Network Services.

Slides:



Advertisements
Similar presentations
Netprog: daemons and inetd1 Daemons & inetd Refs: Chapter 13.
Advertisements

Homework 5b: Samba. Computer Center, CS, NCTU 2 Network-based File Sharing (1)  NFS (UNIX-based) mountd is responsible for mount request nfsd and nfsiod.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Chapter 3 Unix Overview. Figure 3.1 Unix file system.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
1.  The Linux system of permissions is much more difficult than that of Windows  System administrators are given more control with the use of three.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
SUSE Linux Enterprise Server Administration (Course 3037)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Network Services CSCI N321 – System and Network Administration Copyright © 2000, 2007 by Scott Orr and the Trustees of Indiana University.
Chabot College ELEC Ports (Layer 4).
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 Network Administration ITA3564 Leung Hung
Vassil Roussev 2 A socket is the basic remote communication abstraction provided by the OS to processes. controlled by operating system.
Inetd...Server of Servers Looks at a number of ports Determines when a service is needed on any of those ports Calls the appropriate server Restarts new.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
New SA Training Topic 6: Service Management Our organization takes advantage of many service type to provide functionality to users and ease management.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Networking Basics CCNA 1 Chapter 11.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Accessing Evitech network via FTP by Susan Jansson.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Daemons Ying Zhang CMSC691X, Summer02. Outline  Introduction  Init and Cron  System daemons  Print daemons and NFS daemons  Time synchronization.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
中華技術學院 Linux 課程 中華技術學院 Linux 課程 Chap one : Service Control 王俊城RHCE/RHCX.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Network Basics CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Unix System Administration Chapter 31 Daemons. Out of the Goo, the Primordial Process l Init l Always the first process to run after system boot l Always.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Application Layer Functionality and Protocols
Introduction to Networks
LESSON Networking Fundamentals Understand TCP/IP.
Chap-I Network and System Configuration in Linux
Enumeration.
Instructor Materials Chapter 5 Providing Network Services
Unit 28 Website Production
Sockets and Beginning Network Programming
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
UNIX Introduction History Main Features UNIX Operating System
LINUX ADMINISTRATION
Network Wiring and Reference
Unit 4: Transport protocols
Exercise 7 Samba.
LINUX ADMINISTRATION 1
Understand the OSI Model Part 2
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Working at a Small-to-Medium Business or ISP – Chapter 7
Introduction to Networks
Working at a Small-to-Medium Business or ISP – Chapter 7
Network Services CSCI N321 – System and Network Administration
TCP/IP Networking An Example
Application layer Lecture 7.
Working at a Small-to-Medium Business or ISP – Chapter 7
COP 4343 Unix System Administration
Linux and TCP/IP Networking
Daemons & inetd Refs: Chapter 12.
Applications Layer Functionality & Protocols
APACHE WEB SERVER.
Chapter 7 Network Applications
Computer Networks Protocols
Presentation transcript:

Network Services

Section Overview Client-Server Model Network Ports, Services and Daemons Network Protocols Viewing Active Ports Common Server Daemons

TCP/IP Protocol Stack Application (FTP, HTTP, DNS) Transport Layer (TCP,UDP) Network Layer (IP) Link Layer (Device Drivers) Physical Layer (media)

Client-Server Model Server Client Makes a request Request fulfilled Listens for incoming requests

Network Ports Enables processes to communicate with each other across a network 64K possible ports Privileged ports < 1024 reserved for system use only Correspond to well-known services /etc/services

/etc/services Service-name port/protocol aliases Examples: ssh 22/tcp smtp 25/tcp mail www 80/tcp http www-http imaps 993/tcp syslog 514/udp

Running Network Servers Stand-alone Daemon Each started via rc script Always running Listens (binds) to the service port Uses resources even when idle inetd “Super-daemon” Listens to many ports Starts daemon when request is received Daemon shuts down when finished /etc/inetd.conf

/etc/inetd.conf service_name: Service name sock_type: stream (tcp) dgram (udp) raw (direct IP) proto: protocol used (/etc/protocol) flags: wait, nowait user: User to run daemon as server_path: Full path to daemon program args: Command line arguments to daemon

Xinetd Replacement for inetd Enhancements Default: /etc/xinetd.conf Access Control Resource based limits Logging (Success and Failure) Default: /etc/xinetd.conf Service Specific: /etc/xinetd.d

/etc/xinetd.conf defaults { instances = 60 log_type = SYSLOG authpriv log_on_success = HOST PID log_on_failure = HOST cps = 25 30 } includedir /etc/xinetd.d

Example xinetd service /etc/xinetd.d/imaps: service imaps { disable = no socket_type = stream wait = no user = root server = /usr/local/sbin/imapd groups = yes flags = REUSE IPv6 }

Windows Service Management Microkernel – Everything a service Administrative tools -> Services Service Options Startup Type: Automatic, Manual, Disabled Log On: Which user to run service as Recovery: What to do on failure Dependencies: Which services does this one depend upon

Windows Service Recovery Settings for: First Failure Second Failure Subsequent Failures Counter Reset (Days) Options: Take no Action Restart the Service Run a program Restart the Computer

Network Protocols Service request/response syntax Often uses English commands Request For Comments (RFC) Documentation for protocols and practices Each revision its own number May have a second classification For Your Information (FYI) Best Common Practices (BCP) Standards (STD)

Viewing Active Ports netstat –a – Ports in use Source/destination addresses and ports Protocol used State LISTEN ESTABLISHED lsof –i :service – Process using port tcpdump – View network traffic

Resource Sharing Daemons Network File System (NFS) nfsd mountd Line Printing Daemon (lpd) Samba smbd – Microsoft file and print sharing nmbd – Microsoft name resolution

Internet Daemons telnetd – Remote Access ftpd – File transfer Berkeley-R Daemons sshd – Secure Shell Electronic Mail sendmail/postfix – Receiving email imapd, popd – Remote email access httpd – Web

Infrastructure Daemons named – DNS dhcpd – Dynamic Host Config Protocol nisd/ldapd – Directory Services fingerd – User information xntpd – System time synchronization routed/gated – Routing Firewall