==&lt;br /&gt;
&lt;br /&gt;
Be sure to have a basic understanding of local area networks and wide area networks, and their components. &lt;br /&gt;
&lt;br /&gt;
===IPv4===&lt;br /&gt;
&lt;br /&gt;
*Consists of four octets. Each octet represents an 8-bit binary number(0-255). Ex: 192.168.1.1&lt;br /&gt;
*32 bit address(4 octets = 4 x 8 = 32)&lt;br /&gt;
*Subnet mask is used to determine the host portion of the IP address.&lt;br /&gt;
*Default Gateway directs traffic destined to other networks(LANs). Ex: to the internet.&lt;br /&gt;
&lt;br /&gt;
===IPv6===&lt;br /&gt;
&lt;br /&gt;
*Uses 128 bits. Capable of supplementing 340 trillion trillion trillion IP addresses.&lt;br /&gt;
*No subnetting required due to an abundance of address space.&lt;br /&gt;
*First half of address represents your network. Second half uniquely identifies computers on the LAN(link local).&lt;br /&gt;
&lt;br /&gt;
===Configuring a Network Interface===&lt;br /&gt;
&lt;br /&gt;
*NIC(Network Interface Controller) drivers are usually contained within modules that can be inserted to the Linux kernel.&lt;br /&gt;
*Modules end with the &#039;&#039;.ko&#039;&#039;(kernel object) extension and are typically stored in &#039;&#039;/lib/modules&#039;&#039; directory.&lt;br /&gt;
*Use &#039;&#039;insmod&#039;&#039; or &#039;&#039;modprobe&#039;&#039; commands to manually load modules into the Linux kernel.&lt;br /&gt;
*Use &#039;&#039;lsmod&#039;&#039; or &#039;&#039;rmmod&#039;&#039; commands to remove a module from the Linux kernel.&lt;br /&gt;
*Configure the loaded module driver for the NIC using the &#039;&#039;ifconfig&#039;&#039;(interface configuration) command.&lt;br /&gt;
*&#039;&#039;dhcpclient eth0&#039;&#039; command configures a NIC for dynamic host configuration protocol.&lt;br /&gt;
*To show interface statistics use &#039;&#039;ifconfig&#039;&#039; or &#039;&#039;netstat -i&#039;&#039;.&lt;br /&gt;
*The &#039;&#039;ifdown eth0&#039;&#039; and &#039;&#039;ifup eth0&#039;&#039; commands can be used to deactivate and active the network interface, respectively.&lt;br /&gt;
*The &#039;&#039;ping&#039;&#039; command is used to test network connectivity.&lt;br /&gt;
*All configuration options can also be achieved through a GUI within the Network Configuration tool.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;insmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;modprobe&#039;&#039;&lt;br /&gt;
 &#039;&#039;lsmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;rmmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifconfig&#039;&#039;&lt;br /&gt;
 &#039;&#039;netstat&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifdown&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifup&#039;&#039;&lt;br /&gt;
 &#039;&#039;dhcpclient&#039;&#039;&lt;br /&gt;
 &#039;&#039;ping&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Network Services===&lt;br /&gt;
&lt;br /&gt;
Network services are processes that run on your computer that provide some type of valuable service for client computers on the network. Often, they are represented by a series of daemon processes that listen for certain requests on the network. Daemons use &#039;&#039;&#039;port&#039;&#039;&#039; numbers to uniquely identify each service. Ports are defined in the &#039;&#039;/etc/services&#039;&#039; file. Port numbers range in number from 0 to 65534; ports 0 - 1023 are known as well-known ports because they represent commonly used network services. A list of well-known ports can be found on page 552. &#039;&#039;&#039;Stand-alone daemons&#039;&#039;&#039; are daemons that provided network services directly. The &#039;&#039;&#039;Internet Super Daemon(xinetd)&#039;&#039;&#039; acts somewhat like a middle man and starts the appropriate daemon to provide the network service as needed. &lt;br /&gt;
&lt;br /&gt;
*Install the internet super daemon with the &#039;&#039;yum install xinetd&#039;&#039; command, and edit the &#039;&#039;/etc/xinetd.comf&#039;&#039; file to configure the daemon.&lt;br /&gt;
*Large network daemons are stand-alone daemons that are started at boot time from files in the &#039;&#039;/etc/rc.d/rc*.d&#039;&#039; directories.&lt;br /&gt;
*The &#039;&#039;chkconfig&#039;&#039; command or the ntsysv utility can be used to configure stand-alone daemons to start in various runlevels.&lt;br /&gt;
&lt;br /&gt;
For a list of common network services refer to page 554.&lt;br /&gt;
&lt;br /&gt;
==Remote Administration==&lt;br /&gt;
&lt;br /&gt;
*Telnet &lt;br /&gt;
*Remote commands&lt;br /&gt;
*Secure Shell(SSH)&lt;br /&gt;
*X Windows - GUI&lt;br /&gt;
*Virtual Network Computing(VNC) - GUI&lt;br /&gt;
&lt;br /&gt;
===Telnet===&lt;br /&gt;
&lt;br /&gt;
*The &#039;&#039;telnet&#039;&#039; command is used to obtain a command-line shell on remote Linux servers across the network that run on a telnet server daemon.&lt;br /&gt;
*Most operating systems support the telnet network service.&lt;br /&gt;
*Managed by xinetd (internet super daemon).&lt;br /&gt;
*Execute &#039;&#039;yum install telnet-server&#039;&#039; command to install the telnet server daemon.&lt;br /&gt;
*Edit options in &#039;&#039;/etc/xinetd.d/telnet&#039;&#039; file to allow service.&lt;br /&gt;
*Telnet uses no encryption and can therefore be an unfavorable choice for remote administration.&lt;br /&gt;
&lt;br /&gt;
===Remote Commands===&lt;br /&gt;
&lt;br /&gt;
*Commonly called &#039;&#039;&#039;r commands&#039;&#039;&#039;.&lt;br /&gt;
*Used to execute commands on remote systems, obtain remote shells, and copy files between local and remote systems.&lt;br /&gt;
*&#039;&#039;Yum install rsh-server&#039;&#039; to install to a Linux system.&lt;br /&gt;
*Edit &#039;&#039;/etc/xinetd.d/rlogin&#039;&#039; and &#039;&#039;/etc/xinetd.d/rsh&#039;&#039; files for configuration. Restart the xinetd daemon using the &#039;&#039;service xinetd restart&#039;&#039; command.&lt;br /&gt;
*A remote user must have authorization or permission to login remotely using r commands.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;yum install rsh-server&#039;&#039;&lt;br /&gt;
 &#039;&#039;service xinetd restart&#039;&#039;&lt;br /&gt;
 &#039;&#039;rlogin&#039;&#039;&lt;br /&gt;
 &#039;&#039;rcp&#039;&#039;&lt;br /&gt;
 &#039;&#039;rsh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Secure Shell(SSH)===&lt;br /&gt;
&lt;br /&gt;
*Designed as a secure replacement for the recently discussed commands that encrypts information that passes across the network.&lt;br /&gt;
*The SSH daemon (sshd) is installed by default and is configured to start at runlevel 5.&lt;br /&gt;
*Uses secure challenge-response authentication method.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;ssh {hostname}&#039;&#039;&lt;br /&gt;
 &#039;&#039;ssh -l username {hostname}&#039;&#039;&lt;br /&gt;
 &#039;&#039;ssh-keygen&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Remote X Windows===&lt;br /&gt;
&lt;br /&gt;
*uses telnet or secure shell to connect to remote host and allows an administrator to execute any graphical utillity within the remote shell, such as system config-network.&lt;br /&gt;
&lt;br /&gt;
===Virtual Network Computing(VNC)===&lt;br /&gt;
&lt;br /&gt;
*Graphical option for administrating a Linux system remotely.&lt;br /&gt;
*Uses a special platform-independent protocol called &#039;&#039;&#039;Remote FrameBuffer(RFB)&#039;&#039;&#039; to transfer graphics, mouse movements, and keyboard input across the network.&lt;br /&gt;
*Available for most operating systems today.&lt;br /&gt;
*To allow remote connections, run &#039;&#039;yum install vnc-server&#039;&#039; command.&lt;br /&gt;
*Configure password for connections listed in the &#039;&#039;/etc/sysconfig/vncservers&#039;&#039; file using the &#039;&#039;vncpasswd&#039;&#039; command.&lt;br /&gt;
*Password is stored in &#039;&#039;~/.vnc/passwd&#039;&#039;.&lt;br /&gt;
*Connect to the VNC server using the &#039;&#039;vncviewer&#039;&#039; command.&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5567</id>
		<title>Chapter 12 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5567"/>
		<updated>2012-04-19T21:02:48Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Network Configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NETWORK CONFIGURATION&#039;&#039;&lt;br /&gt;
==Networks==&lt;br /&gt;
&lt;br /&gt;
Be sure to have a basic understanding of local area networks and wide area networks, and their components. &lt;br /&gt;
&lt;br /&gt;
===IPv4===&lt;br /&gt;
&lt;br /&gt;
*Consists of four octets. Each octet represents an 8-bit binary number(0-255). Ex: 192.168.1.1&lt;br /&gt;
*32 bit address(4 octets = 4 x 8 = 32)&lt;br /&gt;
*Subnet mask is used to determine the host portion of the IP address.&lt;br /&gt;
*Default Gateway directs traffic destined to other networks(LANs). Ex: to the internet.&lt;br /&gt;
&lt;br /&gt;
===IPv6===&lt;br /&gt;
&lt;br /&gt;
*Uses 128 bits. Capable of supplementing 340 trillion trillion trillion IP addresses.&lt;br /&gt;
*No subnetting required due to an abundance of address space.&lt;br /&gt;
*First half of address represents your network. Second half uniquely identifies computers on the LAN(link local).&lt;br /&gt;
&lt;br /&gt;
===Configuring a Network Interface===&lt;br /&gt;
&lt;br /&gt;
*NIC(Network Interface Controller) drivers are usually contained within modules that can be inserted to the Linux kernel.&lt;br /&gt;
*Modules end with the &#039;&#039;.ko&#039;&#039;(kernel object) extension and are typically stored in &#039;&#039;/lib/modules&#039;&#039; directory.&lt;br /&gt;
*Use &#039;&#039;insmod&#039;&#039; or &#039;&#039;modprobe&#039;&#039; commands to manually load modules into the Linux kernel.&lt;br /&gt;
*Use &#039;&#039;lsmod&#039;&#039; or &#039;&#039;rmmod&#039;&#039; commands to remove a module from the Linux kernel.&lt;br /&gt;
*Configure the loaded module driver for the NIC using the &#039;&#039;ifconfig&#039;&#039;(interface configuration) command.&lt;br /&gt;
*&#039;&#039;dhcpclient eth0&#039;&#039; command configures a NIC for dynamic host configuration protocol.&lt;br /&gt;
*To show interface statistics use &#039;&#039;ifconfig&#039;&#039; or &#039;&#039;netstat -i&#039;&#039;.&lt;br /&gt;
*The &#039;&#039;ifdown eth0&#039;&#039; and &#039;&#039;ifup eth0&#039;&#039; commands can be used to deactivate and active the network interface, respectively.&lt;br /&gt;
*The &#039;&#039;ping&#039;&#039; command is used to test network connectivity.&lt;br /&gt;
*All configuration options can also be achieved through a GUI within the Network Configuration tool.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;insmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;modprobe&#039;&#039;&lt;br /&gt;
 &#039;&#039;lsmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;rmmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifconfig&#039;&#039;&lt;br /&gt;
 &#039;&#039;netstat&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifdown&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifup&#039;&#039;&lt;br /&gt;
 &#039;&#039;dhcpclient&#039;&#039;&lt;br /&gt;
 &#039;&#039;ping&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Network Services===&lt;br /&gt;
&lt;br /&gt;
Network services are processes that run on your computer that provide some type of valuable service for client computers on the network. Often, they are represented by a series of daemon processes that listen for certain requests on the network. Daemons use &#039;&#039;&#039;port&#039;&#039;&#039; numbers to uniquely identify each service. Ports are defined in the &#039;&#039;/etc/services&#039;&#039; file. Port numbers range in number from 0 to 65534; ports 0 - 1023 are known as well-known ports because they represent commonly used network services. A list of well-known ports can be found on page 552. &#039;&#039;&#039;Stand-alone daemons&#039;&#039;&#039; are daemons that provided network services directly. The &#039;&#039;&#039;Internet Super Daemon(xinetd)&#039;&#039;&#039; acts somewhat like a middle man and starts the appropriate daemon to provide the network service as needed. &lt;br /&gt;
&lt;br /&gt;
*Install the internet super daemon with the &#039;&#039;yum install xinetd&#039;&#039; command, and edit the &#039;&#039;/etc/xinetd.comf&#039;&#039; file to configure the daemon.&lt;br /&gt;
*Large network daemons are stand-alone daemons that are started at boot time from files in the &#039;&#039;/etc/rc.d/rc*.d&#039;&#039; directories.&lt;br /&gt;
*The &#039;&#039;chkconfig&#039;&#039; command or the ntsysv utility can be used to configure stand-alone daemons to start in various runlevels.&lt;br /&gt;
&lt;br /&gt;
For a list of common network services refer to page 554.&lt;br /&gt;
&lt;br /&gt;
==Remote Administration==&lt;br /&gt;
&lt;br /&gt;
*Telnet &lt;br /&gt;
*Remote commands&lt;br /&gt;
*Secure Shell(SSH)&lt;br /&gt;
*X Windows - GUI&lt;br /&gt;
*Virtual Network Computing(VNC) - GUI&lt;br /&gt;
&lt;br /&gt;
===Telnet===&lt;br /&gt;
&lt;br /&gt;
*The &#039;&#039;telnet&#039;&#039; command is used to obtain a command-line shell on remote Linux servers across the network that run on a telnet server daemon.&lt;br /&gt;
*Most operating systems support the telnet network service.&lt;br /&gt;
*Managed by xinetd (internet super daemon).&lt;br /&gt;
*Execute &#039;&#039;yum install telnet-server&#039;&#039; command to install the telnet server daemon.&lt;br /&gt;
*Edit options in &#039;&#039;/etc/xinetd.d/telnet&#039;&#039; file to allow service.&lt;br /&gt;
*Telnet uses no encryption and can therefore be an unfavorable choice for remote administration.&lt;br /&gt;
&lt;br /&gt;
===Remote Commands===&lt;br /&gt;
&lt;br /&gt;
*Commonly called &#039;&#039;&#039;r commands&#039;&#039;&#039;.&lt;br /&gt;
*Used to execute commands on remote systems, obtain remote shells, and copy files between local and remote systems.&lt;br /&gt;
*&#039;&#039;Yum install rsh-server&#039;&#039; to install to a Linux system.&lt;br /&gt;
*Edit &#039;&#039;/etc/xinetd.d/rlogin&#039;&#039; and &#039;&#039;/etc/xinetd.d/rsh&#039;&#039; files for configuration. Restart the xinetd daemon using the &#039;&#039;service xinetd restart&#039;&#039; command.&lt;br /&gt;
*A remote user must have authorization or permission to login remotely using r commands.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;yum install rsh-server&#039;&#039;&lt;br /&gt;
 &#039;&#039;service xinetd restart&#039;&#039;&lt;br /&gt;
 &#039;&#039;rlogin&#039;&#039;&lt;br /&gt;
 &#039;&#039;rcp&#039;&#039;&lt;br /&gt;
 &#039;&#039;rsh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Secure Shell(SSH)===&lt;br /&gt;
&lt;br /&gt;
*Designed as a secure replacement for the recently discussed commands that encrypts information that passes across the network.&lt;br /&gt;
*The SSH daemon (sshd) is installed by default and is configured to start at runlevel 5.&lt;br /&gt;
*Uses secure challenge-response authentication method.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;ssh {hostname}&#039;&#039;&lt;br /&gt;
 &#039;&#039;ssh -l username {hostname}&#039;&#039;&lt;br /&gt;
 &#039;&#039;ssh-keygen&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Remote X Windows===&lt;br /&gt;
&lt;br /&gt;
*uses telnet or secure shell to connect to remote host and allows an administrator to execute any graphical utillity within the remote shell, such as system config-network.&lt;br /&gt;
&lt;br /&gt;
===Virtual Network Computing(VNC)===&lt;br /&gt;
&lt;br /&gt;
*Graphical option for administrating a Linux system remotely.&lt;br /&gt;
*Uses a special platform-independent protocol called &#039;&#039;&#039;Remote FrameBuffer(RFB)&#039;&#039;&#039; to transfer graphics, mouse movements, and keyboard input across the network.&lt;br /&gt;
*Available for most operating systems today.&lt;br /&gt;
*To allow remote connections, run &#039;&#039;yum install vnc-server&#039;&#039; command.&lt;br /&gt;
*Configure password for connections listed in the &#039;&#039;/etc/sysconfig/vncservers&#039;&#039; file using the &#039;&#039;vncpasswd&#039;&#039; command.&lt;br /&gt;
*Password is stored in &#039;&#039;~/.vnc/passwd&#039;&#039;.&lt;br /&gt;
*Connect to the VNC server using the &#039;&#039;vncviewer&#039;&#039; command.&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5566</id>
		<title>Chapter 12 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5566"/>
		<updated>2012-04-19T20:47:13Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Network Configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Networks==&lt;br /&gt;
&lt;br /&gt;
Be sure to have a basic understanding of local area networks and wide area networks, and their components. &lt;br /&gt;
&lt;br /&gt;
===IPv4===&lt;br /&gt;
&lt;br /&gt;
*Consists of four octets. Each octet represents an 8-bit binary number(0-255). Ex: 192.168.1.1&lt;br /&gt;
*32 bit address(4 octets = 4 x 8 = 32)&lt;br /&gt;
*Subnet mask is used to determine the host portion of the IP address.&lt;br /&gt;
*Default Gateway directs traffic destined to other networks(LANs). Ex: to the internet.&lt;br /&gt;
&lt;br /&gt;
===IPv6===&lt;br /&gt;
&lt;br /&gt;
*Uses 128 bits. Capable of supplementing 340 trillion trillion trillion IP addresses.&lt;br /&gt;
*No subnetting required due to an abundance of address space.&lt;br /&gt;
*First half of address represents your network. Second half uniquely identifies computers on the LAN(link local).&lt;br /&gt;
&lt;br /&gt;
===Configuring a Network Interface===&lt;br /&gt;
&lt;br /&gt;
*NIC(Network Interface Controller) drivers are usually contained within modules that can be inserted to the Linux kernel.&lt;br /&gt;
*Modules end with the &#039;&#039;.ko&#039;&#039;(kernel object) extension and are typically stored in &#039;&#039;/lib/modules&#039;&#039; directory.&lt;br /&gt;
*Use &#039;&#039;insmod&#039;&#039; or &#039;&#039;modprobe&#039;&#039; commands to manually load modules into the Linux kernel.&lt;br /&gt;
*Use &#039;&#039;lsmod&#039;&#039; or &#039;&#039;rmmod&#039;&#039; commands to remove a module from the Linux kernel.&lt;br /&gt;
*Configure the loaded module driver for the NIC using the &#039;&#039;ifconfig&#039;&#039;(interface configuration) command.&lt;br /&gt;
*&#039;&#039;dhcpclient eth0&#039;&#039; command configures a NIC for dynamic host configuration protocol.&lt;br /&gt;
*To show interface statistics use &#039;&#039;ifconfig&#039;&#039; or &#039;&#039;netstat -i&#039;&#039;.&lt;br /&gt;
*The &#039;&#039;ifdown eth0&#039;&#039; and &#039;&#039;ifup eth0&#039;&#039; commands can be used to deactivate and active the network interface, respectively.&lt;br /&gt;
*The &#039;&#039;ping&#039;&#039; command is used to test network connectivity.&lt;br /&gt;
*All configuration options can also be achieved through a GUI within the Network Configuration tool.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;insmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;modprobe&#039;&#039;&lt;br /&gt;
 &#039;&#039;lsmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;rmmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifconfig&#039;&#039;&lt;br /&gt;
 &#039;&#039;netstat&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifdown&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifup&#039;&#039;&lt;br /&gt;
 &#039;&#039;dhcpclient&#039;&#039;&lt;br /&gt;
 &#039;&#039;ping&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Network Services===&lt;br /&gt;
&lt;br /&gt;
Network services are processes that run on your computer that provide some type of valuable service for client computers on the network. Often, they are represented by a series of daemon processes that listen for certain requests on the network. Daemons use &#039;&#039;&#039;port&#039;&#039;&#039; numbers to uniquely identify each service. Ports are defined in the &#039;&#039;/etc/services&#039;&#039; file. Port numbers range in number from 0 to 65534; ports 0 - 1023 are known as well-known ports because they represent commonly used network services. A list of well-known ports can be found on page 552. &#039;&#039;&#039;Stand-alone daemons&#039;&#039;&#039; are daemons that provided network services directly. The &#039;&#039;&#039;Internet Super Daemon(xinetd)&#039;&#039;&#039; acts somewhat like a middle man and starts the appropriate daemon to provide the network service as needed. &lt;br /&gt;
&lt;br /&gt;
*Install the internet super daemon with the &#039;&#039;yum install xinetd&#039;&#039; command, and edit the &#039;&#039;/etc/xinetd.comf&#039;&#039; file to configure the daemon.&lt;br /&gt;
*Large network daemons are stand-alone daemons that are started at boot time from files in the &#039;&#039;/etc/rc.d/rc*.d&#039;&#039; directories.&lt;br /&gt;
*The &#039;&#039;chkconfig&#039;&#039; command or the ntsysv utility can be used to configure stand-alone daemons to start in various runlevels.&lt;br /&gt;
&lt;br /&gt;
