1 Linux Networking ITEC 370 George Vaughan Franklin University.

Slides:



Advertisements
Similar presentations
Taekyung Kim 0x410 ~ 0x International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international.
Advertisements

6 UNIX Network Utilities Mauro Jaskelioff. Introduction Overview of computer networks Network related utilities –Accessing a remote computer –Transferring.
Linux network troubleshooting If your network connection is not working..
Netprog: daemons and inetd1 Daemons & inetd Refs: Chapter 13.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Network Management And Debugging
Network Debugging Organizational Communications and Technologies Prithvi Rao H. John Heinz III School of Public Policy and Management Carnegie Mellon University.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 10.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
Chapter Overview TCP/IP Protocols IP Addressing.
Linux Networking Commands
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Telnet/SSH: Connecting to Hosts Internet Technology1.
Process-to-Process Delivery:
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Chapter 10 – UNIX. History In late 1960s, two employees of Bell Labs (Ken Thompson & Dennis Ritchie) designed a new operating system to overcome the constraints.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
HALP! Something is in my tubes! Part I by Jason Testart, IST.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Mid 1960 ’ s - Multics - proposed by AT&T, Honeywell, GE & MIT; funded by DARPA Thompson & Ritchie create Unix 1978 to 84 - Bill Joy & Chuck Haley.
1 ELEN602 Lecture 2 Review of Last Lecture Layering.
1 Linux Basics for Networking. 2 Module - Linux Basics for Networking ♦ Overview This module focuses on the basics of networking using Redhat Enterprise.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
Network Services CSCI N321 – System and Network Administration Copyright © 2000, 2007 by Scott Orr and the Trustees of Indiana University.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
1 Network Administration ITA3564 Leung Hung
Networking Colin Alworth May 26, Quick Review IP address: four octets Broadcast addresses –IP addresses use all 1’s for the host bits, and whatever.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
NETWORKING IN LINUX. WHAT IS LINUX..? Freely implemention of UNIX-like Kernel. Free & Open source Software. Developed by Linus Torvalds in 1991.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
ITEC 370 George Vaughan Franklin University
1 Internet Tool Practice 한두균 송정환
1 itec 400 Perl CGI George Vaughan Franklin University.
New SA Training Topic 6: Service Management Our organization takes advantage of many service type to provide functionality to users and ease management.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Berkeley R Utilities & the new S Utilities The Unix (or Berkeley) r utilities provide an alternative to IP facilities telnet and ftp. Three programs: rlogin.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Data Communications and Networks
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
BNL PDN Enhancements. Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
Linux Operations and Administration Chapter Eight Network Communications.
中華技術學院 Linux 課程 中華技術學院 Linux 課程 Chap one : Service Control 王俊城RHCE/RHCX.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
Fall 2011 Nassau Community College ITE153 – Operating Systems 1 Session 9 Networking & Operating Systems (part 2)
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
UDP. User Datagram Protocol (UDP)  Unreliable and unordered datagram service  Adds multiplexing  No flow control  Endpoints identified by ports 
Introduction to unix. The UNIX Operating System An operating system "OS” is a set of programs that controls a computer. It controls both the hardware.
Chapter 11 User Datagram Protocol
The Transport Layer Implementation Services Functions Protocols
Level 2 Diploma Unit 10 Setting up an IT Network
LINUX ADMINISTRATION
Unit 4: Transport protocols
LINUX ADMINISTRATION 1
Understand the OSI Model Part 2
Network Services CSCI N321 – System and Network Administration
Securing Network Services
Process-to-Process Delivery:
Network Services.
Daemons & inetd Refs: Chapter 12.
Presentation transcript:

1 Linux Networking ITEC 370 George Vaughan Franklin University

2 TCP/IP and OSI Models

3 Origins of Unix In the early 1960's, MIT experimented with Time sharing systems: CTSS and MAC. This developed into the Multics project. –Funded by ARPA (ARPA also funded the creation of the Internet, originally known as ARPANET). –Project included MIT, GE and Bell Labs (Included Dennis Ritchie and Ken Thompson from Bell Labs). –Bell Labs withdrew in 1969.

4 Origins of Unix Ken Thompson wrote a game called 'Space Travel' but it was expensive to run on a Mainframe. Thompson found an old PDP-7 with inadequate OS. Thompson and Ritchie wrote the precursor to UNIX in assembly language.

5 Origins of Unix Thompson and Ritchie wanted a portable OS for programmers. Ritchie developed the language C as mid-level language to implement UNIX. This was very important because: –It allowed UNIX to be portable. –It made it much easier to maintain/modify UNIX Portability allowed UNIX to spread to other platforms very quickly.

6 Origins of Unix Bell Labs was part of AT&T. AT&T was a legal telecommunications monopoly and was not allowed to sell computers or software. AT&T licensed UNIX source to Universities which made their own modifications and variations (specifically Berkley). After divestiture of AT&T in 1984, AT&T commercializes UNIX. Many commercial variants exist, including SUN Solaris, HP-UX, IBM AIX, Compaq TRUE64, etc. Source NOT available.

