Chapter 10 Networking and the Internet ITSC 1458.

Slides:



Advertisements
Similar presentations
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Advertisements

6 UNIX Network Utilities Mauro Jaskelioff. Introduction Overview of computer networks Network related utilities –Accessing a remote computer –Transferring.
SYSTEM ADMINISTRATION Chapter 19
Nassau Community College
Chapter 13: Troubleshooting network connectivity Unit objectives Identify TCP/IP troubleshooting tools Discuss the Telnet utility and its functions Discuss.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet Useful Definitions and Concepts About the Internet.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 10.
Guide To UNIX Using Linux Third Edition
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
1 DNS,NFS & RPC Rizwan Rehman, CCS, DU. Netprog: DNS and name lookups 2 Hostnames IP Addresses are great for computers –IP address includes information.
DNS. Outline r Domain Name System r DNS Hierarchy r Resolution.
DOMAIN NAME SYSTEM. Domain Name System Hostname Resolution DNS Name Lookup with DNS Domain Name Servers DNS Database Reverse Lookups.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Telnet/SSH: Connecting to Hosts Internet Technology1.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Electronic Commerce Last Week
Linux Filesystem Management
Module 7: Configuring TCP/IP Addressing and Name Resolution.
A Practical Guide to Fedora and Red Hat Enterprise Linux Unit 7: Linux Network Services Chapter 10: Networking and the Internet By Fred R. McClurg Linux.
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Windows Server 2008 R2 Domain Name System Chapter 5.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
1 © 2001 John Urrutia. All rights reserved. Chapter 7 Networking and the InterNet.
Chapter 29 Domain Name System (DNS) Allows users to reference computer names via symbolic names translates symbolic host names into associated IP addresses.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Netprog: DNS and name lookups1 Address Conversion Functions and The Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Chapter 9 Networking Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, Original Notes by Raj Sunderraman.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
Domain Name System Refs: Chapter 9 RFC 1034 RFC 1035.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
1 Chapter 34 Internet Applications (Telnet, FTP).
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
178 Connecting to the Network Version A.01 H3064S Module 21 Slides.
IT ELECTRONIC COMMERCE THEORY NOTES
Chapter 5 Common Internet Tools. How Gophers Work? Internet Gopher: Client software, to find Internet files and other resources easily Organize information.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 6 Resolving Network Host Names.
Linux Services Configuration
Agenda Networking with Linux & UNIX OS –Overview –Setup –Common Utilities.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
4343 X2 – Outline The Domain Name System The Web.
Web Server Administration Chapter 4 Name Resolution.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Networking SPARCS 2000 wheel seminar
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
CS 372 COMPUTER COMMUNICATION AND NETWORKS
Chapter 7: Using Network Clients
CompTIA Network+ N Authorized Cert Guide
Linux Filesystem Management
Internet Applications (Telnet, FTP)
Presentation transcript:

Chapter 10 Networking and the Internet ITSC 1458

Hostnames Linux provides several ways to associate hostnames with IP addresses. One of these is to store a list of names and addresses in the /etc/hosts file. cat /etc/hosts localhost bravo.example.combravo Localhost - allows networking software to operate on th local machine without going onto a physical network FQDN - fully qualified domain name Nickname – locally unique

NIS The second way to associate hostnames with Ips is to use NIS (Network Information Service). NIS stores info in a database and is useful only for host information within a single administrative domain. Hosts outside of the domain can’t access the database.

DNS The third way to associate hostnames with IP addresses is to use DNS. DNS arranges the entire network namespace as a hierarchy. Each domain in the DNS manages its own namespace (addressing and name resolution), and each domain can query for any host or IP address by following the tree up or down the namespace until it finds the appropriate domain.

Communication Commands Hostname – shows or sets the system’s host name (default is localhost.localdomain) – hostname Displays the hostname – hostname Anaconda Changes the hostname to Anaconda – allows you to refer to a user (msmith) on a remote server (remotehost). uname – lists host information – uname –n lists hostname – uname –alists kernel name (-s), hostname (-n), kernel- release (-f), kernel version (-v), machine hardware name (-m), processor type (-p), hardware platform (-i), and operating system (-o)

Comm. Commands domainname – show or set the system’s domain name – domainnamelists the domain name – domainname newnamesets the domain name dnsdomainname – show or set the system’s DNS domain name

finger Finger – displays information about local and remote users. – displays information about all users on the remote system bravo – finger displays information about the single user alex on remote system bravo. – F – inger jane displays info on all local users with “jane” in /etc/passwd. Displays username, shell, home directory, and last login. Finger queries in.fingerd that runs on the system being queried. To disable finger, – set disable = yes in /etc/xinetd.d/finger – service finger restart

Network Utilities Trusted Hosts – some commands such as rcp and rsh work only if the remote system trusts your local computer. Trusted systems are listed in the /etc/hosts.equiv file. OBSOLETE. You should not allow rcp, rsh, or any rcommands on your network. OpenSSH has tools that replace the r (remote) commands with more secure alternatives.

telnet vs. ssh telnet – remotely access another system. Sends info in clear text. Don’t allow. Can be used as a debugging tool to connect to other ports rather than the standard 23. – telnet smtpsrv 25 -connects to port 25 using SMTP commands ssh – more secure alternative. Assumes that your username and password are the same on the remote system as they are on the querying system.

ftp ftp – transfers files over a network in clear text. Login is also in clear text. Used for publicly available downloads.Must connect to a server and must log in to the server. – ftp

ping ICMP Echo request/echo response Checks for connectivity (and DNS if use domain name) – ping Ctrl c ends

traceroute Traces the route that an IP packet follows, including all hops, to its destination. – traceroute

Host and dig Host looks up an IP address given a name, or vice versa. – host – host Dig (domain information groper) queries DNS servers and individual machines for information about a domain.

jwhois jwhois – replaces whois and queries a whois server for information about an Internet side. Returns site contact and registry information. Faster than whois – jwhois victoriacollege.edu

DNS DNS is a distributed service to provide IP address to domain name resolution. Nameservers on thousands of machines worldwide cooperate to keep the database up-to-date. No one system has a complete copy of the database. 6 original top-level domains: com, edu, gov, mil, net, org FQDN – fully-qualified domain name – a system’s complete name. Top-level domain appears last – anaconda.marty.com DNS service – bind (most common) – client/server system.

nis Network Information Service – simplifies the maintenance of frequently used administrative files by keeping them in a central database and having clients contact the database server to retrieve information from the database.

nfs Network Filesystem – allows a server to share selected local directory hierarchies with client systems. Files on the remote fileserver appear as if they are present on the local system.