For a list of common network services refer to page 554.&lt;br /&gt;
&lt;br /&gt;
==Remote Administration==&lt;br /&gt;
&lt;br /&gt;
*Telnet &lt;br /&gt;
*Remote commands&lt;br /&gt;
*Secure Shell(SSH)&lt;br /&gt;
*X Windows - GUI&lt;br /&gt;
*Virtual Network Computing(VNC) - GUI&lt;br /&gt;
&lt;br /&gt;
===Telnet===&lt;br /&gt;
&lt;br /&gt;
*The &#039;&#039;telnet&#039;&#039; command is used to obtain a command-line shell on remote Linux servers across the network that run on a telnet server daemon.&lt;br /&gt;
*Most operating systems support the telnet network service.&lt;br /&gt;
*Managed by xinetd (internet super daemon).&lt;br /&gt;
*Execute &#039;&#039;yum install telnet-server&#039;&#039; command to install the telnet server daemon.&lt;br /&gt;
*Edit options in &#039;&#039;/etc/xinetd.d/telnet&#039;&#039; file to allow service.&lt;br /&gt;
*Telnet uses no encryption and can therefore be an unfavorable choice for remote administration.&lt;br /&gt;
&lt;br /&gt;
===Remote Commands===&lt;br /&gt;
&lt;br /&gt;
*Commonly called &#039;&#039;&#039;r commands&#039;&#039;&#039;.&lt;br /&gt;
*Used to execute commands on remote systems, obtain remote shells, and copy files between local and remote systems.&lt;br /&gt;
*&#039;&#039;Yum install rsh-server&#039;&#039; to install to a Linux system.&lt;br /&gt;
*Edit &#039;&#039;/etc/xinetd.d/rlogin&#039;&#039; and &#039;&#039;/etc/xinetd.d/rsh&#039;&#039; files for configuration. Restart the xinetd daemon using the &#039;&#039;service xinetd restart&#039;&#039; command.&lt;br /&gt;
*A remote user must have authorization or permission to login remotely using r commands.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;yum install rsh-server&#039;&#039;&lt;br /&gt;
 &#039;&#039;service xinetd restart&#039;&#039;&lt;br /&gt;
 &#039;&#039;rlogin&#039;&#039;&lt;br /&gt;
 &#039;&#039;rcp&#039;&#039;&lt;br /&gt;
 &#039;&#039;rsh&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Secure Shell(SSH)===&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5565</id>
		<title>Chapter 12 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5565"/>
		<updated>2012-04-19T15:55:04Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Network Configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Networks==&lt;br /&gt;
&lt;br /&gt;
Be sure to have a basic understanding of local area networks and wide area networks, and their components. &lt;br /&gt;
&lt;br /&gt;
===IPv4===&lt;br /&gt;
&lt;br /&gt;
*Consists of four octets. Each octet represents an 8-bit binary number(0-255). Ex: 192.168.1.1&lt;br /&gt;
*32 bit address(4 octets = 4 x 8 = 32)&lt;br /&gt;
*Subnet mask is used to determine the host portion of the IP address.&lt;br /&gt;
*Default Gateway directs traffic destined to other networks(LANs). Ex: to the internet.&lt;br /&gt;
&lt;br /&gt;
===IPv6===&lt;br /&gt;
&lt;br /&gt;
*Uses 128 bits. Capable of supplementing 340 trillion trillion trillion IP addresses.&lt;br /&gt;
*No subnetting required due to an abundance of address space.&lt;br /&gt;
*First half of address represents your network. Second half uniquely identifies computers on the LAN(link local).&lt;br /&gt;
&lt;br /&gt;
===Configuring a Network Interface===&lt;br /&gt;
&lt;br /&gt;
*NIC(Network Interface Controller) drivers are usually contained within modules that can be inserted to the Linux kernel.&lt;br /&gt;
*Modules end with the &#039;&#039;.ko&#039;&#039;(kernel object) extension and are typically stored in &#039;&#039;/lib/modules&#039;&#039; directory.&lt;br /&gt;
*Use &#039;&#039;insmod&#039;&#039; or &#039;&#039;modprobe&#039;&#039; commands to manually load modules into the Linux kernel.&lt;br /&gt;
*Use &#039;&#039;lsmod&#039;&#039; or &#039;&#039;rmmod&#039;&#039; commands to remove a module from the Linux kernel.&lt;br /&gt;
*Configure the loaded module driver for the NIC using the &#039;&#039;ifconfig&#039;&#039;(interface configuration) command.&lt;br /&gt;
*&#039;&#039;dhcpclient eth0&#039;&#039; command configures a NIC for dynamic host configuration protocol.&lt;br /&gt;
*To show interface statistics use &#039;&#039;ifconfig&#039;&#039; or &#039;&#039;netstat -i&#039;&#039;.&lt;br /&gt;
*The &#039;&#039;ifdown eth0&#039;&#039; and &#039;&#039;ifup eth0&#039;&#039; commands can be used to deactivate and active the network interface, respectively.&lt;br /&gt;
*The &#039;&#039;ping&#039;&#039; command is used to test network connectivity.&lt;br /&gt;
*All configuration options can also be achieved through a GUI within the Network Configuration tool.&lt;br /&gt;
&lt;br /&gt;
====Useful Commands====&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;insmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;modprobe&#039;&#039;&lt;br /&gt;
 &#039;&#039;lsmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;rmmod&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifconfig&#039;&#039;&lt;br /&gt;
 &#039;&#039;netstat&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifdown&#039;&#039;&lt;br /&gt;
 &#039;&#039;ifup&#039;&#039;&lt;br /&gt;
 &#039;&#039;dhcpclient&#039;&#039;&lt;br /&gt;
 &#039;&#039;ping&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Name Resolution===&lt;br /&gt;
&lt;br /&gt;
*Set a host name using the &#039;&#039;hostname&#039;&#039; command. &lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5564</id>
		<title>Chapter 12 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_12_Study_Guide&amp;diff=5564"/>
		<updated>2012-04-19T01:26:23Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Network Configuration&amp;#039;&amp;#039;&amp;#039;  ==Networks==  Be sure to have a basic understanding of local area networks and wide area networks, and their components.   ===IPv4===  *Consists of f...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Network Configuration&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Networks==&lt;br /&gt;
&lt;br /&gt;
Be sure to have a basic understanding of local area networks and wide area networks, and their components. &lt;br /&gt;
&lt;br /&gt;
===IPv4===&lt;br /&gt;
&lt;br /&gt;
*Consists of four octets. Each octet represents an 8-bit binary number(0-255). Ex: 192.168.1.1&lt;br /&gt;
*32 bit address(4 octets = 4 x 8 = 32)&lt;br /&gt;
*Subnet mask is used to determine the host portion of the IP address.&lt;br /&gt;
*Default Gateway directs traffic destined to other networks(LANs). Ex: to the internet.&lt;br /&gt;
&lt;br /&gt;
===IPv6===&lt;br /&gt;
&lt;br /&gt;
*Uses 128 bits. Capable of supplementing 340 trillion trillion trillion IP addresses.&lt;br /&gt;
*No subnetting required due to an abundance of address space.&lt;br /&gt;
*First half of address represents your network. Second half uniquely identifies computers on the LAN(link local).&lt;br /&gt;
&lt;br /&gt;
==Configuring a Network Interface==&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5563</id>
		<title>Chapter 11 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5563"/>
		<updated>2012-04-18T01:22:48Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Chapter 11 study guide all information gathered and edited by Clay Wilson&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Compression, System Backup, and Software Installation&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Compression==&lt;br /&gt;
&lt;br /&gt;
Compression is the process in which files are reduced in size by a compression algorithm. The standard set of instructions used to compress a file is the compression algorithm. To decompress a file, you run compression algorithm in reverse. Compression ratios are known as the different rates of compression, which vary among the different compression algorithms. The compression utilities discussed in this chapter are:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Compress&#039;&#039;&lt;br /&gt;
&#039;&#039;Gzip&#039;&#039;&lt;br /&gt;
&#039;&#039;Bzip2&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Compress===&lt;br /&gt;
&lt;br /&gt;
*Uses Adaptive Lempel-Ziv coding(LWZ) as its compression algorithm.&lt;br /&gt;
*Average compression ratio of 40 to 50 percent.&lt;br /&gt;
*Compressed files are renamed with a .Z filename extension to indicate that it is compressed.&lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;compress&#039;&#039;&lt;br /&gt;
 &#039;&#039;uncompress&#039;&#039;&lt;br /&gt;
 &#039;&#039;zcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;zmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;zless&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Common options used with the compress utility&lt;br /&gt;
 -c     Used with &#039;&#039;uncompress&#039;&#039;, it displays the contents of the compressed file to SO&lt;br /&gt;
 -f     Used with compress, used to compress symbolic links. Used with uncompress, overwrites existing files without prompting user.&lt;br /&gt;
 -r     Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -v     Displays verbose output during compression and decompression.&lt;br /&gt;
&lt;br /&gt;
===Gzip===&lt;br /&gt;
&lt;br /&gt;
*GNU zip(gzip).&lt;br /&gt;
*Uses Limpel-Ziv(LZ77) compression algorithm.&lt;br /&gt;
*Average compression ratio is 60 to 70 percent. &lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
*Compressed files use the .gz filename extension.&lt;br /&gt;
*Ability to control the compression ratio using numeric values 1-9. 1 gives you faster compression time and yields lower ratio, 9 gives you slowest compression time and yields higher ratio.&lt;br /&gt;
*Default compression number is 6.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;gzip&#039;&#039;&lt;br /&gt;
 &#039;&#039;gunzip&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the gzip utility&lt;br /&gt;
 -#               Specifies how thorough the compression will be. # can be any numeric value from 1 to 9. If no value, Default is 6.&lt;br /&gt;
 --best           Results in higher compression ratio; same as the -9 option.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout&lt;br /&gt;
 -to-stdout       Displays the contents of the compress file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress&lt;br /&gt;
 --uncompress     Decompresses the files specified when used with the gzip command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force          Compresses symbolic links, or overwrites any existing files without prompting user.&lt;br /&gt;
 --fast           Results in a lower compression ratio; same as the -1 option.&lt;br /&gt;
 -h&lt;br /&gt;
 --help           Displays the syntax and available options for the &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; commands.&lt;br /&gt;
 -l&lt;br /&gt;
 --list           Lists the compression ratio for files that have been compressed with &#039;&#039;gzip&#039;&#039;.&lt;br /&gt;
 -n&lt;br /&gt;
 --no-name        Does not allow &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; to preserve the original modification and access time for fiels.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite          Supresses all warning messages.&lt;br /&gt;
 -r&lt;br /&gt;
 --recursive      Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -S .suffix &lt;br /&gt;
 --suffix&lt;br /&gt;
 .suffix          Specifies a file suffix other than .gz.&lt;br /&gt;
 -t&lt;br /&gt;
 --test           Performs a test decompression so the user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose        Displays verbose output(compression ratio and filenames).&lt;br /&gt;
&lt;br /&gt;
===Bzip2===&lt;br /&gt;
&lt;br /&gt;
*Uses Burrows-Wheeler Block Sorting Huffman Coding compression algorithm.&lt;br /&gt;
*Cannot be used to compress a directory full of files.&lt;br /&gt;
*Compression ratio is 50 to 75 percent.&lt;br /&gt;
*Symbolic links are only compressed if the -f option is used.&lt;br /&gt;
*Compressed files are renamed with .bz2 filename extension.&lt;br /&gt;
*to decompress files, use the &#039;&#039;bunzip2&#039;&#039; command followed by the filename to decompress.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;bzip2&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzless&#039;&#039;&lt;br /&gt;
 &#039;&#039;bunzip2&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the bzip2 utility&lt;br /&gt;
 -#           Specifies the block size used during compression; -1 = block size of 100K, -9 = block size of 900K.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout     Displays the contents of the compressed file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress Decompresses the files specified, same as &#039;&#039;bunzip2&#039;&#039; command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force      Compresses symbolic links, or overwrites any existing files without prompting the user.&lt;br /&gt;
 -k&lt;br /&gt;
 --keep       Keeps the original file during compression; a new file is created with the extension .bz2.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite      Suppresses all warning messages.&lt;br /&gt;
 -s&lt;br /&gt;
 -small       Minimizes memory usage during compression.&lt;br /&gt;
 -t&lt;br /&gt;
 --test       Performs a test decompression so a user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose    Displays verbose output(compression ratio).&lt;br /&gt;
&lt;br /&gt;
==System Backup==&lt;br /&gt;
&lt;br /&gt;
A &#039;&#039;&#039;system backup&#039;&#039;&#039; is the process of creating backup copies of files and directories regularly and storing them at an alternate location. These copies can be distributed to other computers, or use them to restore files lost as a result of a system failure. The backup copies of files and directories are called &#039;&#039;&#039;archives&#039;&#039;&#039;. An &#039;&#039;&#039;incremental backup&#039;&#039;&#039; backs up only the data that has been changed since the last backup(full or incremental).&lt;br /&gt;
&lt;br /&gt;
*tar&lt;br /&gt;
*cpio&lt;br /&gt;
*dump/restore&lt;br /&gt;
*Disk-burning software&lt;br /&gt;
&lt;br /&gt;
===The tar Utility===&lt;br /&gt;
&lt;br /&gt;
*Tape Archive(tar).&lt;br /&gt;
*One of the oldest widely used backup utilities. &lt;br /&gt;
*Can create an archive in a file or directly on a device.&lt;br /&gt;
*Files are backed up recursively and stored using relative pathnames.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;tar&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Refer to page 487 for a table of common options used with the tar utility.&lt;br /&gt;
&lt;br /&gt;
===The cpio Utility===&lt;br /&gt;
&lt;br /&gt;
*copy in/out(cpio).&lt;br /&gt;
*Ability to use long filenames and back up device files.&lt;br /&gt;
*Uses absolute pathnames by default.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;cpio&#039;&#039;&lt;br /&gt;
 &#039;&#039;find&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Refer to page 491 for a table of common options used with the cpio utility.&lt;br /&gt;
&lt;br /&gt;
===The dump/restore Utility===&lt;br /&gt;
&lt;br /&gt;
*Can only work with files on ext2 and ext3 filesystems.&lt;br /&gt;
*Nine different incremental backups; 0 = a full backup, 1 through 9 - incremental backups. The lower the number the more data backed up.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;df&#039;&#039;&lt;br /&gt;
 &#039;&#039;dump&#039;&#039;&lt;br /&gt;
 &#039;&#039;restore&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Refer to page 494 for a table of common options used with the dump/restore utility.&lt;br /&gt;
&lt;br /&gt;
==Software Installation==&lt;br /&gt;
&lt;br /&gt;
A &#039;&#039;&#039;checksum&#039;&#039;&#039; is a calculated value that is unique to a file&#039;s size and contents, and is used to verify the file has been downloaded in its entirety. A &#039;&#039;&#039;Package Manager&#039;&#039;&#039; is a system that defines a standard package format and can be used to install, query, and remove packages. The most commonly used &#039;&#039;&#039;package manager&#039;&#039;&#039; in linux is the &#039;&#039;&#039;Red Hat Package Manager(RPM)&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
===Installing Programs Using RPM===&lt;br /&gt;
&lt;br /&gt;
Be sure to understand the concept of using the &#039;&#039;yum&#039;&#039; command to search the internet and finding packages to be downloaded and installed on your system.&lt;br /&gt;
&lt;br /&gt;
Refer to page 508 for a table of common options used with the rpm utility.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;rpm&#039;&#039;&lt;br /&gt;
 &#039;&#039;yum&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5562</id>
		<title>Chapter 11 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5562"/>
		<updated>2012-04-18T01:11:19Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Compression, System Backup, and Software Installation&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Compression==&lt;br /&gt;
&lt;br /&gt;
Compression is the process in which files are reduced in size by a compression algorithm. The standard set of instructions used to compress a file is the compression algorithm. To decompress a file, you run compression algorithm in reverse. Compression ratios are known as the different rates of compression, which vary among the different compression algorithms. The compression utilities discussed in this chapter are:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Compress&#039;&#039;&lt;br /&gt;
&#039;&#039;Gzip&#039;&#039;&lt;br /&gt;
&#039;&#039;Bzip2&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Compress===&lt;br /&gt;
&lt;br /&gt;
*Uses Adaptive Lempel-Ziv coding(LWZ) as its compression algorithm.&lt;br /&gt;
*Average compression ratio of 40 to 50 percent.&lt;br /&gt;
*Compressed files are renamed with a .Z filename extension to indicate that it is compressed.&lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;compress&#039;&#039;&lt;br /&gt;
 &#039;&#039;uncompress&#039;&#039;&lt;br /&gt;
 &#039;&#039;zcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;zmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;zless&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Common options used with the compress utility&lt;br /&gt;
 -c     Used with &#039;&#039;uncompress&#039;&#039;, it displays the contents of the compressed file to SO&lt;br /&gt;
 -f     Used with compress, used to compress symbolic links. Used with uncompress, overwrites existing files without prompting user.&lt;br /&gt;
 -r     Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -v     Displays verbose output during compression and decompression.&lt;br /&gt;
&lt;br /&gt;
===Gzip===&lt;br /&gt;
&lt;br /&gt;
*GNU zip(gzip).&lt;br /&gt;
*Uses Limpel-Ziv(LZ77) compression algorithm.&lt;br /&gt;
*Average compression ratio is 60 to 70 percent. &lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
*Compressed files use the .gz filename extension.&lt;br /&gt;
*Ability to control the compression ratio using numeric values 1-9. 1 gives you faster compression time and yields lower ratio, 9 gives you slowest compression time and yields higher ratio.&lt;br /&gt;
*Default compression number is 6.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;gzip&#039;&#039;&lt;br /&gt;
 &#039;&#039;gunzip&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the gzip utility&lt;br /&gt;
 -#               Specifies how thorough the compression will be. # can be any numeric value from 1 to 9. If no value, Default is 6.&lt;br /&gt;
 --best           Results in higher compression ratio; same as the -9 option.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout&lt;br /&gt;
 -to-stdout       Displays the contents of the compress file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress&lt;br /&gt;
 --uncompress     Decompresses the files specified when used with the gzip command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force          Compresses symbolic links, or overwrites any existing files without prompting user.&lt;br /&gt;
 --fast           Results in a lower compression ratio; same as the -1 option.&lt;br /&gt;
 -h&lt;br /&gt;
 --help           Displays the syntax and available options for the &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; commands.&lt;br /&gt;
 -l&lt;br /&gt;
 --list           Lists the compression ratio for files that have been compressed with &#039;&#039;gzip&#039;&#039;.&lt;br /&gt;
 -n&lt;br /&gt;
 --no-name        Does not allow &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; to preserve the original modification and access time for fiels.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite          Supresses all warning messages.&lt;br /&gt;
 -r&lt;br /&gt;
 --recursive      Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -S .suffix &lt;br /&gt;
 --suffix&lt;br /&gt;
 .suffix          Specifies a file suffix other than .gz.&lt;br /&gt;
 -t&lt;br /&gt;
