Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.

Slides:



Advertisements
Similar presentations
Introduction to Networks
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Layer 7- Application Layer
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: Application Layer Network Basics.
Chapter Overview TCP/IP Protocols IP Addressing.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Forensic and Investigative Accounting
WXES2106 Network Technology Semester /2005 Chapter 4 TCP/IP CCNA1: Module 9, 10.3 and 11.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Linux+ Guide to Linux Certification, Third Edition
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Networking with TCP/IP and the Internet. Objectives Discuss additional details of TCP/IP addressing and subprotocols Comprehend the purpose and procedure.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
The Internet Just the Facts. Protocols TCP/IP are the TRANSPORT protocols of the Internet Services use TCP/IP to connect to other computers on Internet.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Chapter Overview Network Communications The OSI Reference Model.
Networking Material taken mainly from HowStuffWorks.com.
Linux Operations and Administration Chapter Eight Network Communications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to TCP/IP.
Windows Vista Configuration MCTS : Advanced Networking.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Chapter Objectives In this chapter, you will learn:
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Chapter 10: Application Layer
Web Development & Design Chapter 1, Sections 4, 5 & 6
TCP/IP Protocol Suite and IP Addressing
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Chapter 7 Network Applications
Computer Networks Protocols
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration

Linux+ Guide to Linux Certification, 2e2 Objectives Describe the purpose and types of networks, protocols, and media access methods Understand the basic configuration of TCP/IP Configure a NIC interface to use TCP/IP

Linux+ Guide to Linux Certification, 2e3 Objectives (continued) Configure a modem, ISDN, and DSL interface to use PPP and TCP/IP Understand the purpose of host names and how they are resolved to IP addresses Use common network utilities to interact with network services

Linux+ Guide to Linux Certification, 2e4 Networks and TCP/IP Network: Two or more computers joined via network media and able to exchange information Local Area Networks (LANs): Computers within close proximity Wide Area Networks (WANs): Computers separated by large distances Internet service provider (ISP): Company providing internet access

Linux+ Guide to Linux Certification, 2e5 Networks and TCP/IP (continued) Routers: Devices capable of transferring packets between networks Protocols: Set of rules for communication between networked computers Packets: Packages of data formatted by a network protocol Media access method: Defines how networked computers share access to the physical medium

Linux+ Guide to Linux Certification, 2e6 Networks and TCP/IP (continued) Linux network protocols: –TCP/IP (Transfer Control Protocol/Internet Protocol) –UDP/IP (User Datagram Protocol/Internet Protocol) –IPX/SPX (Internetwork Packet Exchange/Sequence Packet Exchange) –Appletalk –DLC (Data Link Control) –DECnet (Digital Equipment Corporation network)

Linux+ Guide to Linux Certification, 2e7 Networks and TCP/IP (continued) Ethernet: Most common network media access method Token Ring: Popular media access method Media access method usually contained on NIC or modem hardware

Linux+ Guide to Linux Certification, 2e8 The TCP/IP Protocol: IP Addresses IP address: Unique number that identifies a networked computer –Octets: Series of four 8-bit numbers Unicast: Directed TCP/IP communication between two computers

Linux+ Guide to Linux Certification, 2e9 The TCP/IP Protocol: IP Addresses (continued) IP addresses composed of two parts: –Network ID: Network computer is located on –Host ID: Single computer on that network Cannot have two computers with same host ID on a network Only computers with same network ID can communicate without a router

Linux+ Guide to Linux Certification, 2e10 Subnet Masks Define which part of IP address is the network ID and which part is the host ID –Series of four 8-bit numbers ANDing: Calculate network and host IDs from an IP address and subnet mask –Compare binary bits

Linux+ Guide to Linux Certification, 2e11 Subnet Masks (continued) Figure 14-1: A sample IP address and subnet mask

Linux+ Guide to Linux Certification, 2e12 Subnet Masks (continued) = all networks = all computers 255 in an IP address can specify many hosts –Broadcast addresses

Linux+ Guide to Linux Certification, 2e13 Default Gateway IP address on router that sends packets to remote networks Routers can distinguish between different networks –Move packets between them –Have assigned IP addresses on each attached network

Linux+ Guide to Linux Certification, 2e14 TCP/IP Classes and Subnetting IP address class defines default subnet mask of associated device Multicast: TCP/IP communication destined for a certain group of computers –Class D addresses Subnetting: Divide a large network into smaller networks –Control traffic flow –Take bits from host ID, give to network ID

Linux+ Guide to Linux Certification, 2e15 TCP/IP Classes and Subnetting (continued) Table 14-1: IP address classes

Linux+ Guide to Linux Certification, 2e16 Configuring a NIC Interface ifconfig command: Assign TCP/IP configuration to a NIC –Also used to view configuration of all network interfaces in computer dhclient command: Receive TCP/IP configuration from DHCP or Boot Protocol (BOOTP) server

Linux+ Guide to Linux Certification, 2e17 Configuring a NIC Interface (continued) /etc/sysconfig/network-scripts/ifcfg- file: Stores NIC configurations Packet internet groper (ping) command: Check TCP/IP connectivity on a network

Linux+ Guide to Linux Certification, 2e18 Configuring a NIC Interface (continued) Figure 14-2: Configuring network interfaces

Linux+ Guide to Linux Certification, 2e19 Configuring a NIC Interface (continued) Figure 14-3: Configuring TCP/IP information for a network interface