 --test           Performs a test decompression so the user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose        Displays verbose output(compression ratio and filenames).&lt;br /&gt;
&lt;br /&gt;
===Bzip2===&lt;br /&gt;
&lt;br /&gt;
*Uses Burrows-Wheeler Block Sorting Huffman Coding compression algorithm.&lt;br /&gt;
*Cannot be used to compress a directory full of files.&lt;br /&gt;
*Compression ratio is 50 to 75 percent.&lt;br /&gt;
*Symbolic links are only compressed if the -f option is used.&lt;br /&gt;
*Compressed files are renamed with .bz2 filename extension.&lt;br /&gt;
*to decompress files, use the &#039;&#039;bunzip2&#039;&#039; command followed by the filename to decompress.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;bzip2&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzless&#039;&#039;&lt;br /&gt;
 &#039;&#039;bunzip2&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the bzip2 utility&lt;br /&gt;
 -#           Specifies the block size used during compression; -1 = block size of 100K, -9 = block size of 900K.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout     Displays the contents of the compressed file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress Decompresses the files specified, same as &#039;&#039;bunzip2&#039;&#039; command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force      Compresses symbolic links, or overwrites any existing files without prompting the user.&lt;br /&gt;
 -k&lt;br /&gt;
 --keep       Keeps the original file during compression; a new file is created with the extension .bz2.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite      Suppresses all warning messages.&lt;br /&gt;
 -s&lt;br /&gt;
 -small       Minimizes memory usage during compression.&lt;br /&gt;
 -t&lt;br /&gt;
 --test       Performs a test decompression so a user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose    Displays verbose output(compression ratio).&lt;br /&gt;
&lt;br /&gt;
==System Backup==&lt;br /&gt;
&lt;br /&gt;
A &#039;&#039;&#039;system backup&#039;&#039;&#039; is the process of creating backup copies of files and directories regularly and storing them at an alternate location. These copies can be distributed to other computers, or use them to restore files lost as a result of a system failure. The backup copies of files and directories are called &#039;&#039;&#039;archives&#039;&#039;&#039;. An &#039;&#039;&#039;incremental backup&#039;&#039;&#039; backs up only the data that has been changed since the last backup(full or incremental).&lt;br /&gt;
&lt;br /&gt;
*tar&lt;br /&gt;
*cpio&lt;br /&gt;
*dump/restore&lt;br /&gt;
*Disk-burning software&lt;br /&gt;
&lt;br /&gt;
===The tar Utility===&lt;br /&gt;
&lt;br /&gt;
*Tape Archive(tar).&lt;br /&gt;
*One of the oldest widely used backup utilities. &lt;br /&gt;
*Can create an archive in a file or directly on a device.&lt;br /&gt;
*Files are backed up recursively and stored using relative pathnames.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;tar&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Refer to page 487 for a table of common options used with the tar utility.&lt;br /&gt;
&lt;br /&gt;
===The cpio Utility===&lt;br /&gt;
&lt;br /&gt;
*copy in/out(cpio).&lt;br /&gt;
*Ability to use long filenames and back up device files.&lt;br /&gt;
*Uses absolute pathnames by default.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;cpio&#039;&#039;&lt;br /&gt;
 &#039;&#039;find&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Refer to page 491 for a table of common options used with the cpio utility.&lt;br /&gt;
&lt;br /&gt;
===The dump/restore Utility===&lt;br /&gt;
&lt;br /&gt;
*Can only work with files on ext2 and ext3 filesystems.&lt;br /&gt;
*Nine different incremental backups; 0 = a full backup, 1 through 9 - incremental backups. The lower the number the more data backed up.&lt;br /&gt;
&lt;br /&gt;
====Useful commands====&lt;br /&gt;
 &#039;&#039;df&#039;&#039;&lt;br /&gt;
 &#039;&#039;dump&#039;&#039;&lt;br /&gt;
 &#039;&#039;restore&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Refer to page 494 for a table of common options used with the dump/restore utility.&lt;br /&gt;
&lt;br /&gt;
==Software Installation==&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5561</id>
		<title>Chapter 11 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5561"/>
		<updated>2012-04-18T00:58:12Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Compression, System Backup, and Software Installation&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Compression==&lt;br /&gt;
&lt;br /&gt;
Compression is the process in which files are reduced in size by a compression algorithm. The standard set of instructions used to compress a file is the compression algorithm. To decompress a file, you run compression algorithm in reverse. Compression ratios are known as the different rates of compression, which vary among the different compression algorithms. The compression utilities discussed in this chapter are:&lt;br /&gt;
&lt;br /&gt;
*Compress&lt;br /&gt;
*Gzip&lt;br /&gt;
*Bzip2&lt;br /&gt;
&lt;br /&gt;
===Compress===&lt;br /&gt;
&lt;br /&gt;
*Uses Adaptive Lempel-Ziv coding(LWZ) as its compression algorithm.&lt;br /&gt;
*Average compression ratio of 40 to 50 percent.&lt;br /&gt;
*Compressed files are renamed with a .Z filename extension to indicate that it is compressed.&lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
&lt;br /&gt;
====Useful commands include====&lt;br /&gt;
 &#039;&#039;compress&#039;&#039;&lt;br /&gt;
 &#039;&#039;uncompress&#039;&#039;&lt;br /&gt;
 &#039;&#039;zcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;zmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;zless&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Common options used with the compress utility&lt;br /&gt;
 -c     Used with &#039;&#039;uncompress&#039;&#039;, it displays the contents of the compressed file to SO&lt;br /&gt;
 -f     Used with compress, used to compress symbolic links. Used with uncompress, overwrites existing files without prompting user.&lt;br /&gt;
 -r     Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -v     Displays verbose output during compression and decompression.&lt;br /&gt;
&lt;br /&gt;
===Gzip===&lt;br /&gt;
&lt;br /&gt;
*GNU zip(gzip).&lt;br /&gt;
*Uses Limpel-Ziv(LZ77) compression algorithm.&lt;br /&gt;
*Average compression ratio is 60 to 70 percent. &lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
*Compressed files use the .gz filename extension.&lt;br /&gt;
*Ability to control the compression ratio using numeric values 1-9. 1 gives you faster compression time and yields lower ratio, 9 gives you slowest compression time and yields higher ratio.&lt;br /&gt;
*Default compression number is 6.&lt;br /&gt;
&lt;br /&gt;
====Useful commands include====&lt;br /&gt;
 &#039;&#039;gzip&#039;&#039;&lt;br /&gt;
 &#039;&#039;gunzip&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the gzip utility&lt;br /&gt;
 -#               Specifies how thorough the compression will be. # can be any numeric value from 1 to 9. If no value, Default is 6.&lt;br /&gt;
 --best           Results in higher compression ratio; same as the -9 option.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout&lt;br /&gt;
 -to-stdout       Displays the contents of the compress file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress&lt;br /&gt;
 --uncompress     Decompresses the files specified when used with the gzip command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force          Compresses symbolic links, or overwrites any existing files without prompting user.&lt;br /&gt;
 --fast           Results in a lower compression ratio; same as the -1 option.&lt;br /&gt;
 -h&lt;br /&gt;
 --help           Displays the syntax and available options for the &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; commands.&lt;br /&gt;
 -l&lt;br /&gt;
 --list           Lists the compression ratio for files that have been compressed with &#039;&#039;gzip&#039;&#039;.&lt;br /&gt;
 -n&lt;br /&gt;
 --no-name        Does not allow &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; to preserve the original modification and access time for fiels.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite          Supresses all warning messages.&lt;br /&gt;
 -r&lt;br /&gt;
 --recursive      Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -S .suffix &lt;br /&gt;
 --suffix&lt;br /&gt;
 .suffix          Specifies a file suffix other than .gz.&lt;br /&gt;
 -t&lt;br /&gt;
 --test           Performs a test decompression so the user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose        Displays verbose output(compression ratio and filenames).&lt;br /&gt;
&lt;br /&gt;
===Bzip2===&lt;br /&gt;
&lt;br /&gt;
*Uses Burrows-Wheeler Block Sorting Huffman Coding compression algorithm.&lt;br /&gt;
*Cannot be used to compress a directory full of files.&lt;br /&gt;
*Compression ratio is 50 to 75 percent.&lt;br /&gt;
*Symbolic links are only compressed if the -f option is used.&lt;br /&gt;
*Compressed files are renamed with .bz2 filename extension.&lt;br /&gt;
*to decompress files, use the &#039;&#039;bunzip2&#039;&#039; command followed by the filename to decompress.&lt;br /&gt;
&lt;br /&gt;
====Useful commands include====&lt;br /&gt;
 &#039;&#039;bzip2&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzless&#039;&#039;&lt;br /&gt;
 &#039;&#039;bunzip2&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the bzip2 utility&lt;br /&gt;
 -#           Specifies the block size used during compression; -1 = block size of 100K, -9 = block size of 900K.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout     Displays the contents of the compressed file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress Decompresses the files specified, same as &#039;&#039;bunzip2&#039;&#039; command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force      Compresses symbolic links, or overwrites any existing files without prompting the user.&lt;br /&gt;
 -k&lt;br /&gt;
 --keep       Keeps the original file during compression; a new file is created with the extension .bz2.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite      Suppresses all warning messages.&lt;br /&gt;
 -s&lt;br /&gt;
 -small       Minimizes memory usage during compression.&lt;br /&gt;
 -t&lt;br /&gt;
 --test       Performs a test decompression so a user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose    Displays verbose output(compression ratio).&lt;br /&gt;
&lt;br /&gt;
==System Backup==&lt;br /&gt;
&lt;br /&gt;
A &#039;&#039;&#039;system backup&#039;&#039;&#039; is the process of creating backup copies of files and directories regularly and storing them at an alternate location. These copies can be distributed to other computers, or use them to restore files lost as a result of a system failure. The backup copies of files and directories are called &#039;&#039;&#039;archives&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
*tar&lt;br /&gt;
*cpio&lt;br /&gt;
*dump/restore&lt;br /&gt;
*Disk-burning software&lt;br /&gt;
&lt;br /&gt;
===The tar Utility===&lt;br /&gt;
&lt;br /&gt;
*Tape Archive(tar).&lt;br /&gt;
*One of the oldest widely used backup utilities. &lt;br /&gt;
*Can create an archive in a file or directly on a device.&lt;br /&gt;
*Files are backed up recursively and stored using relative pathnames.&lt;br /&gt;
&lt;br /&gt;
====Useful commands include====&lt;br /&gt;
 &#039;&#039;tar&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Refer to page 487 for a table of common options used with the tar utility.&lt;br /&gt;
&lt;br /&gt;
===The cpio Utility===&lt;br /&gt;
&lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5560</id>
		<title>Chapter 11 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5560"/>
		<updated>2012-04-18T00:51:11Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Compression, System Backup, and Software Installation&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Compression==&lt;br /&gt;
&lt;br /&gt;
Compression is the process in which files are reduced in size by a compression algorithm. The standard set of instructions used to compress a file is the compression algorithm. To decompress a file, you run compression algorithm in reverse. Compression ratios are known as the different rates of compression, which vary among the different compression algorithms. The compression utilities discussed in this chapter are:&lt;br /&gt;
&lt;br /&gt;
*Compress&lt;br /&gt;
*Gzip&lt;br /&gt;
*Bzip2&lt;br /&gt;
&lt;br /&gt;
===Compress===&lt;br /&gt;
&lt;br /&gt;
*Uses Adaptive Lempel-Ziv coding(LWZ) as its compression algorithm.&lt;br /&gt;
*Average compression ratio of 40 to 50 percent.&lt;br /&gt;
*Compressed files are renamed with a .Z filename extension to indicate that it is compressed.&lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
&lt;br /&gt;
====Useful commands include:====&lt;br /&gt;
 &#039;&#039;compress&#039;&#039;&lt;br /&gt;
 &#039;&#039;uncompress&#039;&#039;&lt;br /&gt;
 &#039;&#039;zcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;zmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;zless&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Common options used with the compress utility&lt;br /&gt;
 -c     Used with &#039;&#039;uncompress&#039;&#039;, it displays the contents of the compressed file to SO&lt;br /&gt;
 -f     Used with compress, used to compress symbolic links. Used with uncompress, overwrites existing files without prompting user.&lt;br /&gt;
 -r     Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -v     Displays verbose output during compression and decompression.&lt;br /&gt;
&lt;br /&gt;
===Gzip===&lt;br /&gt;
&lt;br /&gt;
*GNU zip(gzip).&lt;br /&gt;
*Uses Limpel-Ziv(LZ77) compression algorithm.&lt;br /&gt;
*Average compression ratio is 60 to 70 percent. &lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
*Compressed files use the .gz filename extension.&lt;br /&gt;
*Ability to control the compression ratio using numeric values 1-9. 1 gives you faster compression time and yields lower ratio, 9 gives you slowest compression time and yields higher ratio.&lt;br /&gt;
*Default compression number is 6.&lt;br /&gt;
&lt;br /&gt;
====Useful commands include:====&lt;br /&gt;
 &#039;&#039;gzip&#039;&#039;&lt;br /&gt;
 &#039;&#039;gunzip&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the gzip utility&lt;br /&gt;
 -#               Specifies how thorough the compression will be. # can be any numeric value from 1 to 9. If no value, Default is 6.&lt;br /&gt;
 --best           Results in higher compression ratio; same as the -9 option.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout&lt;br /&gt;
 -to-stdout       Displays the contents of the compress file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress&lt;br /&gt;
 --uncompress     Decompresses the files specified when used with the gzip command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force          Compresses symbolic links, or overwrites any existing files without prompting user.&lt;br /&gt;
 --fast           Results in a lower compression ratio; same as the -1 option.&lt;br /&gt;
 -h&lt;br /&gt;
 --help           Displays the syntax and available options for the &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; commands.&lt;br /&gt;
 -l&lt;br /&gt;
 --list           Lists the compression ratio for files that have been compressed with &#039;&#039;gzip&#039;&#039;.&lt;br /&gt;
 -n&lt;br /&gt;
 --no-name        Does not allow &#039;&#039;gzip&#039;&#039; and &#039;&#039;gunzip&#039;&#039; to preserve the original modification and access time for fiels.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite          Supresses all warning messages.&lt;br /&gt;
 -r&lt;br /&gt;
 --recursive      Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -S .suffix &lt;br /&gt;
 --suffix&lt;br /&gt;
 .suffix          Specifies a file suffix other than .gz.&lt;br /&gt;
 -t&lt;br /&gt;
 --test           Performs a test decompression so the user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose        Displays verbose output(compression ratio and filenames).&lt;br /&gt;
&lt;br /&gt;
===Bzip2===&lt;br /&gt;
&lt;br /&gt;
*Uses Burrows-Wheeler Block Sorting Huffman Coding compression algorithm.&lt;br /&gt;
*Cannot be used to compress a directory full of files.&lt;br /&gt;
*Compression ratio is 50 to 75 percent.&lt;br /&gt;
*Symbolic links are only compressed if the -f option is used.&lt;br /&gt;
*Compressed files are renamed with .bz2 filename extension.&lt;br /&gt;
*to decompress files, use the &#039;&#039;bunzip2&#039;&#039; command followed by the filename to decompress.&lt;br /&gt;
&lt;br /&gt;
====Useful commands include:====&lt;br /&gt;
 &#039;&#039;bzip2&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzcat&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzmore&#039;&#039;&lt;br /&gt;
 &#039;&#039;bzless&#039;&#039;&lt;br /&gt;
 &#039;&#039;bunzip2&#039;&#039;&lt;br /&gt;
 &lt;br /&gt;
Common options used with the bzip2 utility&lt;br /&gt;
 -#           Specifies the block size used during compression; -1 = block size of 100K, -9 = block size of 900K.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout     Displays the contents of the compressed file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress Decompresses the files specified, same as &#039;&#039;bunzip2&#039;&#039; command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force      Compresses symbolic links, or overwrites any existing files without prompting the user.&lt;br /&gt;
 -k&lt;br /&gt;
 --keep       Keeps the original file during compression; a new file is created with the extension .bz2.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite      Suppresses all warning messages.&lt;br /&gt;
 -s&lt;br /&gt;
 -small       Minimizes memory usage during compression.&lt;br /&gt;
 -t&lt;br /&gt;
 --test       Performs a test decompression so a user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose    Displays verbose output(compression ratio).&lt;br /&gt;
&lt;br /&gt;
==System Backup==&lt;br /&gt;
&lt;br /&gt;
A &#039;&#039;&#039;system backup&#039;&#039;&#039; is the process of creating backup copies of files and directories regularly and storing them at an alternate location. These copies can be distributed to other computers, or use them to restore files lost as a result of a system failure. The backup copies of files and directories are called &#039;&#039;&#039;archives&#039;&#039;&#039;.&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5559</id>
		<title>Chapter 11 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_11_Study_Guide&amp;diff=5559"/>
		<updated>2012-04-18T00:42:05Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Compression, System Backup, and Software Installation&amp;#039;&amp;#039;&amp;#039;  ==Compression==  Compression is the process in which files are reduced in size by a compression algorithm. The standa...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Compression, System Backup, and Software Installation&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Compression==&lt;br /&gt;
&lt;br /&gt;
Compression is the process in which files are reduced in size by a compression algorithm. The standard set of instructions used to compress a file is the compression algorithm. To decompress a file, you run compression algorithm in reverse. Compression ratios are known as the different rates of compression, which vary among the different compression algorithms. The compression utilities discussed in this chapter are:&lt;br /&gt;
&lt;br /&gt;
*Compress&lt;br /&gt;
*Gzip&lt;br /&gt;
*Bzip2&lt;br /&gt;
&lt;br /&gt;
===Compress===&lt;br /&gt;
&lt;br /&gt;
*Uses Adaptive Lempel-Ziv coding(LWZ) as its compression algorithm.&lt;br /&gt;
*Average compression ratio of 40 to 50 percent.&lt;br /&gt;
*Compressed files are renamed with a .Z filename extension to indicate that it is compressed.&lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
&lt;br /&gt;
Useful commands include:&lt;br /&gt;
 compress&lt;br /&gt;
 uncompress&lt;br /&gt;
 zcat&lt;br /&gt;
 zmore&lt;br /&gt;
 zless&lt;br /&gt;
&lt;br /&gt;
Common options used with the compress utility&lt;br /&gt;
 -c     Used with uncompress, it displays the contents of the compressed file to SO&lt;br /&gt;
 -f     Used with compress, used to compress symbolic links. Used with uncompress, overwrites existing files without prompting user.&lt;br /&gt;
 -r     Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -v     Displays verbose output during compression and decompression.&lt;br /&gt;
&lt;br /&gt;
===Gzip===&lt;br /&gt;
&lt;br /&gt;
*GNU zip(gzip).&lt;br /&gt;
*Uses Limpel-Ziv(LZ77) compression algorithm.&lt;br /&gt;
*Average compression ratio is 60 to 70 percent. &lt;br /&gt;
*Symbolic links are no compressed unless the -f option is given.&lt;br /&gt;
*Compressed files use the .gz filename extension.&lt;br /&gt;
*Ability to control the compression ratio using numeric values 1-9. 1 gives you faster compression time and yields lower ratio, 9 gives you slowest compression time and yields higher ratio.&lt;br /&gt;
*Default compression number is 6.&lt;br /&gt;
&lt;br /&gt;
Useful commands include:&lt;br /&gt;
 gzip&lt;br /&gt;
 gunzip&lt;br /&gt;
 &lt;br /&gt;
Common options used with the gzip utility&lt;br /&gt;
 -#               Specifies how thorough the compression will be. # can be any numeric value from 1 to 9. If no value, Default is 6.&lt;br /&gt;
 --best           Results in higher compression ratio; same as the -9 option.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout&lt;br /&gt;
 -to-stdout       Displays the contents of the compress file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress&lt;br /&gt;
 --uncompress     Decompresses the files specified when used with the gzip command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force          Compresses symbolic links, or overwrites any existing files without prompting user.&lt;br /&gt;
 --fast           Results in a lower compression ratio; same as the -1 option.&lt;br /&gt;
 -h&lt;br /&gt;
 --help           Displays the syntax and available options for the gzip and gunzip commands.&lt;br /&gt;
 -l&lt;br /&gt;
 --list           Lists the compression ratio for files that have been compressed with gzip.&lt;br /&gt;
 -n&lt;br /&gt;
 --no-name        Does not allow gzip and gunzip to preserve the original modification and access time for fiels.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite          Supresses all warning messages.&lt;br /&gt;
 -r&lt;br /&gt;
 --recursive      Specifies to compress or decompress all files recursively within a directory.&lt;br /&gt;
 -S .suffix &lt;br /&gt;
 --suffix&lt;br /&gt;
 .suffix          Specifies a file suffix other than .gz.&lt;br /&gt;
 -t&lt;br /&gt;
 --test           Performs a test decompression so the user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose        Displays verbose output(compression ratio and filenames).&lt;br /&gt;
&lt;br /&gt;
===Bzip2===&lt;br /&gt;
&lt;br /&gt;
*Uses Burrows-Wheeler Block Sorting Huffman Coding compression algorithm.&lt;br /&gt;
*Cannot be used to compress a directory full of files.&lt;br /&gt;
*Compression ratio is 50 to 75 percent.&lt;br /&gt;
*Symbolic links are only compressed if the -f option is used.&lt;br /&gt;
*Compressed files are renamed with .bz2 filename extension.&lt;br /&gt;
*to decompress files, use the bunzip2 command followed by the filename to decompress.&lt;br /&gt;
&lt;br /&gt;
Useful commands include:&lt;br /&gt;
 bzip2&lt;br /&gt;
 bzcat&lt;br /&gt;
 bzmore&lt;br /&gt;
 bzless&lt;br /&gt;
 bunzip2&lt;br /&gt;
 &lt;br /&gt;
Common options used with the bzip2 utility&lt;br /&gt;
 -#           Specifies the block size used during compression; -1 = block size of 100K, -9 = block size of 900K.&lt;br /&gt;
 -c&lt;br /&gt;
 --stdout     Displays the contents of the compressed file to SO.&lt;br /&gt;
 -d&lt;br /&gt;
 --decompress Decompresses the files specified, same as bunzip2 command.&lt;br /&gt;
 -f&lt;br /&gt;
 --force      Compresses symbolic links, or overwrites any existing files without prompting the user.&lt;br /&gt;
 -k&lt;br /&gt;
 --keep       Keeps the original file during compression; a new file is created with the extension .bz2.&lt;br /&gt;
 -q&lt;br /&gt;
 --quite      Suppresses all warning messages.&lt;br /&gt;
 -s&lt;br /&gt;
 -small       Minimizes memory usage during compression.&lt;br /&gt;
 -t&lt;br /&gt;
 --test       Performs a test decompression so a user can view any error messages before decompression.&lt;br /&gt;
 -v&lt;br /&gt;
 --verbose    Displays verbose output(compression ratio).&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5558</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5558"/>
		<updated>2012-04-17T23:48:11Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* Chapter Study Guides */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
=Current Course Materials=&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [https://docs.google.com/a/ihcnt.net/spreadsheet/viewform?formkey=dE5lWno3NEQybjdLOW52OW5aNWpfdnc6MQ First Day Sign In Form]&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Labs|Lab List]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Chapter Groups|Spring 2012 Chapter Groups]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Study Guides ==&lt;br /&gt;
Put a link to the study guide you create for your chapter here. &amp;lt;br&amp;gt;&lt;br /&gt;
* [[Chapter 2 Study Guide]]&lt;br /&gt;
* [[Chapter 3 Study Guide]]&lt;br /&gt;
* [[Chapter 4 Study Guide]]&lt;br /&gt;
* [[Chapter 5 Study Guide]]&lt;br /&gt;
* [[Chapter 6 Study Guide]]&lt;br /&gt;
* [[Chapter 7 Study Guide]]&lt;br /&gt;
* [[Chapter 8 Study Guide]]&lt;br /&gt;
* [[Chapter 9 Study Guide]]&lt;br /&gt;
* [[Chapter 10 Study Guide]]&lt;br /&gt;
* [[Chapter 11 Study Guide]]&lt;br /&gt;
* [[Chapter 12 Study Guide]]&lt;br /&gt;
* [[Chapter 13 Study Guide]]&lt;br /&gt;
* [[Chapter 14 Study Guide]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
* [[Editing Moodle Questions]]&lt;br /&gt;
&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
&lt;br /&gt;
==== Major Linux Distributions ====&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
*** Old versions of Fedora are difficult to find on the site the version that the book uses is [http://mirror.rit.edu/fedora/linux/releases/13/Fedora/i386/iso/Fedora-13-i386-DVD.iso Fedora Core 13]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
&lt;br /&gt;
=== General Help ===&lt;br /&gt;
==== Online Linux Tutuorials ====&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;br /&gt;
* [http://lartc.org Linux Advanced Routing &amp;amp; Traffic Control (Advanced Networking)]&lt;br /&gt;
&lt;br /&gt;
=== Command Guides ===&lt;br /&gt;
* [http://vic.gedris.org/Manual-ShellIntro/1.2/ShellIntro.pdf Inroduction to basic BASH shell commands]&lt;br /&gt;
* [http://www.digilife.be/quickreferences/QRC/The%20One%20Page%20Linux%20Manual.pdf The One Page Linux Manual]&lt;br /&gt;
&lt;br /&gt;
=== Specific Topic Help ===&lt;br /&gt;
==== GRUB2 ====&lt;br /&gt;
* [https://help.ubuntu.com/community/Grub2 Ubuntu Community Documentation - GRUB2]&lt;br /&gt;
* [http://www.dedoimedo.com/computers/grub-2.html GRUB2 Bootloader Full Tutorial]&lt;br /&gt;
* [http://ubuntuforums.org/showthread.php?t=1195275 The GRUB2 Guide]&lt;br /&gt;
&lt;br /&gt;
==== Runlevels ====&lt;br /&gt;
* [http://www.ibm.com/developerworks/linux/library/l-lpic1-v3-101-3/?ca=drs- IBM Learn Linux, 101: Runlevels, shutdown, and reboot]&lt;br /&gt;
* [http://www.linux.com/news/enterprise/systems-management/8116-an-introduction-to-services-runlevels-and-rcd-scripts An  introduction to services, runlevels, and rc.d scripts]&lt;br /&gt;
&lt;br /&gt;
==== Partitioning, Formatting and Mounting====&lt;br /&gt;
* [http://tldp.org/HOWTO/Partition/ Linux Partition HOWTO]&lt;br /&gt;
* [http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/Introduction_To_System_Administration/s2-storage-fs-mounting.html RedHat Documentation Mount Points]&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Installation_Guide/ch-partitions-x86.html Fedora Documentation: An Introduction to Disk Partitions]&lt;br /&gt;
&lt;br /&gt;
==== SSH ====&lt;br /&gt;
* [http://macnugget.org/projects/publickeys/ David McNett: using ssh public key authentication]&lt;br /&gt;
* [https://help.ubuntu.com/community/SSH/OpenSSH/Keys Ubuntu SSH Keys Documentation]&lt;br /&gt;
* [http://www.linuxtutorialblog.com/post/ssh-and-scp-howto-tips-tricks Linux Tutorial Blog: SSH and SCP: Howto, tips &amp;amp; tricks]&lt;br /&gt;
&lt;br /&gt;
==== Network Configuration ====&lt;br /&gt;
* [http://www.debian-administration.org/articles/254 Debian-style Network Configuration] (Ubuntu Server uses the same style)&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Deployment_Guide/s1-networkscripts-interfaces.html Fedora Nekwork Interface Configuration Files] &lt;br /&gt;
&lt;br /&gt;
==== Regular Expressions, Grep and SED ====&lt;br /&gt;
* [http://www.zytrax.com/tech/web/regex.htm Regular Expressions - A Simple User Guide]&lt;br /&gt;
* [http://linuxreviews.org/beginner/tao_of_regular_expressions Tao of Regular Expressions]&lt;br /&gt;
&lt;br /&gt;
=Archived Course Materials=&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2311 SU11 Labs|Summer 2011 Lab List]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Project Notes ==&lt;br /&gt;
[[CNT-2311-Chapter 2 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 3 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 4 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 5 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 7 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 8 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 9 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 10 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
[http://wiki.ihcnt.net/w/Chapter_21_%26_24 CNT-2311-Chapter 21 &amp;amp; 24 Notes]&#039;&#039;&#039;&lt;br /&gt;
* [[Linux SSH and Samba Notes]]&lt;br /&gt;
* [[Linux Job Management Notes]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux command guide]]&lt;br /&gt;
* [[Windows File Sharing and Printer Sharing with SAMBA]]&lt;br /&gt;
* [[How to Setup NAT]]&lt;br /&gt;
* [[Linux-command-list]]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_2_Study_Guide&amp;diff=5089</id>
		<title>Chapter 2 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_2_Study_Guide&amp;diff=5089"/>
		<updated>2012-01-27T17:40:59Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; == &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*Here is a list of various shutdown commands which can be found on page 73 of the text&lt;br /&gt;
[[File:Table_2-10.png]]&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
All info compiled, edited and coded by : Rob Klaers, Clay Wilson, Michael Garin, &amp;amp; Todd Bailly &lt;br /&gt;
 &#039;&#039;&#039;NOTE&#039;&#039;&#039; : &#039;&#039;all page numbers reference the Linux+ Guide to Linux Certification 3rd Ed. by Jason W. Eckert ISBN 978-1-4188-3721-1&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_2_Study_Guide&amp;diff=5088</id>
		<title>Chapter 2 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_2_Study_Guide&amp;diff=5088"/>
		<updated>2012-01-27T17:39:11Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Chapter 2 Linux Installation and Usage&amp;#039;&amp;#039;&amp;#039; == ::^	Preparation and installation of Fedora Linux using good practices. ::^	Outline the structure of Linux interface. ::^	Enter ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*Here is a list of various shutdown commands which can be found on page 73 of the text&lt;br /&gt;
[[File:Table_2-10.png]]&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== All info compiled, edited and coded by : Rob Klaers, Clay Wilson, Michael Garin, &amp;amp; Todd Bailly ===&lt;br /&gt;
 &#039;&#039;&#039;NOTE&#039;&#039;&#039; : &#039;&#039;all page numbers reference the Linux+ Guide to Linux Certification 3rd Ed. by Jason W. Eckert ISBN 978-1-4188-3721-1&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5087</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5087"/>
		<updated>2012-01-27T17:38:22Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* Chapter Study Guides */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
=Current Course Materials=&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [https://docs.google.com/a/ihcnt.net/spreadsheet/viewform?formkey=dE5lWno3NEQybjdLOW52OW5aNWpfdnc6MQ First Day Sign In Form]&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Labs|Lab List]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Study Guides ==&lt;br /&gt;
Put a link to the study guide you create for your chapter here. &amp;lt;br&amp;gt;&lt;br /&gt;
[[Chapter 2 Study Guide]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
* [[Editing Moodle Questions]]&lt;br /&gt;
&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
&lt;br /&gt;
==== Major Linux Distributions ====&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
*** Old versions of Fedora are difficult to find on the site the version that the book uses is [http://mirror.rit.edu/fedora/linux/releases/13/Fedora/i386/iso/Fedora-13-i386-DVD.iso Fedora Core 13]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
&lt;br /&gt;
=== General Help ===&lt;br /&gt;
==== Online Linux Tutuorials ====&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;br /&gt;
* [http://lartc.org Linux Advanced Routing &amp;amp; Traffic Control (Advanced Networking)]&lt;br /&gt;
&lt;br /&gt;
=== Command Guides ===&lt;br /&gt;
* [http://vic.gedris.org/Manual-ShellIntro/1.2/ShellIntro.pdf Inroduction to basic BASH shell commands]&lt;br /&gt;
* [http://www.digilife.be/quickreferences/QRC/The%20One%20Page%20Linux%20Manual.pdf The One Page Linux Manual]&lt;br /&gt;
&lt;br /&gt;
=== Specific Topic Help ===&lt;br /&gt;
==== GRUB2 ====&lt;br /&gt;
* [https://help.ubuntu.com/community/Grub2 Ubuntu Community Documentation - GRUB2]&lt;br /&gt;
* [http://www.dedoimedo.com/computers/grub-2.html GRUB2 Bootloader Full Tutorial]&lt;br /&gt;
* [http://ubuntuforums.org/showthread.php?t=1195275 The GRUB2 Guide]&lt;br /&gt;
&lt;br /&gt;
==== Runlevels ====&lt;br /&gt;
* [http://www.ibm.com/developerworks/linux/library/l-lpic1-v3-101-3/?ca=drs- IBM Learn Linux, 101: Runlevels, shutdown, and reboot]&lt;br /&gt;
* [http://www.linux.com/news/enterprise/systems-management/8116-an-introduction-to-services-runlevels-and-rcd-scripts An  introduction to services, runlevels, and rc.d scripts]&lt;br /&gt;
&lt;br /&gt;
==== Partitioning, Formatting and Mounting====&lt;br /&gt;
* [http://tldp.org/HOWTO/Partition/ Linux Partition HOWTO]&lt;br /&gt;
* [http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/Introduction_To_System_Administration/s2-storage-fs-mounting.html RedHat Documentation Mount Points]&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Installation_Guide/ch-partitions-x86.html Fedora Documentation: An Introduction to Disk Partitions]&lt;br /&gt;
&lt;br /&gt;
==== SSH ====&lt;br /&gt;
* [http://macnugget.org/projects/publickeys/ David McNett: using ssh public key authentication]&lt;br /&gt;
* [https://help.ubuntu.com/community/SSH/OpenSSH/Keys Ubuntu SSH Keys Documentation]&lt;br /&gt;
* [http://www.linuxtutorialblog.com/post/ssh-and-scp-howto-tips-tricks Linux Tutorial Blog: SSH and SCP: Howto, tips &amp;amp; tricks]&lt;br /&gt;
&lt;br /&gt;
==== Network Configuration ====&lt;br /&gt;
* [http://www.debian-administration.org/articles/254 Debian-style Network Configuration] (Ubuntu Server uses the same style)&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Deployment_Guide/s1-networkscripts-interfaces.html Fedora Nekwork Interface Configuration Files] &lt;br /&gt;
&lt;br /&gt;
==== Regular Expressions, Grep and SED ====&lt;br /&gt;
* [http://www.zytrax.com/tech/web/regex.htm Regular Expressions - A Simple User Guide]&lt;br /&gt;
* [http://linuxreviews.org/beginner/tao_of_regular_expressions Tao of Regular Expressions]&lt;br /&gt;
&lt;br /&gt;
=Archived Course Materials=&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2311 SU11 Labs|Summer 2011 Lab List]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Project Notes ==&lt;br /&gt;
[[CNT-2311-Chapter 2 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 3 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 4 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 5 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 7 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 8 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 9 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 10 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
[http://wiki.ihcnt.net/w/Chapter_21_%26_24 CNT-2311-Chapter 21 &amp;amp; 24 Notes]&#039;&#039;&#039;&lt;br /&gt;
* [[Linux SSH and Samba Notes]]&lt;br /&gt;
* [[Linux Job Management Notes]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux command guide]]&lt;br /&gt;
* [[Windows File Sharing and Printer Sharing with SAMBA]]&lt;br /&gt;
* [[How to Setup NAT]]&lt;br /&gt;
* [[Linux-command-list]]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5086</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5086"/>
		<updated>2012-01-27T17:37:56Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* Chapter Study Guides */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
=Current Course Materials=&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [https://docs.google.com/a/ihcnt.net/spreadsheet/viewform?formkey=dE5lWno3NEQybjdLOW52OW5aNWpfdnc6MQ First Day Sign In Form]&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Labs|Lab List]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Study Guides ==&lt;br /&gt;
Put a link to the study guide you create for your chapter here.&lt;br /&gt;
[[Chapter 2 Study Guide]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
* [[Editing Moodle Questions]]&lt;br /&gt;
&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
&lt;br /&gt;
==== Major Linux Distributions ====&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
*** Old versions of Fedora are difficult to find on the site the version that the book uses is [http://mirror.rit.edu/fedora/linux/releases/13/Fedora/i386/iso/Fedora-13-i386-DVD.iso Fedora Core 13]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
&lt;br /&gt;
=== General Help ===&lt;br /&gt;
==== Online Linux Tutuorials ====&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;br /&gt;
* [http://lartc.org Linux Advanced Routing &amp;amp; Traffic Control (Advanced Networking)]&lt;br /&gt;
&lt;br /&gt;
=== Command Guides ===&lt;br /&gt;
* [http://vic.gedris.org/Manual-ShellIntro/1.2/ShellIntro.pdf Inroduction to basic BASH shell commands]&lt;br /&gt;
* [http://www.digilife.be/quickreferences/QRC/The%20One%20Page%20Linux%20Manual.pdf The One Page Linux Manual]&lt;br /&gt;
&lt;br /&gt;
=== Specific Topic Help ===&lt;br /&gt;
==== GRUB2 ====&lt;br /&gt;
* [https://help.ubuntu.com/community/Grub2 Ubuntu Community Documentation - GRUB2]&lt;br /&gt;
* [http://www.dedoimedo.com/computers/grub-2.html GRUB2 Bootloader Full Tutorial]&lt;br /&gt;
* [http://ubuntuforums.org/showthread.php?t=1195275 The GRUB2 Guide]&lt;br /&gt;
&lt;br /&gt;
==== Runlevels ====&lt;br /&gt;
* [http://www.ibm.com/developerworks/linux/library/l-lpic1-v3-101-3/?ca=drs- IBM Learn Linux, 101: Runlevels, shutdown, and reboot]&lt;br /&gt;
* [http://www.linux.com/news/enterprise/systems-management/8116-an-introduction-to-services-runlevels-and-rcd-scripts An  introduction to services, runlevels, and rc.d scripts]&lt;br /&gt;
&lt;br /&gt;
==== Partitioning, Formatting and Mounting====&lt;br /&gt;
* [http://tldp.org/HOWTO/Partition/ Linux Partition HOWTO]&lt;br /&gt;
* [http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/Introduction_To_System_Administration/s2-storage-fs-mounting.html RedHat Documentation Mount Points]&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Installation_Guide/ch-partitions-x86.html Fedora Documentation: An Introduction to Disk Partitions]&lt;br /&gt;
&lt;br /&gt;
==== SSH ====&lt;br /&gt;
* [http://macnugget.org/projects/publickeys/ David McNett: using ssh public key authentication]&lt;br /&gt;
* [https://help.ubuntu.com/community/SSH/OpenSSH/Keys Ubuntu SSH Keys Documentation]&lt;br /&gt;
* [http://www.linuxtutorialblog.com/post/ssh-and-scp-howto-tips-tricks Linux Tutorial Blog: SSH and SCP: Howto, tips &amp;amp; tricks]&lt;br /&gt;
&lt;br /&gt;
==== Network Configuration ====&lt;br /&gt;
* [http://www.debian-administration.org/articles/254 Debian-style Network Configuration] (Ubuntu Server uses the same style)&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Deployment_Guide/s1-networkscripts-interfaces.html Fedora Nekwork Interface Configuration Files] &lt;br /&gt;
&lt;br /&gt;
==== Regular Expressions, Grep and SED ====&lt;br /&gt;
* [http://www.zytrax.com/tech/web/regex.htm Regular Expressions - A Simple User Guide]&lt;br /&gt;
* [http://linuxreviews.org/beginner/tao_of_regular_expressions Tao of Regular Expressions]&lt;br /&gt;
&lt;br /&gt;
=Archived Course Materials=&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2311 SU11 Labs|Summer 2011 Lab List]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Project Notes ==&lt;br /&gt;
[[CNT-2311-Chapter 2 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 3 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 4 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 5 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 7 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 8 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 9 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 10 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