Linux+ Guide to Linux Certification, 2e20 Configuring a PPP Interface Run TCP/IP over serial lines –Use a WAN protocol Three common Point-to-Point Protocol (PPP) technologies: –Modems –ISDN –DSL

Linux+ Guide to Linux Certification, 2e21 Configuring a PPP Interface (continued) Figure 14-4: Adding a network interface

Linux+ Guide to Linux Certification, 2e22 Configuring a PPP Interface (continued) Figure 14-5: Selecting modem hardware

Linux+ Guide to Linux Certification, 2e23 Configuring a PPP Interface (continued) Figure 14-6: Selecting ISDN hardware

Linux+ Guide to Linux Certification, 2e24 Configuring a PPP Interface (continued) Figure 14-7: Specifying ISP settings

Linux+ Guide to Linux Certification, 2e25 Configuring a PPP Interface (continued) Information about PPP devices stored in files named ifcfg- –/etc/sysconfig/network-scripts directory Other configurations used by PPP daemon stored in /etc/ppp and /etc/isdn

Linux+ Guide to Linux Certification, 2e26 Configuring a PPP Interface (continued) Figure 14-8: Specifying TCP/IP settings

Linux+ Guide to Linux Certification, 2e27 Configuring a PPP Interface (continued) Figure 14-9: Configuring an xDSL connection

Linux+ Guide to Linux Certification, 2e28 Configuring a PPP Interface (continued) Figure 14-10: Activating a PPP connection

Linux+ Guide to Linux Certification, 2e29 Name Resolution Hostnames: User-friendly computer name FQDN: Hostname following DNS convention DNS: Hierarchical namespace for host names hostname command: View or set a computer’s host name

Linux+ Guide to Linux Certification, 2e30 Name Resolution (continued) Figure 14-11: The Domain Name Space

Linux+ Guide to Linux Certification, 2e31 Name Resolution (continued) TCP/IP cannot identify computers via hostnames –Must map hostnames to IP addresses –Entries in /etc/hosts file ISPs list FQDNs in DNS servers on Internet –Applications request IP addresses associated with FQDN

Linux+ Guide to Linux Certification, 2e32 Connecting to Network Resources Network resources: –Shared printers –Applications –Files To use network resources, must have appropriate network utilities

Linux+ Guide to Linux Certification, 2e33 Downloading Files Using FTP Most web browsers have built-in FTP utility FTP utility: Downloads files from FTP servers

Linux+ Guide to Linux Certification, 2e34 Downloading Files Using FTP (continued) Figure 14-12: Using a Web browser FTP client

Linux+ Guide to Linux Certification, 2e35 Downloading Files Using FTP (continued) Table 14-2: Common FTP commands

Linux+ Guide to Linux Certification, 2e36 Downloading Files Using FTP (continued) Table 14-2 (continued): Common FTP commands

Linux+ Guide to Linux Certification, 2e37 Accessing Files with NFS NFS: Common method for file transfer between UNIX and Linux computers –Not as common as FTP –Mount directory from a remote computer

Linux+ Guide to Linux Certification, 2e38 Accessing Windows Files Mount shared Windows directory to local directory –Filesystem must be smbfs smbmount command: Mount directories from Windows computers smbclient utility: Connect to shares on a Windows system umount command: Unmount Windows directories

Linux+ Guide to Linux Certification, 2e39 Running Remote Applications Access to BASH shell may be obtained by connecting to a server across a network telnet utility: Most common utility used to obtain BASH shell over a network –No encryption Secure Shell (ssh) utility: Uses encryption

Linux+ Guide to Linux Certification, 2e40 Running Remote Applications (continued) rlogin: Obtain a shell from remote computer on network “r” utilities allow access to remote computers without a password Trusted access: Computers allowed to access a computer without providing a password

Linux+ Guide to Linux Certification, 2e41 Accessing Post Office Protocol (POP): Download messages from server Internet Message Access Protocol (IMAP): View e- mail messages across network Simple Mail Transfer Protocol (SMTP): Sending mail from MUA to server –Mozilla Mail is most common MUA for Linux

Linux+ Guide to Linux Certification, 2e42 Accessing (continued) Figure 14-13: Configuring a mail account in Mozilla Mail

Linux+ Guide to Linux Certification, 2e43 Accessing (continued) Figure 14-14: Using Mozilla Mail

Linux+ Guide to Linux Certification, 2e44 Accessing (continued) Linux systems typically use an internal mail system designed for administration –Daemons root user when important events or problems occur mail utility: Basic reader available on most Linux distributions mutt utility: Popular MUA –Can run in a terminal

Linux+ Guide to Linux Certification, 2e45 Accessing (continued) Figure 14-15: The mutt mail user agent

Linux+ Guide to Linux Certification, 2e46 Summary A network is a collection of computers that are connected together and share information Protocols define the format of information that is transmitted across a network The protocol used by the Internet and most networks is TCP/IP Each computer on a TCP/IP network must have a valid IP address and subnet mask

Linux+ Guide to Linux Certification, 2e47 Summary (continued) The /etc/sysconfig/network-scripts directory contains the configuration for NIC and PPP interfaces The TCP/IP configuration of a network interface can be specified manually or obtained automatically from a DHCP or BOOTP server Host names are used to easily identify computers on a network; host names that follow the DNS are FQDNs

Linux+ Guide to Linux Certification, 2e48 Summary (continued) Host names must be resolved to an IP address before network communication can take place Files, applications, and can be accessed across the network with the appropriate network utility