[http://wiki.ihcnt.net/w/Chapter_21_%26_24 CNT-2311-Chapter 21 &amp;amp; 24 Notes]&#039;&#039;&#039;&lt;br /&gt;
* [[Linux SSH and Samba Notes]]&lt;br /&gt;
* [[Linux Job Management Notes]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux command guide]]&lt;br /&gt;
* [[Windows File Sharing and Printer Sharing with SAMBA]]&lt;br /&gt;
* [[How to Setup NAT]]&lt;br /&gt;
* [[Linux-command-list]]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5085</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5085"/>
		<updated>2012-01-27T17:31:54Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*Here is a list of various shutdown commands which can be found on page 73 of the text&lt;br /&gt;
[[File:Table_2-10.png]]&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== All info compiled, edited and coded by : Rob Klaers, Clay Wilson, Michael Garin, &amp;amp; Todd Bailly ===&lt;br /&gt;
 &#039;&#039;&#039;NOTE&#039;&#039;&#039; : &#039;&#039;all page numbers reference the Linux+ Guide to Linux Certification 3rd Ed. by Jason W. Eckert ISBN 978-1-4188-3721-1&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Table_2-10.png&amp;diff=5084</id>
		<title>File:Table 2-10.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Table_2-10.png&amp;diff=5084"/>
		<updated>2012-01-27T17:28:11Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Over_IPv4_Tunnel&amp;diff=4793</id>
		<title>IPv6 Over IPv4 Tunnel</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Over_IPv4_Tunnel&amp;diff=4793"/>
		<updated>2011-11-28T00:42:25Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Written and Illistrated by Clay Wilson &amp;amp; Curt Hermanson&amp;#039;&amp;#039;&amp;#039;  ===Before You Start===  IPv6 is the up-and-comming, hotshot of the virtual world we have become so fond of, the int...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Written and Illistrated by Clay Wilson &amp;amp; Curt Hermanson&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Before You Start===&lt;br /&gt;
&lt;br /&gt;
IPv6 is the up-and-comming, hotshot of the virtual world we have become so fond of, the internet. Destined to rule networks of all shapes and sizes, the &lt;br /&gt;
new internet protocol will surely do its part in adding address space for people all across the world. Along with the other benefits of the change to &lt;br /&gt;
IPv6, there are also some unavoidable difficulties (see [[Intro to IPv6]] for a detailed introduction to the new protocol). When websites, and comanies, and &lt;br /&gt;
end users alike begin to switch from using IPv4 to IPv6, difficulties may arise. One sollution is to use dual stack technology which allows devices to run &lt;br /&gt;
both IPv4 and IPv6 cooperatively. Another approach is using a technique called tunnelling. Tunneling is a way to use one network protocol to encapsulate a &lt;br /&gt;
different payload protocol, such as IPv6 (acting as the delivery protocol), and IPv4 (the payload protocol). In this example, IPv6 is going to be &lt;br /&gt;
&#039;&#039;tunneled&#039;&#039; over a network (the internet) that is using IPv4. Given the name IPv6 over IPv4, or simply, 6over4.&lt;br /&gt;
&lt;br /&gt;
The following is a detailed step-by-step guide written for home users who are interested in establishing a secure 6over4 tunnel using the&lt;br /&gt;
http://www.tunnelbroker.net as the tunnel server provider. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===What You Need===&lt;br /&gt;
&lt;br /&gt;
Before you begin, be sure your system is IPv6 ready, and you are comfortable with the task at hand.&lt;br /&gt;
&lt;br /&gt;
* Computer with accessible connection to the internet.&lt;br /&gt;
* Windows Vista or newer OS.&lt;br /&gt;
* Administrator privilages to command prompt.&lt;br /&gt;
* Access to your home router configuration page.&lt;br /&gt;
* Create an account on tunnelbroker.net &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Establishing an IPv6 Tunnel Over an IPv4 Internetwork===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Join the Hurricane Electric online community&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* In your web browser enter the url: http://www.tunnelbroker.net&lt;br /&gt;
* Create a username and password, and finish registration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Creating a tunnel&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Under User Functions, click Create Regular Tunnel. &lt;br /&gt;
* The Create New Tunnel page loads. From here tunnel broker asks you for your IPv4 endpoint (your side). Notice below it shows the IP address you &lt;br /&gt;
are viewing from, &#039;&#039;&#039;You are viewing from: x.x.x.x&#039;&#039;&#039;. Choose the recommended tunneling server. Input your local IP address in the text box &lt;br /&gt;
asking for your IPv4 endpoint. You can find your local IP by visiting the domain, http://www.whatsmyip.org.&lt;br /&gt;
[[File:Create_tunnel.png]]&lt;br /&gt;
* If you recieve an error message that says IP is not ICMP pingable, you then have to go into your router configuration page (usually 192.168.0.1 or &lt;br /&gt;
a similar address), under WAN Connection Settings, and enable respond to pings on internet port. See the figure for additional help.&lt;br /&gt;
[[File:Not_pingable.png]]&lt;br /&gt;
[[File:WAN.png]] &lt;br /&gt;
* Once you have allowed pings to respond on the internet port, you should have no trouble finishing the tunnel creation process. However, problems&lt;br /&gt;
may arise, and if you find yourself with an unexpected issue, troubleshoot as necessary. Use the tunnelbroker forum section, and search engines such &lt;br /&gt;
as google to find any helpful information when troubleshooting your tunnel.&lt;br /&gt;
[[File:Tunnel_created.png]]&lt;br /&gt;
&lt;br /&gt;
* Now that your tunnel is successfully created, you should be at the Tunnel Details page. This page shows a variety of information including: Tunnel ID, &lt;br /&gt;
IPv6 Tunnel Endpoints, Available DNS Resolvers, Routed IPv6 prefixes, etc.&lt;br /&gt;
[[File:Tunnel_details.png]]&lt;br /&gt;
* Click the &#039;&#039;&#039;Example Configurations&#039;&#039;&#039; tab near the top of the page. This page displays the commands appropriate to your operating system that are&lt;br /&gt;
vital to the completion of configuring your 6over4 tunnel. &lt;br /&gt;
* Select your operating system from the pull down menu. NOTICE: This guide is aimed at configuring a tunnel using Windows operating system no older &lt;br /&gt;
than Windows Vista®&lt;br /&gt;
[[File:Example_config_IOS.png]]&lt;br /&gt;
* Now you should have four commands in the &#039;&#039;&#039;Example Configurations&#039;&#039;&#039; box. &lt;br /&gt;
[[File:Example_config_1.png]]&lt;br /&gt;
* Go to Start &amp;gt; type &#039;cmd&#039; &amp;gt; push enter &amp;gt; right click on &#039;cmd&#039; listed under programs, and &#039;&#039;&#039;Run as administrator&#039;&#039;&#039;.&lt;br /&gt;
* Copy and paste the first line under the &#039;&#039;&#039;Example Configurations&#039;&#039;&#039; box into your cmd.&lt;br /&gt;
[[File:cmd_1.png]]&lt;br /&gt;
* Before you copy and paste the second line into your cmd, be sure to change the local IP address written in the provided command. Here&#039;s an &lt;br /&gt;
example of the command you should enter in your cmd. netsh interface ipv6 add v6v4tunnel ipv6tunnel &amp;lt;private ip address&amp;gt; 216.218.224.42&lt;br /&gt;
[[File:cmd_2.png]]&lt;br /&gt;
* Enter the next two lines seperately into your command prompt just as they are written. The following two commands will be an add address, &lt;br /&gt;
and add route command.&lt;br /&gt;
[[File:cmd_4.png]]&lt;br /&gt;
&lt;br /&gt;
Once you have finished adding the four commands to your cmd, your IPv6 over IPv4 tunnel should be complete. If you experience any error messages&lt;br /&gt;
troubleshoot as necessary. Be sure to copy and paste one command at a time, pasting multiple lines will not get you the desired results. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Testing your Tunnel===&lt;br /&gt;
&lt;br /&gt;
Now that you have established a 6over4 tunnel to the tunnelbroker tunneling server, you are ready to test your tunnel. A series of tests will verify&lt;br /&gt;
whether or not your tunnel has been configured and established successfully.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Enter your cmd, and issue the &#039;&#039;&#039;ipconfig /all&#039;&#039;&#039; command.&lt;br /&gt;
* You should see an adapter named &#039;&#039;&#039;Tunnel Adapter IP6tunnel&#039;&#039;&#039; and be able to see the different IPv6 addresses associated with that adapter.&lt;br /&gt;
[[File:Ipv6_tunnel.png]]&lt;br /&gt;
&lt;br /&gt;
* Issue a ping to the domain ipv6.google.com&lt;br /&gt;
* Pinging an ipv6 address such as the google one listed above will verify that you are able to communicate successfully with an ipv6 server.&lt;br /&gt;
[[File:Ipv6_ping.png]]&lt;br /&gt;
&lt;br /&gt;
* The last test you can complete uses your web browser. Simply type in http://www.ipv6test.google.com. Much like test number 2, this varifies that &lt;br /&gt;
you are able to communicate with ipv6 server.&lt;br /&gt;
[[File:Ipv6google.png]]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Ipv6google.png&amp;diff=4792</id>
		<title>File:Ipv6google.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Ipv6google.png&amp;diff=4792"/>
		<updated>2011-11-27T23:30:42Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Ipv6_tunnel.png&amp;diff=4791</id>
		<title>File:Ipv6 tunnel.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Ipv6_tunnel.png&amp;diff=4791"/>
		<updated>2011-11-27T23:28:53Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Ipv6_ping.png&amp;diff=4790</id>
		<title>File:Ipv6 ping.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Ipv6_ping.png&amp;diff=4790"/>
		<updated>2011-11-27T23:28:26Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Cmd_4.png&amp;diff=4789</id>
		<title>File:Cmd 4.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Cmd_4.png&amp;diff=4789"/>
		<updated>2011-11-27T23:25:50Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Cmd_2.png&amp;diff=4788</id>
		<title>File:Cmd 2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Cmd_2.png&amp;diff=4788"/>
		<updated>2011-11-27T23:25:34Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:.net.png&amp;diff=4787</id>
		<title>File:.net.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:.net.png&amp;diff=4787"/>
		<updated>2011-11-27T23:25:19Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Cmd_1.png&amp;diff=4786</id>
		<title>File:Cmd 1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Cmd_1.png&amp;diff=4786"/>
		<updated>2011-11-27T23:25:03Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Example_config_1.png&amp;diff=4785</id>
		<title>File:Example config 1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Example_config_1.png&amp;diff=4785"/>
		<updated>2011-11-27T23:24:47Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Example_config_IOS.png&amp;diff=4784</id>
		<title>File:Example config IOS.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Example_config_IOS.png&amp;diff=4784"/>
		<updated>2011-11-27T23:24:31Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Tunnel_details.png&amp;diff=4783</id>
		<title>File:Tunnel details.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Tunnel_details.png&amp;diff=4783"/>
		<updated>2011-11-27T23:24:11Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Tunnel_created.png&amp;diff=4782</id>
		<title>File:Tunnel created.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Tunnel_created.png&amp;diff=4782"/>
		<updated>2011-11-27T23:23:47Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:WAN.png&amp;diff=4781</id>
		<title>File:WAN.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:WAN.png&amp;diff=4781"/>
		<updated>2011-11-27T23:23:17Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Not_pingable.png&amp;diff=4780</id>
		<title>File:Not pingable.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Not_pingable.png&amp;diff=4780"/>
		<updated>2011-11-27T23:22:50Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Create_tunnel.png&amp;diff=4779</id>
		<title>File:Create tunnel.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Create_tunnel.png&amp;diff=4779"/>
		<updated>2011-11-27T23:21:17Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2540&amp;diff=4778</id>
		<title>Franske CNT-2540</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2540&amp;diff=4778"/>
		<updated>2011-11-27T19:15:40Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2540: Accessing the WAN classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2540 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2540 FA11 Schedule|Fall 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2540 Labs and Homework|Lab and Homework List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
*[[Frame relay multipoint lab]]&lt;br /&gt;
*[[How to configure SDM to secure a router]]&lt;br /&gt;
*[[ISDN WAN Connections]]&lt;br /&gt;
*[[IEEE 802.1x Port-Based Authentication]]&lt;br /&gt;
*[[Password Recovery and Device Reset Procedures]]&lt;br /&gt;
*[[How to Configure GRE VPN]]&lt;br /&gt;
*[[Wake On LAN]]&lt;br /&gt;
*[[Link Aggregation Lab]]&lt;br /&gt;
*[[IPv6 Over IPv4 Tunnel]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== Certification ==&lt;br /&gt;
* [[CCNA Voucher Information]]&lt;br /&gt;
== General WAN Information ==&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1915.html Cisco Guide to Troubleshooting Serial Line Problems]&lt;br /&gt;
== WAN Protocols ==&lt;br /&gt;
=== Frame Relay ===&lt;br /&gt;
* [http://www.cisco.com/en/US/tech/tk713/tk237/tsd_technology_support_protocol_home.html Cisco Frame Relay Technology Pages]&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/internetworking/design/guide/nd2009.html Cisco Frame Relay Internetwork Design Guide]&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1918.html Cisco Guide to Troubleshooting Frame Relay Connections]&lt;br /&gt;
* [http://www.cisco.com/en/US/tech/tk713/tk237/technologies_tech_note09186a008014f8a7.shtml Cisco Comprehensive Guide to Configuring and Troubleshooting Frame Relay with configuration examples]&lt;br /&gt;
&lt;br /&gt;
== Subnetting ==&lt;br /&gt;
* [http://www.learntosubnet.com LearnToSubnet.com] (Requires using Internet Explorer)&lt;br /&gt;
&lt;br /&gt;
== IPv6 ==&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-addrg_bsc_con.html Cisco IOS: Implementing IPv6 Addressing and Basic Connectivity]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Completed_Student_Projects&amp;diff=4777</id>
		<title>Franske Completed Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Completed_Student_Projects&amp;diff=4777"/>
		<updated>2011-11-27T19:12:48Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* CNT 2540 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==CNT 2540==&lt;br /&gt;
* [[Wake On LAN]] - Lue YANG&lt;br /&gt;
* [IPv6 Over IPv4 Tunnel] - Clay Wilson &amp;amp; Curtis Hermanson&lt;br /&gt;
&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Linux-command-list]] - Don Bliss&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add &amp;amp; Update [http://wiki.ihcnt.net/w/Intro_to_IPv6 Intro to IPv6] - Clay Wilson &amp;amp; Duc Doan&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4776</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=4776"/>
		<updated>2011-11-27T19:11:53Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* CNT 2540 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=FALL 2011=&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Routing Protocol Comparison Chart &amp;amp; Configuration Instructions - John Cocchiarella, Tyler Grey&lt;br /&gt;
* IPv6 Routing Protocol Configurations - David Favilla, Christopher Abel&lt;br /&gt;
* GPON Gigabit Passive Optical Networks (ITU-T G.948) - Jesse Thorpe&lt;br /&gt;
* Exam Question Formatting - Josh K.&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Enterprise Network Case Study and Diagramming - Christopher Moosbrugger&lt;br /&gt;
* Update CCNA 4 SDM Labs to CCP Labs - Billy &amp;amp; Matt&lt;br /&gt;
* Ethernet Link Aggregation - Monique&lt;br /&gt;
* IPv6 Over IPv4 Tunnel - Clay &amp;amp; Curt&lt;br /&gt;
&lt;br /&gt;
==CNT 2722==&lt;br /&gt;
&lt;br /&gt;
==CNT 2820==&lt;br /&gt;
* Pen Testing and ethics - Curt H. and Byron S.&lt;br /&gt;
&lt;br /&gt;
=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study - John Cocchiarella&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
==CNT 2530==&lt;br /&gt;
* De-tableize [[Franske CNT-2510 SP10 Schedule]] and add chapter topics&lt;br /&gt;
* Create detailed instructions for clearing the configurations (invluding VLANs) for the [[Switch Documentation]] and [[Router Documentation]] pages&lt;br /&gt;
&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Completed_Student_Projects&amp;diff=4775</id>
		<title>Franske Completed Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Completed_Student_Projects&amp;diff=4775"/>
		<updated>2011-11-27T19:02:24Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==CNT 2540==&lt;br /&gt;
* [[Wake On LAN]] - Lue YANG&lt;br /&gt;
* [[IPv6 Over IPv4 Tunnel]] - Clay Wilson &amp;amp; Curtis Hermanson&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Linux-command-list]] - Don Bliss&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add &amp;amp; Update [http://wiki.ihcnt.net/w/Intro_to_IPv6 Intro to IPv6] - Clay Wilson &amp;amp; Duc Doan&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4407</id>
		<title>Intro to IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4407"/>
		<updated>2011-05-03T02:47:25Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Added RIPng section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;By ABorgert CNT-2453-01 Summer Class&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This tutorial is aimed at developing a basic understanding of IPv6 for the new user. The reason IPv6 was created was because of an explosive increase in the number of devices requiring an IP address to communicate on a network and the depleting resources of IPv4 address space. Current estimates suggest that by the end of 2011 all of the left over addresses will be used up, meaning anyone not already connected to the Internet risks being left behind. Born out of necessity, IPv6 is a solution to this problem. Made up of a suite of protocols and standards that where developed by the Internet Engineering Task Force (IETF), not only does IPv6 increase address space; it also solves problems discovered with IPv4 that has become evident over the years. Deploying IPv6 on a global scale is vital to the Internet industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General IPv6===&lt;br /&gt;
&lt;br /&gt;
IPv6 addresses consist of eight blocks of 4 hexadecimal digits each.&lt;br /&gt;
Four hexadecimal digits are equivalent to 16 bits, so an IPv6 address has 8 x 16 = 128 bits.&lt;br /&gt;
&lt;br /&gt;
*An example of an IPv6 address looks like this:  2001:4CEA:8D8C:0000:0000:0000:00D2:7A4B&lt;br /&gt;
&lt;br /&gt;
From this example it is apparent to anyone that IPv6 addresses are more complex to remember than IPv4 addresses.&lt;br /&gt;
Therefore two rules have been developed to shorten addresses to something more manageable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Address Structure Rules&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
1. Any leading digit of Zero can be dropped from any group.&lt;br /&gt;
&lt;br /&gt;
* The example above will look like this:  2001:4CEA:8D8C:0:0:0:D2:7A4B&lt;br /&gt;
&lt;br /&gt;
2. Two or more groups of zeros can be replaced by two colons, But only once per address.&lt;br /&gt;
&lt;br /&gt;
* Now it looks like this: 2001:4CEA:8D8C::D2:7A4B&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===IPv4 vs IPv6===&lt;br /&gt;
&lt;br /&gt;
The most beneficial difference between IPv4 and IPv6 is the vast increase in numerical addresses. The original 4.3 billion addresses that IPv4 provides have neared [http://www.ipv6.net exhaustion] in early 2011 and are expected to be completely depleted before the start of 2012. Ipv6 provides 2*128 (approximately 340 undecillion or 3.4 × 10*38) IP addresses. Perhaps this will be a sufficient amount of addresses to last another few years…&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Differences&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IPv4 consists of four separate blocks of one octet, or 32 digits (bits) of binary values (0 or 1).&lt;br /&gt;
&lt;br /&gt;
* Represented in binary form IPv4 addresses look like this: 11000000.10111000.00000000.00000001&lt;br /&gt;
&lt;br /&gt;
* Represented in dotted decimal Ipv4 addresses look like this: 192.168.0.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As noted previously, IPv6 addressing is constructed of 128 digits (bits) of hexadecimal values (0-9 &amp;amp; A-F). Each hexadecimal represents four binary bits. Respectively, you can see how much larger IPv6 is just by looking at it in binary (128 bits compared to IPv4’s 32 bits).&lt;br /&gt;
&lt;br /&gt;
*IPv6 looks like this: 2001:4CEA:8D8C:0:0:0:D2:7A4B&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*IPv6 is not protected by a checksum.&lt;br /&gt;
&lt;br /&gt;
*IPSec was optional in IPv4, it is now required for IPv6.&lt;br /&gt;
&lt;br /&gt;
*IPv6 does not require manual configuration of addresses, or Dynamic Host Configuration Protocol (DHCP) to configure its address.&lt;br /&gt;
&lt;br /&gt;
*The mobile version of IPv4 uses Triangular routing (where the packet is transmitted through a proxy system before going to the actual network), whereas the mobile version of IPv6 does not do this so it can be as efficient as native IPv6.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modifications&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*There is a new address called Anycast address where it defines a node and the node can define where the packet goes. For example, a node can be used to make a secure connection for video conferencing.&lt;br /&gt;
&lt;br /&gt;
*There are some ipv4 headers that have been dropped or made optional to reduce the processing cost to send the packet and to save bandwidth to compensate for the increased addressing size.&lt;br /&gt;
&lt;br /&gt;
*Time-to-Live field has been remained to hop limit, which is discussed further in the ‘Ipv6 Packet Header’ section.&lt;br /&gt;
 &lt;br /&gt;
*Extensions to support authentication, data integrity, and (optional) data confidentiality are specified for IPv6.&lt;br /&gt;
&lt;br /&gt;
*Routers must now support a 1280 byte packet size without fragmenting the packet.&lt;br /&gt;
&lt;br /&gt;
*ICMPv6 Router Solicitation and Router Advertisement messages are used in place of ICMP Router Discovery to find the best default gateway. This is required for IPv6.&lt;br /&gt;
&lt;br /&gt;
*IPv6 features some new protocols such as: ICMPv6 and DHCPv6 to deal with routing and assigning IPv6 addresses, respectively.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Types of IPv6 addresses&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
There are three main types of IPv4 addresses: APIPA, Private, and Public. The same is true for IPv6, only they have different names:&lt;br /&gt;
&lt;br /&gt;
*Global Address (GA): This is the equivalent of IPv4’s (public address). These addresses start with a first block in the 2000-3FFF range.&lt;br /&gt;
&lt;br /&gt;
*Link-Local Address (LLA): This is the equivalent of the IPv4 (APIPA address). These addresses always start with &amp;quot;fe80&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*Unique Local Address (ULA): Also known as a Site-Local address, this is the equivalent of IPv4’s ‘private address’. Where IPv4 private addresses fall within three ranges, Unique Local Addresses always start with &amp;quot;FD&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
There are two more types of addresses that have more specific uses:&lt;br /&gt;
&lt;br /&gt;
*Multicast Address:  Allows communication between one host and many receivers. These packets are sent out to all the interfaces that are identified by that address. Multicast addresses always begin with &amp;quot;FF&amp;quot;.&lt;br /&gt;
      &lt;br /&gt;
*Special Addresses: There are two special addresses, one is called the Loopback Address and it looks like this, 0:0:0:0:0:0:0:1 (or ::1). The IPv6 loopback address is the same as the IPv4 address 127.0.0.1 and used for the same purpose, to identify a loopback interface. The other special address is called the Unspecified Address and it looks like this, 0:0:0:0:0:0:0:0 (or simply written ::). It is equivalent to the IPv4 address 0.0.0.0 and is also used for the same purpose; it is commonly used as the source address that packets use to confirm if a tentative address is unique.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Features Only Available in IPv6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Stateless Address Autoconfiguration - Lets hosts configure themselves automatically.&lt;br /&gt;
&lt;br /&gt;
*Multicast - Allows single packets to be sent to multiple destinations.&lt;br /&gt;
&lt;br /&gt;
*Mandatory Network Layer Security - Integrated Internet Protocol Security (IPsec).&lt;br /&gt;
&lt;br /&gt;
*Simpler Router Processing - Routing in IPv6 is almost identical to IPv4 routing under CIDR except that the addresses are 128- bit IPv6 addresses instead of 32-bit IPv4 addresses. With very straightforward extensions, IPv4&#039;s dynamic routing protocols (OSPF, RIP, IDRP, ISIS, etc.) can be used to route IPv6.&lt;br /&gt;
&lt;br /&gt;
*Mobility – This means that a mobile device is not constrained by location and has an ‘always on’ IP connectivity to its home agent via a bidirectional tunnel.  In other words, if there is a network that the mobile device can connect. Then it can communicate on its own home network with its own IP address, as if it was directly connected.&lt;br /&gt;
&lt;br /&gt;
*Extension Header Mechanism - The extension header mechanism makes it easy to &#039;extend&#039; the packet header to support future services for [http://en.wikipedia.org/wiki/Quality_of_service QoS], [http://en.wikipedia.org/wiki/IPsec IPsec], [http://en.wikipedia.org/wiki/Mobile_IP Mobile IP], etc. without a redesign of the basic protocol.  Extension headers do this by carrying options that are used for special packet treatment along its route or at its destination, routing, fragmenting, and for security using the IPsec framework.&lt;br /&gt;
&lt;br /&gt;
*Jumbo Payload Option header – Also known as a [http://en.wikipedia.org/wiki/Jumbogram Jumbogram], allows an IPv6 packet to carry a payload larger than the standard mode size of one byte less than 64 Kilobytes, or 65,535 (2*16 - 1) octets of payload. A jumbo payload can be almost 4GB, or 4,294,967,295 (2*32 - 1) octets of payload.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Packet Format&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The IPv6 packet has three main parts:&lt;br /&gt;
&lt;br /&gt;
*Fixed Header: The first 40 octets (320 bits) of an IPv6 data packet makes up the fixed header. The format of the fixed header is presented in the table above.&lt;br /&gt;
&lt;br /&gt;
*Extension Headers (Optional): The extension headers encode the optional Internet-layer information between the fixed header and the upper-layer protocol header in a packet. The headers form a chain using the Next Header fields.	&lt;br /&gt;
&lt;br /&gt;
*Payload (Optional): The payload can have a size of up to 64 KB in standard mode, or with the Hop-By-Hop Options extension header it can carry the larger &amp;quot;jumbo payload&amp;quot; option.&lt;br /&gt;
&lt;br /&gt;
The fixed and optional IPv6 extension headers are followed with the upper-layer payload and the data provided by the transport layer. The Next Header field of the last IPv6 header is what indicates the type of payload that is in this packet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Header.jpg|frame|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Packet Header&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Version (4 bits):   This Indicates the IP version.&lt;br /&gt;
&lt;br /&gt;
*Traffic Class (8 bits): The traffic class field defines the priority of the packet. There are two values held by the bits of this field. The 6 most-significant bits are used to classify packets. The two bits left are used for congestion control.&lt;br /&gt;
 &lt;br /&gt;
*Flow Label (20 bits): The flow label identifies all packets belonging to a specific Class of Service, or “flow”.  These packets can be Identified by routers and handle them all according to their class of service. &lt;br /&gt;
&lt;br /&gt;
*Payload Length (16 bits): The payload length field shows the size of the payload. The payload length includes the size of any extension headers.  The field length is set to zero whenever an extension header carries a Jumbo Payload option. &lt;br /&gt;
&lt;br /&gt;
*Next Header (8 bits): The next header field shows the Transport Layer Protocol that is used by the payload. When there are extension headers in the packet, this field shows which extension header will follow.&lt;br /&gt;
&lt;br /&gt;
*Hop Limit (8 bits): Similar to the &#039;Time-To-Live&#039; field in IPv4, the hop limit shows the maximum number of hops allowed. This value is decreased by one at every hop in the packets route. The packet is discarded when the counter reaches 0. &lt;br /&gt;
&lt;br /&gt;
*Source Address (128 bits): This identifies the IPv6 address of the source sending the packet. The source is also known as the ‘The Sending Node’.&lt;br /&gt;
&lt;br /&gt;
*Destination Address (128 bits): This identifies IPv6 address of the destination receiving the packet or ‘The Destination Node’.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Routing Information Protocol Next Generation (RIPng)===&lt;br /&gt;
&lt;br /&gt;
RIPng is defined in RFC 2080 and is an extension of RIPv2 which includes support for IPv6. RIPng is is an interior gateway protocol (IGP) that uses the distance vector algorithm to determine best route to a destination, using the hop count as the metric, just like its predecessors (RIPv1 &amp;amp; RIPv2). RIPng is a dynamic routing protocol that exchanges routing information used to determine routes through a network, and has been designed exclusively for the new generation of internet protocol, IPv6. RIPng uses User Datagram Protocol (UDP) and functions via UDP port 521. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;RIPng Features&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Support for IPv6.&lt;br /&gt;
&lt;br /&gt;
*RIPng does not need to implement authentication on packets.&lt;br /&gt;
&lt;br /&gt;
*There is no support for multiple instances of RIPng.&lt;br /&gt;
&lt;br /&gt;
*RIPv2 encodes next hop into each route entry, but RIPng requires specific encoding of the next hop for a set of route entries.&lt;br /&gt;
&lt;br /&gt;
*Hop count cannot exceed 15, like its predecessors.&lt;br /&gt;
&lt;br /&gt;
*Still restricted to a fixed metric of hop count, does not make use of additional parameters such as delay, and load, like IGRP and EIGRP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;RIPng Packets&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
RIPng packet header contains the following fields:&lt;br /&gt;
&lt;br /&gt;
*A Command field: Indicates whether packet is a request or response message. Request messages seek information for the router&#039;s routing table while response messages are sent periodically or when a request message is received. Periodic response messages are called update messages. The update messages contain the command and version fields and a set of destinations and metrics.&lt;br /&gt;
&lt;br /&gt;
*Version Number: Specifies the version of RIPng that the originating router is using. &lt;br /&gt;
&lt;br /&gt;
*Destination Prefix: 128 bit IPv6 address prefix for the destination.&lt;br /&gt;
&lt;br /&gt;
*Prefix Length: Number of significant bits in the prefix.&lt;br /&gt;
&lt;br /&gt;
*Metric: Value of the metric advertised for the address.&lt;br /&gt;
&lt;br /&gt;
*Route Tag: A route value that must be advertised and redistributed with the route. The route tag distinguishes external RIPng routes from internal RIPng routes in cases where routes must be redistributed across an Exterior Gateway Protocol (EGP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implementation of IPv6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As of February 3, 2011, the last batch of 5 (/8) address blocks was allocated to the Regional Internet Registries. Each of the address blocks represents approximately 16.7 million possible addresses, over 80 million combined potential addresses. According to [http://www.apnic.net/publications/news/2011/delegation APNIC], these addresses could be fully consumed within three to six months at current rates of allocation. &lt;br /&gt;
&lt;br /&gt;
IPv6 has been implemented on all major operating systems in use in commercial, business, and home consumer environments; however, it does not implement interoperability features with IPv4, in other words, IPv6 creates essentially a parallel, independent network altogether separate from IPv4. Because the two Internet Protocol versions function separately from one another, a few of the largest internet companies (including: Google, Facebook, Akamai, and Yahoo!) have teamed up and are participating in what is called ‘World IPv6 Day’. On this day, June 8th of 2011, these major web companies will enable IPv6 on their servers for 24 hours. The main objective of World IPv6 Day is to entice other web companies to prepare their services for the transition. Also, it will allow users to experience IPv6 firsthand, allowing them a taste of their inevitable future using the new and improved internet protocol, IPv6. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Revised and updated by Clay Wilson &amp;amp; Duc Doan | CNT 2520 01 Spring 2011&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= References and Readings =&lt;br /&gt;
== General IPv6 ==&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2460 RFC 2460 Internet Protocol, Version 6 (IPv6) Specification]&lt;br /&gt;
* [http://www.iana.org/assignments/ipv6-address-space Internet Protocol Version 6 Address Space - IANA]&lt;br /&gt;
* [http://www.6net.org/book/deployment-guide.pdf 6Net IPv6 Deployment Guide]&lt;br /&gt;
* [http://www.roesen.org/files/ipv6_cheat_sheet.pdf Roesen IPv6 Cheat Sheet]&lt;br /&gt;
* [http://media.packetlife.net/media/library/8/IPv6.pdf Packetlife IPv6 Cheat Sheet]&lt;br /&gt;
* [https://learningnetwork.cisco.com/servlet/JiveServlet/download/4060-12-3497/IPv6-AAG_v3_019-KR.pdf IPv6 At-A-Glance]&lt;br /&gt;
&lt;br /&gt;
== Addressing ==&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2373 RFC 2373 IP Version 6 Addressing Architecture]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2374 RFC 2374 An IPv6 Aggregatable Global Unicast Address Format]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc3513 RFC 3513 Internet Protocol Version 6 (IPv6) Addressing Architecture]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc3587 RFC 3587 IPv6 Global Unicast Address Format]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc3879 RFC 3879 Deprecating Site Local Addresses]&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/solutions/Enterprise/Borderless_Networks/Smart_Business_Architecture/BN_Enterprise_IPv6_Addressing_Guide_H2CY10.pdf IPv6 Addressing Guide]&lt;br /&gt;
* [http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd8026003d.pdf IPv6 Addressing At-A-Glance]&lt;br /&gt;
&lt;br /&gt;
== Transition Technologies ==&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc3056 RFC 3056 Connection of IPv6 Domains via IPv4 Clouds]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2766 RFC 2766 Network Address Translation - Protocol Translation (NAT-PT)]&lt;br /&gt;
&lt;br /&gt;
== Routing Protocols ==&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2740 RFC 2740 OSPF for IPv6]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc5308.txt RFC 5308 Routing IPv6 with IS-IS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2080 RFC 2080 RIPng for IPv6]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2545 RFC 2545 Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing]&lt;br /&gt;
&lt;br /&gt;
== Device Configuration ==&lt;br /&gt;
* [http://www.cisco.com/en/US/products/ps6553/products_ios_technology_home.html Cisco IOS IPv6 Introduction]&lt;br /&gt;
* [http://www.cisco.com/en/US/technologies/collateral/tk648/tk872/tk373/technologies_white_paper_09186a00802219bc_ps6553_Products_White_Paper.html Cisco IPv6 Solutions]&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/12_4/ipv6_12_4_book.pdf Cisco IOS IPv6 Configuration Guide]&lt;br /&gt;
* [http://www.cisco.com/en/US/docs/ios/ipv6/command/reference/ipv6_book.html Cisco IOS IPv6 Command Reference]&lt;br /&gt;
&lt;br /&gt;
== Services, Protocols and Features ==&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2463 RFC 2463 ICMPv6]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2874 RFC 2874 DNS Extensions to Support IPv6 Address Aggregation and Renumbering]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc3315 RFC 3315 Dynamic Host Configuration Protocol for IPv6 (DHCPv6)]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc1981 RFC 1981 Path MTU Discovery for IP version 6]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2461 RFC 2461 Neighbor Discovery for IP Version 6 (IPv6)]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc1886 RFC 1886 DNS Extensions to support IP version 6]&lt;br /&gt;
* [http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd80260042.pdf IPv6 Headers At-A-Glance]&lt;br /&gt;
* [http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd80260049.pdf IPv6 Multicast At-A-Glance]&lt;br /&gt;
* [http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd80260046.pdf IPv6 Mobility At-A-Glance]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530&amp;diff=4391</id>
		<title>Franske CNT-2530</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530&amp;diff=4391"/>
		<updated>2011-04-27T01:03:18Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2530: Switching Fundamentals and Intermediate Routing classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2530 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2530 SP11 Schedule|Spring 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2530 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2530 Lab Point Sheet|Lab Point Sheet]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
*[[Cacti]]&lt;br /&gt;
*[[How to Setup Security on a Home Wireless Router]]&lt;br /&gt;
*[[Cisco Wireless Access Points]]&lt;br /&gt;
*[[Network Access Control]]&lt;br /&gt;
*[[Lab Report Example]]&lt;br /&gt;
*[[How to Clear Switch Configuration]]&lt;br /&gt;
*[[Multilayer Switching]]&lt;br /&gt;
*[[Backup Windows 7 Activation]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
=== Subnetting ===&lt;br /&gt;
* [http://www.learntosubnet.com LearnToSubnet.com] (Requires using Internet Explorer)&lt;br /&gt;
=== Multilayer Switching ===&lt;br /&gt;
* [http://www.zurich.ibm.com/pdf/AnritsuGlossary.pdf &amp;quot;Must Have Reference On Multi-Layer Switching&amp;quot;, Anritsu Corp.]&lt;br /&gt;
* [http://www.pulsewan.com/data101/pdfs/layer3_switching.pdf Layer-3 Switching: An Introduction by Robert Ciampa]&lt;br /&gt;
* [http://www.routeralley.com/ra/docs/multilayer_switching.pdf MultiLayer Switching v1.11 by Aaron Balchunas]&lt;br /&gt;
* [http://www.cisco.com/application/pdf/paws/41860/howto_L3_intervlanrouting.pdf How To Configure InterVLAN Routing on Layer 3 Switches]&lt;br /&gt;
* [http://faculty.ccri.edu/tonyrashid/Files/CCNP/Layer3Switching.pdf Layer 3 Switching Demystified]&lt;br /&gt;
=== Enterprise Wireless ===&lt;br /&gt;
* [http://www.ecsl.cs.sunysb.edu/tr/TR166.pdf Coverage and Capacity Issues in Enterprise Wireless LAN Deployment, Raniwala, A. and Chiueh, T.]&lt;br /&gt;
* [http://www.cisco.com/en/US/prod/collateral/wireless/ps5755/ps6301/ps6305/product_data_sheet0900aecd802570d0.html Cisco Wireless Control System (WCS)]&lt;br /&gt;
* [http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6521/prod_white_paper0900aecd8040f7b2_ps6108_Products_White_Paper.html The Benefits of Centralization in Wireless LANs]&lt;br /&gt;
* [http://www.danielmkrueger.com/Docs/The%20Lightweight%20Access%20Point%20Protocol.pdf The Light Weight Access Point Protocol, Krueger, D.]&lt;br /&gt;
* [http://www.conticomp.com/PDF/LWAPP_td.pdf Understanding the Lightweight Access Point Protocol (LWAPP)]&lt;br /&gt;
* [http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00807112e2.shtml Wireless LAN Controller Module (WLCM) Configuration Examples]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530&amp;diff=4390</id>
		<title>Franske CNT-2530</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2530&amp;diff=4390"/>
		<updated>2011-04-27T01:00:27Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2530: Switching Fundamentals and Intermediate Routing classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2530 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2530 SP11 Schedule|Spring 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2530 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2530 Lab Point Sheet|Lab Point Sheet]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
*[[Cacti]]&lt;br /&gt;
*[[How to Setup Security on a Home Wireless Router]]&lt;br /&gt;
*[[Cisco Wireless Access Points]]&lt;br /&gt;
*[[Network Access Control]]&lt;br /&gt;
*[[Lab Report Example]]&lt;br /&gt;
*[[How to Clear Switch Configuration]]&lt;br /&gt;
*[[Multilayer Switching]]&lt;br /&gt;
*[[Backup Windows 7 Activation]]&lt;br /&gt;
*[[RIPng for IPv6]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
=== Subnetting ===&lt;br /&gt;
* [http://www.learntosubnet.com LearnToSubnet.com] (Requires using Internet Explorer)&lt;br /&gt;
=== Multilayer Switching ===&lt;br /&gt;
* [http://www.zurich.ibm.com/pdf/AnritsuGlossary.pdf &amp;quot;Must Have Reference On Multi-Layer Switching&amp;quot;, Anritsu Corp.]&lt;br /&gt;
* [http://www.pulsewan.com/data101/pdfs/layer3_switching.pdf Layer-3 Switching: An Introduction by Robert Ciampa]&lt;br /&gt;
* [http://www.routeralley.com/ra/docs/multilayer_switching.pdf MultiLayer Switching v1.11 by Aaron Balchunas]&lt;br /&gt;
* [http://www.cisco.com/application/pdf/paws/41860/howto_L3_intervlanrouting.pdf How To Configure InterVLAN Routing on Layer 3 Switches]&lt;br /&gt;
* [http://faculty.ccri.edu/tonyrashid/Files/CCNP/Layer3Switching.pdf Layer 3 Switching Demystified]&lt;br /&gt;
=== Enterprise Wireless ===&lt;br /&gt;
* [http://www.ecsl.cs.sunysb.edu/tr/TR166.pdf Coverage and Capacity Issues in Enterprise Wireless LAN Deployment, Raniwala, A. and Chiueh, T.]&lt;br /&gt;
* [http://www.cisco.com/en/US/prod/collateral/wireless/ps5755/ps6301/ps6305/product_data_sheet0900aecd802570d0.html Cisco Wireless Control System (WCS)]&lt;br /&gt;
* [http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6521/prod_white_paper0900aecd8040f7b2_ps6108_Products_White_Paper.html The Benefits of Centralization in Wireless LANs]&lt;br /&gt;
* [http://www.danielmkrueger.com/Docs/The%20Lightweight%20Access%20Point%20Protocol.pdf The Light Weight Access Point Protocol, Krueger, D.]&lt;br /&gt;
* [http://www.conticomp.com/PDF/LWAPP_td.pdf Understanding the Lightweight Access Point Protocol (LWAPP)]&lt;br /&gt;
* [http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00807112e2.shtml Wireless LAN Controller Module (WLCM) Configuration Examples]&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4252</id>
		<title>Intro to IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4252"/>
		<updated>2011-03-03T23:11:39Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Minor last minute fixes. By Clay Wilson.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;By ABorgert CNT-2453-01 Summer Class&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This tutorial is aimed at developing a basic understanding of IPv6 for the new user. The reason IPv6 was created was because of an explosive increase in the number of devices requiring an IP address to communicate on a network and the depleting resources of IPv4 address space. Current estimates suggest that by the end of 2011 all of the left over addresses will be used up, meaning anyone not already connected to the Internet risks being left behind. Born out of necessity, IPv6 is a solution to this problem. Made up of a suite of protocols and standards that where developed by the Internet Engineering Task Force (IETF), not only does IPv6 increase address space; it also solves problems discovered with IPv4 that has become evident over the years. Deploying IPv6 on a global scale is vital to the Internet industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General IPv6===&lt;br /&gt;
&lt;br /&gt;
IPv6 addresses consist of eight blocks of 4 hexadecimal digits each.&lt;br /&gt;
Four hexadecimal digits are equivalent to 16 bits, so an IPv6 address has 8 x 16 = 128 bits.&lt;br /&gt;
&lt;br /&gt;
*An example of an IPv6 address looks like this:  2001:4CEA:8D8C:0000:0000:0000:00D2:7A4B&lt;br /&gt;
&lt;br /&gt;
From this example it is apparent to anyone that IPv6 addresses are more complex to remember than IPv4 addresses.&lt;br /&gt;
Therefore two rules have been developed to shorten addresses to something more manageable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Address Structure Rules&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
1. Any leading digit of Zero can be dropped from any group.&lt;br /&gt;
&lt;br /&gt;
* The example above will look like this:  2001:4CEA:8D8C:0:0:0:D2:7A4B&lt;br /&gt;
&lt;br /&gt;
2. Two or more groups of zeros can be replaced by two colons, But only once per address.&lt;br /&gt;
&lt;br /&gt;
* Now it looks like this: 2001:4CEA:8D8C::D2:7A4B&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===IPv4 vs IPv6===&lt;br /&gt;
&lt;br /&gt;
The most beneficial difference between IPv4 and IPv6 is the vast increase in numerical addresses. The original 4.3 billion addresses that IPv4 provides have neared [http://www.ipv6.net exhaustion] in early 2011 and are expected to be completely depleted before the start of 2012. Ipv6 provides 2*128 (approximately 340 undecillion or 3.4 × 10*38) IP addresses. Perhaps this will be a sufficient amount of addresses to last another few years…&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Differences&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IPv4 consists of four separate blocks of one octet, or 32 digits (bits) of binary values (0 or 1).&lt;br /&gt;
&lt;br /&gt;
* Represented in binary form IPv4 addresses look like this: 11000000.10111000.00000000.00000001&lt;br /&gt;
&lt;br /&gt;
* Represented in dotted decimal Ipv4 addresses look like this: 192.168.0.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As noted previously, IPv6 addressing is constructed of 128 digits (bits) of hexadecimal values (0-9 &amp;amp; A-F). Each hexadecimal represents four binary bits. Respectively, you can see how much larger IPv6 is just by looking at it in binary (128 bits compared to IPv4’s 32 bits).&lt;br /&gt;
&lt;br /&gt;
*IPv6 looks like this: 2001:4CEA:8D8C:0:0:0:D2:7A4B&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*IPv6 is not protected by a checksum.&lt;br /&gt;
&lt;br /&gt;
*IPSec was optional in IPv4, it is now required for IPv6.&lt;br /&gt;
&lt;br /&gt;
*IPv6 does not require manual configuration of addresses, or Dynamic Host Configuration Protocol (DHCP) to configure its address.&lt;br /&gt;
&lt;br /&gt;
*The mobile version of IPv4 uses Triangular routing (where the packet is transmitted through a proxy system before going to the actual network), whereas the mobile version of IPv6 does not do this so it can be as efficient as native IPv6.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modifications&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*There is a new address called Anycast address where it defines a node and the node can define where the packet goes. For example, a node can be used to make a secure connection for video conferencing.&lt;br /&gt;
&lt;br /&gt;
*There are some ipv4 headers that have been dropped or made optional to reduce the processing cost to send the packet and to save bandwidth to compensate for the increased addressing size.&lt;br /&gt;
&lt;br /&gt;
*Time-to-Live field has been remained to hop limit, which is discussed further in the ‘Ipv6 Packet Header’ section.&lt;br /&gt;
 &lt;br /&gt;
*Extensions to support authentication, data integrity, and (optional) data confidentiality are specified for IPv6.&lt;br /&gt;
&lt;br /&gt;
*Routers must now support a 1280 byte packet size without fragmenting the packet.&lt;br /&gt;
&lt;br /&gt;
*ICMPv6 Router Solicitation and Router Advertisement messages are used in place of ICMP Router Discovery to find the best default gateway. This is required for IPv6.&lt;br /&gt;
&lt;br /&gt;
*IPv6 features some new protocols such as: ICMPv6 and DHCPv6 to deal with routing and assigning IPv6 addresses, respectively.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Types of IPv6 addresses&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
There are three main types of IPv4 addresses: APIPA, Private, and Public. The same is true for IPv6, only they have different names:&lt;br /&gt;
&lt;br /&gt;
*Global Address (GA): This is the equivalent of IPv4’s (public address). These addresses start with a first block in the 2000-3FFF range.&lt;br /&gt;
&lt;br /&gt;
*Link-Local Address (LLA): This is the equivalent of the IPv4 (APIPA address). These addresses always start with &amp;quot;fe80&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*Unique Local Address (ULA): Also known as a Site-Local address, this is the equivalent of IPv4’s ‘private address’. Where IPv4 private addresses fall within three ranges, Unique Local Addresses always start with &amp;quot;FD&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
There are two more types of addresses that have more specific uses:&lt;br /&gt;
&lt;br /&gt;
*Multicast Address:  Allows communication between one host and many receivers. These packets are sent out to all the interfaces that are identified by that address. Multicast addresses always begin with &amp;quot;FF&amp;quot;.&lt;br /&gt;
      &lt;br /&gt;
*Special Addresses: There are two special addresses, one is called the Loopback Address and it looks like this, 0:0:0:0:0:0:0:1 (or ::1). The IPv6 loopback address is the same as the IPv4 address 127.0.0.1 and used for the same purpose, to identify a loopback interface. The other special address is called the Unspecified Address and it looks like this, 0:0:0:0:0:0:0:0 (or simply written ::). It is equivalent to the IPv4 address 0.0.0.0 and is also used for the same purpose; it is commonly used as the source address that packets use to confirm if a tentative address is unique.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Features Only Available in IPv6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Stateless Address Autoconfiguration - Lets hosts configure themselves automatically.&lt;br /&gt;
&lt;br /&gt;
*Multicast - Allows single packets to be sent to multiple destinations.&lt;br /&gt;
&lt;br /&gt;
*Mandatory Network Layer Security - Integrated Internet Protocol Security (IPsec).&lt;br /&gt;
&lt;br /&gt;
*Simpler Router Processing - Routing in IPv6 is almost identical to IPv4 routing under CIDR except that the addresses are 128- bit IPv6 addresses instead of 32-bit IPv4 addresses. With very straightforward extensions, IPv4&#039;s dynamic routing protocols (OSPF, RIP, IDRP, ISIS, etc.) can be used to route IPv6.&lt;br /&gt;
&lt;br /&gt;
*Mobility – This means that a mobile device is not constrained by location and has an ‘always on’ IP connectivity to its home agent via a bidirectional tunnel.  In other words, if there is a network that the mobile device can connect. Then it can communicate on its own home network with its own IP address, as if it was directly connected.&lt;br /&gt;
&lt;br /&gt;
*Extension Header Mechanism - The extension header mechanism makes it easy to &#039;extend&#039; the packet header to support future services for [http://en.wikipedia.org/wiki/Quality_of_service QoS], [http://en.wikipedia.org/wiki/IPsec IPsec], [http://en.wikipedia.org/wiki/Mobile_IP Mobile IP], etc. without a redesign of the basic protocol.  Extension headers do this by carrying options that are used for special packet treatment along its route or at its destination, routing, fragmenting, and for security using the IPsec framework.&lt;br /&gt;
&lt;br /&gt;
*Jumbo Payload Option header – Also known as a [http://en.wikipedia.org/wiki/Jumbogram Jumbogram], allows an IPv6 packet to carry a payload larger than the standard mode size of one byte less than 64 Kilobytes, or 65,535 (2*16 - 1) octets of payload. A jumbo payload can be almost 4GB, or 4,294,967,295 (2*32 - 1) octets of payload.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Packet Format&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The IPv6 packet has three main parts:&lt;br /&gt;
&lt;br /&gt;
*Fixed Header: The first 40 octets (320 bits) of an IPv6 data packet makes up the fixed header. The format of the fixed header is presented in the table above.&lt;br /&gt;
&lt;br /&gt;
*Extension Headers (Optional): The extension headers encode the optional Internet-layer information between the fixed header and the upper-layer protocol header in a packet. The headers form a chain using the Next Header fields.	&lt;br /&gt;
&lt;br /&gt;
*Payload (Optional): The payload can have a size of up to 64 KB in standard mode, or with the Hop-By-Hop Options extension header it can carry the larger &amp;quot;jumbo payload&amp;quot; option.&lt;br /&gt;
&lt;br /&gt;
The fixed and optional IPv6 extension headers are followed with the upper-layer payload and the data provided by the transport layer. The Next Header field of the last IPv6 header is what indicates the type of payload that is in this packet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Header.jpg|frame|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Packet Header&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Version (4 bits):   This Indicates the IP version.&lt;br /&gt;
&lt;br /&gt;
*Traffic Class (8 bits): The traffic class field defines the priority of the packet. There are two values held by the bits of this field. The 6 most-significant bits are used to classify packets. The two bits left are used for congestion control.&lt;br /&gt;
 &lt;br /&gt;
*Flow Label (20 bits): The flow label identifies all packets belonging to a specific Class of Service, or “flow”.  These packets can be Identified by routers and handle them all according to their class of service. &lt;br /&gt;
&lt;br /&gt;
*Payload Length (16 bits): The payload length field shows the size of the payload. The payload length includes the size of any extension headers.  The field length is set to zero whenever an extension header carries a Jumbo Payload option. &lt;br /&gt;
&lt;br /&gt;
*Next Header (8 bits): The next header field shows the Transport Layer Protocol that is used by the payload. When there are extension headers in the packet, this field shows which extension header will follow.&lt;br /&gt;
&lt;br /&gt;
*Hop Limit (8 bits): Similar to the &#039;Time-To-Live&#039; field in IPv4, the hop limit shows the maximum number of hops allowed. This value is decreased by one at every hop in the packets route. The packet is discarded when the counter reaches 0. &lt;br /&gt;
&lt;br /&gt;
*Source Address (128 bits): This identifies the IPv6 address of the source sending the packet. The source is also known as the ‘The Sending Node’.&lt;br /&gt;
&lt;br /&gt;
*Destination Address (128 bits): This identifies IPv6 address of the destination receiving the packet or ‘The Destination Node’.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implementation of IPv6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As of February 3, 2011, the last batch of 5 (/8) address blocks was allocated to the Regional Internet Registries. Each of the address blocks represents approximately 16.7 million possible addresses, over 80 million combined potential addresses. According to [http://www.apnic.net/publications/news/2011/delegation APNIC], these addresses could be fully consumed within three to six months at current rates of allocation. &lt;br /&gt;
&lt;br /&gt;
IPv6 has been implemented on all major operating systems in use in commercial, business, and home consumer environments; however, it does not implement interoperability features with IPv4, in other words, IPv6 creates essentially a parallel, independent network altogether separate from IPv4. Because the two Internet Protocol versions function separately from one another, a few of the largest internet companies (including: Google, Facebook, Akamai, and Yahoo!) have teamed up and are participating in what is called ‘World IPv6 Day’. On this day, June 8th of 2011, these major web companies will enable IPv6 on their servers for 24 hours. The main objective of World IPv6 Day is to entice other web companies to prepare their services for the transition. Also, it will allow users to experience IPv6 firsthand, allowing them a taste of their inevitable future using the new and improved internet protocol, IPv6. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Revised and updated by Clay Wilson &amp;amp; Duc Doan | CNT 2520 01 Spring 2011&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2520&amp;diff=4251</id>
		<title>Franske CNT-2520</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2520&amp;diff=4251"/>
		<updated>2011-03-03T22:59:26Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2520 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2520 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2520 SP11 Schedule|Spring 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2520 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2520 Homework|Homework Assignments]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
* [[Xmodem Console IOS Download Procedure using ROMMON]]&lt;br /&gt;
* [[Vyatta]]&lt;br /&gt;
* [[Chapter Command List (chapters 1.5.1-11.6.3)]]&lt;br /&gt;
* [[VMWare Setup|Instructions for creating VMWare machines from the CNT template]]&lt;br /&gt;
* [[Securing Router Logins with SSH]]&lt;br /&gt;
* [[Password Recovery Instructions]]&lt;br /&gt;
* [[Third Party Firmware]]&lt;br /&gt;
* [http://wiki.ihcnt.net/w/Intro_to_IPv6 Intro to IPv6]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
=== Subnetting ===&lt;br /&gt;
* [http://www.learntosubnet.com LearnToSubnet.com] (Requires using Internet Explorer)&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Completed_Student_Projects&amp;diff=4250</id>
		<title>Franske Completed Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Completed_Student_Projects&amp;diff=4250"/>
		<updated>2011-03-03T22:57:01Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==CNT 2540==&lt;br /&gt;
* [[Wake On LAN]] - Lue YANG&lt;br /&gt;
&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Linux-command-list]] - Don Bliss&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add &amp;amp; Update [http://wiki.ihcnt.net/w/Intro_to_IPv6 Intro to IPv6] - Clay Wilson &amp;amp; Duc Doan&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4249</id>
		<title>Intro to IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4249"/>
		<updated>2011-03-03T21:39:15Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Added &amp;#039;IPv4 vs IPv6&amp;#039; section and &amp;#039;Implementation of IPv6&amp;#039;,  By Clay Wilson &amp;amp; Duc Doan 3/3/2011 @ 3:39 pm&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;By ABorgert CNT-2453-01 Summer Class&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This tutorial is aimed at developing a basic understanding of IPv6 for the new user. The reason IPv6 was created was because of an explosive increase in the number of devices requiring an IP address to communicate on a network and the depleting resources of IPv4 address space. Current estimates suggest that by the end of 2011 all of the left over addresses will be used up, meaning anyone not already connected to the Internet risks being left behind. Born out of necessity, IPv6 is a solution to this problem. Made up of a suite of protocols and standards that where developed by the Internet Engineering Task Force (IETF), not only does IPv6 increase address space; it also solves problems discovered with IPv4 that has become evident over the years. Deploying IPv6 on a global scale is vital to the Internet industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General IPv6===&lt;br /&gt;
&lt;br /&gt;
IPv6 addresses consist of eight blocks of 4 hexadecimal digits each.&lt;br /&gt;
Four hexadecimal digits are equivalent to 16 bits, so an IPv6 address has 8 x 16 = 128 bits.&lt;br /&gt;
&lt;br /&gt;
*An example of an IPv6 address looks like this:  2001:4CEA:8D8C:0000:0000:0000:00D2:7A4B&lt;br /&gt;
&lt;br /&gt;
From this example it is apparent to anyone that IPv6 addresses are more complex to remember than IPv4 addresses.&lt;br /&gt;
Therefore two rules have been developed to shorten addresses to something more manageable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Address Structure Rules&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
1. Any leading digit of Zero can be dropped from any group.&lt;br /&gt;
&lt;br /&gt;
* The example above will look like this:  2001:4CEA:8D8C:0:0:0:D2:7A4B&lt;br /&gt;
&lt;br /&gt;
2. Two or more groups of zeros can be replaced by two colons, But only once per address.&lt;br /&gt;
&lt;br /&gt;
* Now it looks like this: 2001:4CEA:8D8C::D2:7A4B&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===IPv4 vs IPv6===&lt;br /&gt;
&lt;br /&gt;
The most beneficial difference between IPv4 and IPv6 is the vast increase in numerical addresses. The original 4.3 billion addresses that IPv4 provides have neared [http://www.ipv6.net exhaustion] in early 2011 and are expected to be completely depleted before the start of 2012. Ipv6 provides 2*128 (approximately 340 undecillion or 3.4 × 10*38) IP addresses. Perhaps this will be a sufficient amount of addresses to last another few years…&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Differences&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
IPv4 consists of four separate blocks of one octet, or 32 digits (bits) of binary values (0 or 1).&lt;br /&gt;
&lt;br /&gt;
* Represented in binary form IPv4 addresses look like this: 11000000.10111000.00000000.00000001&lt;br /&gt;
&lt;br /&gt;
* Represented in dotted decimal Ipv4 addresses look like this: 192.168.0.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As noted previously, IPv6 addressing is constructed of 128 digits (bits) of hexadecimal values (0-9 &amp;amp; A-F). Each hexadecimal represents four binary bits. Respectively, you can see how much larger IPv6 is just by looking at it in binary (128 bits compared to IPv4’s 32 bits).&lt;br /&gt;
&lt;br /&gt;
*IPv6 looks like this: 2001:4CEA:8D8C:0:0:0:D2:7A4B&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*IPv6 is not protected by a checksum.&lt;br /&gt;
&lt;br /&gt;
*IPSec was optional in IPv4, it is now required for IPv6.&lt;br /&gt;
&lt;br /&gt;
*IPv6 does not require manual configuration of addresses, or Dynamic Host Configuration Protocol (DHCP) to configure its address.&lt;br /&gt;
&lt;br /&gt;
*The mobile version of IPv4 uses Triangular routing (where the packet is transmitted through a proxy system before going to the actual network), whereas the mobile version of IPv6 does not do this so it can be as efficient as native IPv6.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modifications&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*There is a new address called Anycast address where it defines a node and the node can define where the packet goes. For example, a node can be used to make a secure connection for video conferencing.&lt;br /&gt;
&lt;br /&gt;
*There are some ipv4 headers that have been dropped or made optional to reduce the processing cost to send the packet and to save bandwidth to compensate for the increased addressing size.&lt;br /&gt;
&lt;br /&gt;
*Time-to-Live field has been remained to hop limit, which is discussed further in the ‘Ipv6 Packet Header’ section.&lt;br /&gt;
 &lt;br /&gt;
*Extensions to support authentication, data integrity, and (optional) data confidentiality are specified for IPv6.&lt;br /&gt;
&lt;br /&gt;
*Routers must now support a 1280 byte packet size without fragmenting the packet.&lt;br /&gt;
&lt;br /&gt;
*ICMPv6 Router Solicitation and Router Advertisement messages are used in place of ICMP Router Discovery to find the best default gateway. This is required for IPv6.&lt;br /&gt;
&lt;br /&gt;
*IPv6 features some new protocols such as: ICMPv6 and DHCPv6 to deal with routing and assigning IPv6 addresses, respectively.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Types of IPv6 addresses&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
There are three main types of IPv4 addresses: APIPA, Private, and Public. The same is true for IPv6, only they have different names:&lt;br /&gt;
&lt;br /&gt;
*Global Address (GA): this is the equivalent of IPv4’s (public address). These addresses start with a first block in the 2000-3FFF range.&lt;br /&gt;
&lt;br /&gt;
*Link-Local Address (LLA): this is the equivalent of the IPv4 (APIPA address). These addresses always start with &amp;quot;fe80&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*Unique Local Address (ULA): also known as a Site-Local address, this is the equivalent of IPv4’s ‘private address’. Where IPv4 private addresses fall within three ranges, Unique Local Addresses always start with &amp;quot;FD&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
There are two more types of addresses that have more specific uses:&lt;br /&gt;
&lt;br /&gt;
*Multicast Address:  Allows communication between one host and many receivers. These packets are sent out to all the interfaces that are identified by that address. Multicast addresses always begin with &amp;quot;FF&amp;quot;.&lt;br /&gt;
      &lt;br /&gt;
*Special Addresses: There are two special addresses, one is called the Loopback Address and it looks like this, 0:0:0:0:0:0:0:1 (or ::1). The IPv6 loopback address is the same as the IPv4 address 127.0.0.1 and used for the same purpose, to identify a loopback interface. The other special address is called the Unspecified Address and it looks like this, 0:0:0:0:0:0:0:0 (or simply written ::). It is equivalent to the IPv4 address 0.0.0.0 and is also used for the same purpose; it is commonly used as the source address that packets use to confirm if a tentative address is unique.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Features Only Available in IPv6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Stateless Address Autoconfiguration - Lets hosts configure themselves automatically.&lt;br /&gt;
&lt;br /&gt;
*Multicast - Allows single packets to be sent to multiple destinations.&lt;br /&gt;
&lt;br /&gt;
*Mandatory Network Layer Security - Integrated Internet Protocol Security (IPsec).&lt;br /&gt;
&lt;br /&gt;
*Simpler Router Processing - Routing in IPv6 is almost identical to IPv4 routing under CIDR except that the addresses are 128- bit IPv6 addresses instead of 32-bit IPv4 addresses. With very straightforward extensions, IPv4&#039;s dynamic routing protocols (OSPF, RIP, IDRP, ISIS, etc.) can be used to route IPv6.&lt;br /&gt;
&lt;br /&gt;
*Mobility – This means that a mobile device is not constrained by location and has an ‘always on’ IP connectivity to its home agent via a bidirectional tunnel.  In other words, if there is a network that the mobile device can connect. Then it can communicate on its own home network with its own IP address, as if it was directly connected.&lt;br /&gt;
&lt;br /&gt;
*Extension Header Mechanism - The extension header mechanism makes it easy to &#039;extend&#039; the packet header to support future services for [http://en.wikipedia.org/wiki/Quality_of_service QoS], [http://en.wikipedia.org/wiki/IPsec IPsec], [http://en.wikipedia.org/wiki/Mobile_IP Mobile IP], etc. without a redesign of the basic protocol.  Extension headers do this by carrying options that are used for special packet treatment along its route or at its destination, routing, fragmenting, and for security using the IPsec framework.&lt;br /&gt;
&lt;br /&gt;
*Jumbo Payload Option header – Also known as a [http://en.wikipedia.org/wiki/Jumbogram Jumbogram], allows an IPv6 packet to carry a payload larger than the standard mode size of one byte less than 64 Kilobytes, or 65,535 (2*16 - 1) octets of payload. A jumbo payload can be almost 4GB, or 4,294,967,295 (2*32 - 1) octets of payload.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Packet Format&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The IPv6 packet has three main parts:&lt;br /&gt;
&lt;br /&gt;
*Fixed Header: The first 40 octets (320 bits) of an IPv6 data packet makes up the fixed header. The format of the fixed header is presented in the table above.&lt;br /&gt;
&lt;br /&gt;
*Extension Headers (Optional): The extension headers encode the optional Internet-layer information between the fixed header and the upper-layer protocol header in a packet. The headers form a chain using the Next Header fields.	&lt;br /&gt;
&lt;br /&gt;
*Payload (Optional): The payload can have a size of up to 64 KB in standard mode, or with the Hop-By-Hop Options extension header it can carry the larger &amp;quot;jumbo payload&amp;quot; option.&lt;br /&gt;
&lt;br /&gt;
The fixed and optional IPv6 extension headers are followed with the upper-layer payload and the data provided by the transport layer. The Next Header field of the last IPv6 header is what indicates the type of payload that is in this packet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Header.jpg|frame|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Packet Header&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Version (4 bits):   This Indicates the IP version.&lt;br /&gt;
&lt;br /&gt;
*Traffic Class (8 bits): The traffic class field defines the priority of the packet. There are two values held by the bits of this field. The 6 most-significant bits are used to classify packets. The two bits left are used for congestion control.&lt;br /&gt;
 &lt;br /&gt;
*Flow Label (20 bits): The flow label identifies all packets belonging to a specific Class of Service, or “flow”.  These packets can be Identified by routers and handle them all according to their class of service. &lt;br /&gt;
&lt;br /&gt;
*Payload Length (16 bits): The payload length field shows the size of the payload. The payload length includes the size of any extension headers.  The field length is set to zero whenever an extension header carries a Jumbo Payload option. &lt;br /&gt;
&lt;br /&gt;
*Next Header (8 bits): The next header field shows the Transport Layer Protocol that is used by the payload. When there dare extension headers in the packet, this field shows which extension header will follow.&lt;br /&gt;
&lt;br /&gt;
*Hop Limit (8 bits): Similar to the &#039;Time-To-Live&#039; field in IPv4, the hop limit shows the maximum number of hops allowed. This value is decreased by one at every hop in the packets route. The packet is discarded when the counter reaches 0. &lt;br /&gt;
&lt;br /&gt;
*Source Address (128 bits): This identifies the IPv6 address of the source sending the packet. The source is also known as the ‘The Sending Node’.&lt;br /&gt;
&lt;br /&gt;
*Destination Address (128 bits): This identifies IPv6 address of the destination receiving the packet or ‘The Destination Node’.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implementation of IPv6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As of February 3, 2011, the last batch of 5 (/8) address blocks was allocated to the Regional Internet Registries. Each of the address blocks represents approximately 16.7 million possible addresses, over 80 million combined potential addresses. According to [http://www.apnic.net/publications/news/2011/delegation APNIC], these addresses could be fully consumed within three to six months at current rates of allocation. &lt;br /&gt;
&lt;br /&gt;
IPv6 has been implemented on all major operating systems in use in commercial, business, and home consumer environments; however, it does not implement interoperability features with IPv4, in other words, IPv6 creates essentially a parallel, independent network altogether separate from IPv4. Because the two Internet Protocol versions function separately from one another, a few of the largest internet companies (including: Google, Facebook, Akamai, and Yahoo!) have teamed up and are participating in what is called ‘World IPv6 Day’. On this day, June 8th of 2011, these major web companies will enable IPv6 on their servers for 24 hours. The main objective of World IPv6 Day is to entice other web companies to prepare their services for the transition. Also, it will allow users to experience IPv6 firsthand, allowing them a taste of their inevitable future using the new and improved internet protocol, IPv6. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Revised and updated by Clay Wilson &amp;amp; Duc Doan | CNT 2520 01 Spring 2011&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4235</id>
		<title>Intro to IPv6</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Intro_to_IPv6&amp;diff=4235"/>
		<updated>2011-03-01T21:49:08Z</updated>

		<summary type="html">&lt;p&gt;Cilson123: Minor gramatical fixes and revisions. No new information added. By Clay Wilson and Duc Doan @ 3:49 pm, March 1, 2011. FIRST EDIT.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;By ABorgert CNT-2453-01 Summer Class&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This tutorial is aimed at developing a basic understanding of IPv6 for the new user. The reason IPv6 was created was because of an explosive increase in the number of devices requiring an IP address to communicate on a network and the depleting resources of IPv4 address space. Current estimates suggest that by 2011 all of the left over addresses will be used up, meaning anyone not already connected to the Internet risks being left behind. Born out of necessity, IPv6 is a solution to this problem; made up of a suite of protocols and standards that where developed by the Internet Engineering Task Force(IETF). Not only does IPv6 increase address space, it also solves problems discovered with IPv4 that has become evident over the years. Deploying IPv6 on a global scale is vital to the Internet industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===General IPv6===&lt;br /&gt;
&lt;br /&gt;
The main difference between IPv4 and IPv6 is where IPv4 addresses consist of 32 bits, IPv6 addresses consist of eight blocks of 4 hexadecimal digits each.&lt;br /&gt;
Four hexadecimal digits are equal to 16 bits, so an IPv6 address has 8*16 = 128 bits.&lt;br /&gt;
&lt;br /&gt;
*An example of an IPv6 address looks like this:  2001:4CEA:8D8C:0000:0000:0000:00D2:7A4B&lt;br /&gt;
&lt;br /&gt;
From this example it is apparent to anyone that IPv6 addresses are more complex to remember than IPv4 addresses.&lt;br /&gt;
Therefore two rules have been developed to shorten addresses to something more manageable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Address Structure Rules&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
1. Any leading digit of Zero can be dropped from any group&lt;br /&gt;
&lt;br /&gt;
* The example above will look like this:  2001:4CEA:8D8C:0:0:0:D2:7A4B&lt;br /&gt;
&lt;br /&gt;
2. Two or more groups of zeros can be replaced by two colons, But only once per address.&lt;br /&gt;
&lt;br /&gt;
* Now it looks like this: 2001:4CEA:8D8C::D2:7A4B&lt;br /&gt;
&lt;br /&gt;
This is much simpler :)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Types of IPv6 addresses&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
There are three main types of IPv4 addresses: APIPA, Private, and Public. The same is true for IPv6, only they have different names:&lt;br /&gt;
&lt;br /&gt;
*Global Address(GA): this is the equivalent of IPv4’s (public address). These addresses start with a first block in the 2000-3FFF range.&lt;br /&gt;
&lt;br /&gt;
*Link-Local Address(LLA): this is the equivalent of the IPv4 (APIPA address). These addresses always start with &amp;quot;fe80&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*Unique Local Address(ULA): also known as a Site-Local address, this is the equivalent of IPv4’s (private address). Where IPv4 private addresses fall within three ranges, ULA’s always start with &amp;quot;fd&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are two more that have more specific uses:&lt;br /&gt;
&lt;br /&gt;
*Multicast Address: Allows communication between one host and many receivers. These packets are sent out to all the interfaces that are identified by that address. Multicast addresses always begin with &amp;quot;ff&amp;quot;.&lt;br /&gt;
      &lt;br /&gt;
*Special Addresses: There are two special addresses, one is called the Loopback address and it looks like this, 0:0:0:0:0:0:0:1 (or ::1). The IPv6 loopback address is the same as the IPv4 address 127.0.0.1 and used for the same purpose, to identify a loopback interface. The other special address is called the Unspecified address and it looks like this, 0:0:0:0:0:0:0:0 (or simply written ::). It is equivalent to the IPv4 address 0.0.0.0 and is also used for the same purpose; it is commonly used as the source address that packets use to confirm if a tentative address is unique.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Some features that are available only in IPv6&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Stateless Address Autoconfiguration - lets hosts configure themselves automatically, similar to Dynamic Host Configuration Protocol.&lt;br /&gt;
&lt;br /&gt;
*Multicast - allows single packets to be sent to multiple destinations.&lt;br /&gt;
&lt;br /&gt;
*Mandatory Network Layer Security - integrated Internet Protocol Security(IPsec).&lt;br /&gt;
&lt;br /&gt;
*Simpler Router Processing - Routing in IPv6 is almost identical to IPv4 routing under CIDR except that the addresses are 128- bit IPv6 addresses instead of 32-bit IPv4 addresses. With very straightforward extensions, IPv4&#039;s dynamic routing protocols (OSPF, RIP, IDRP, ISIS, etc.) can be used to route IPv6.&lt;br /&gt;
&lt;br /&gt;
*Mobility – This means that a mobile device is not constrained by location and has an “always on” IP connectivity to its home agent via a bidirectional tunnel.  In other words, if there is a network that the mobile device can connect. Then it can communicate on its own home network with its own IP address, as if it was directly connected.&lt;br /&gt;
&lt;br /&gt;
*Extension Header Mechanism - The extension header mechanism makes it easy to &#039;extend&#039; the packet header to support future services for [http://en.wikipedia.org/wiki/Quality_of_service QoS], [http://en.wikipedia.org/wiki/IPsec IPsec], [http://en.wikipedia.org/wiki/Mobile_IP Mobile IP], etc. without a redesign of the basic protocol.  Extension headers do this by carrying options that are used for special packet treatment along its route or at its destination, routing, fragmenting, and for security using the IPsec framework.&lt;br /&gt;
&lt;br /&gt;
*Jumbo Payload Option header – Also known as a [http://en.wikipedia.org/wiki/Jumbogram Jumbogram] allows an IPv6 packet to carry a payload larger than the standard mode size of one byte less than 64 Kilobytes, or 65,535 (2*16 - 1) octets of payload. A jumbo payload can be almost 4GB, or 4,294,967,295 (2*32 - 1) octets of payload.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IPv6 Packet Format&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The IPv6 packet has three main parts:&lt;br /&gt;
&lt;br /&gt;
*Fixed Header: The first 40 octets (320 bits) of an IPv6 data packet makes up the fixed header. The format of the fixed header is presented in the table above.&lt;br /&gt;
&lt;br /&gt;
*Extension Headers (Optional): The extension headers encode the optional Internet-layer information between the fixed header and the upper-layer protocol header in a packet. The headers form a chain using the Next Header fields.	&lt;br /&gt;
&lt;br /&gt;
*Payload (Optional): The payload can have a size of up to 64 KB in standard mode, or with the Hop-By-Hop Options extension header it can carry the larger &amp;quot;jumbo payload&amp;quot; option.&lt;br /&gt;
&lt;br /&gt;
The fixed and optional IPv6 extension headers are followed with the upper-layer payload and the data provided by the transport layer. The Next Header field of the last IPv6 header is what indicates the type of payload that is in this packet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Header.jpg|frame|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Version (4 bits):   This Indicates the IP version.&lt;br /&gt;
&lt;br /&gt;
*Traffic Class (8 bits): The traffic class field defines the priority of the packet. There are two values held by the bits of this field. The 6 most-significant bits are used to classify packets. The two bits left are used for congestion control.&lt;br /&gt;
 &lt;br /&gt;
*Flow Label (20 bits): The flow label identifies all packets belonging to a specific Class of Service, or “flow”.  These packets can be Identified by routers and handle them all according to their class of service. &lt;br /&gt;
&lt;br /&gt;
*Payload Length (16 bits): The payload length field shows the size of the payload. The payload length includes the size of any extension headers.  The field length is set to zero whenever an extension header carries a Jumbo Payload option. &lt;br /&gt;
&lt;br /&gt;
*Next Header (8 bits): The next header field shows the Transport Layer Protocol that is used by the payload. When there is extension headers in the packet, this field shows which extension header will follow.&lt;br /&gt;
&lt;br /&gt;
*Hop Limit (8 bits): Similar to the &#039;Time-To-Live&#039; field in IPv4, the hop limit shows the maximum number of hops allowed. This value is decreased by one at every hop in the packets route. The packet is discarded when the counter reaches 0. &lt;br /&gt;
&lt;br /&gt;
*Source Address (128 bits): This identifies the IPv6 address of the source sending the packet. The source is also known as the “The Sending Node”.&lt;br /&gt;
&lt;br /&gt;
*Destination Address (128 bits): This identifies IPv6 address of the destination receiving the packet or “The Destination Node”.&lt;/div&gt;</summary>
		<author><name>Cilson123</name></author>
	</entry>
</feed>