7 Where did GNU and Linux Come From? In the mid 80's, Richard Stallman, a researcher at MIT, felt it was morally wrong that companies would not share source code. Stallman created the Free Software Foundation (FSF) with the goal a creating a free OS, called GNU (GNU stands for 'GNU is Not Unix'). –see: In the late 1980's, Stallman wins the McArthur Genious Award ($300K) and uses the money to support the GNU effort.

8 Where did GNU and Linux Come From? GNU project decided to work on OS tools first (gcc, gdb, gnu make, gzip, etc) and the Kernel last. In the early 1990's, Linus Torvalds wants source to Minix and is turned away. Torvalds creates a UNIX compliant Kernel and encourages other over the internet to help him. In the mid 1990s complete, free, UNIX compliant OS's were created by merging GNU tools with Linux. This is what Redhat, Fedora, Knoppix, Debian, Mandrake, Suse, Knoppix, etc. have done. GNU still working on its own Kernel (GNU HURD)

9 Where did GNU and Linux Come From? In a strict sense, Linux refers to the kernel. The kernel is a single executable file. In Fedora Core 6.0, the kernel is: –located at /boot/vmlinuz –based on version 2.4 –approximately 1.7 Mbytes in size (small)

10 What is the IP Address of My Machine? ifconfig command ifconfig displays the status of the currently active network interfaces. 1. > ifconfig 2. eth0 Link encap:Ethernet HWaddr 00:A0:CC:3B:0E:53 3. inet addr: Bcast: Mask: inet6 addr: fe80::2a0:ccff:fe3b:e53/64 Scope:Link 5. UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 6. RX packets:136 errors:1 dropped:0 overruns:0 frame:0 7. TX packets:171 errors:0 dropped:0 overruns:0 carrier:0 8. collisions:0 txqueuelen: RX bytes:14102 (13.7 KiB) TX bytes:18945 (18.5 KiB) 10. Interrupt:5 Base address:0xef00

11 What is the IP Address of a Remote Machine? nslookup command (also in Windows) –A program to query Internet domain name servers Example: > nslookup einstein.franklin.edu 1. Server: Address: #53 3. Non-authoritative answer: 4. Name: einstein.franklin.edu 5. Address:

12 Is the Remote Machine Alive? Example of ping command: (also in Windows) 1. > ping PING ( ) 56(84) bytes of data bytes from : icmp_seq=1 ttl=248 time=16.5 ms bytes from : icmp_seq=2 ttl=248 time=13.0 ms bytes from : icmp_seq=3 ttl=248 time=11.7 ms bytes from : icmp_seq=4 ttl=248 time=14.9 ms bytes from : icmp_seq=5 ttl=248 time=12.2 ms ping statistics packets transmitted, 5 received, 0% packet loss, time 4000ms 10. rtt min/avg/max/mdev = /13.687/16.518/1.794 ms

13 /etc/hosts /etc/host file: –Text file that associates IP addresses with hostnames (aliases). /etc/hosts on Einstein 1. # Do not remove the following line, or various programs 2. # that require network functionality will fail localhost.localdomain localhost qwprlx17 qwprlx17.students.qw.franklin.edu qwprwi04

14 /etc/protocols A text file that maps protocol names with protocol numbers used as IDs in the IP layer. Example from Einstein (very small subset): 1. ip 0 IP # internet protocol, pseudo protocol number 2. icmp 1 ICMP # internet control message protocol 3. tcp 6 TCP # transmission control protocol 4. udp 17 UDP # user datagram protocol 5. gre 47 GRE # Generic Routing Encapsulation 6. ipv6-crypt 50 IPv6-Crypt # Encryption Header for IPv6 7. ipv6-icmp 58 IPv6-ICMP # ICMP for IPv6

15 /etc/services A text file providing that maps the following: –Human friendly textual names for internet services –Assigned port numbers –Protocol types Port assignments made by IANA –See Example from Einstein: 1. # service-name port/protocol [aliases...] [# comment] 2. tcpmux 1/tcp # TCP port service multiplexer 3. rje 5/tcp # Remote Job Entry 4. echo 7/tcp 5. systat 11/tcp users 6. daytime 13/tcp 7. ftp 21/tcp 8. ssh 22/tcp # SSH Remote Login Protocol 9. telnet 23/tcp

16 inetd Historically, each network service is supported by its own daemon process or processes. A telnet daemon would support the telnet service, the ftp daemon would support the ftp process, etc. Many daemons are running, often not being used. Each service had to worry about security from the point of connection

17 inetd inetd (precursor to xinetd) was created to address the issue of the abundance of network service daemons. inetd was designed to listen on ports for network service requests. when a request arrived at a port, inetd would fork the appropriate process (ftp, telnet, etc) to service the request. Therefore services like ftp, telnet, etc were no longer daemons - they are now transient processes. Inetd is sometimes referred to as a ‘Super Server’.

18 /etc/inetd.conf (inetd, n.d.) File format: service type protocol wait user server cmdline service –Gives the service name. –The service name has to be translated to a port number by looking it up in the /etc/services file. type –Specifies a socket type stream (for connection-oriented protocols) dgram (for datagram protocols).

19 /etc/inetd.conf (inetd, n.d.) protocol –Names the transport protocol used by the service. –Must be a valid protocol name found in the /etc/protocols wait –This option applies only to dgram sockets. –It can be either wait or nowait. –If wait is specified, inetd executes only one server for the specified port at any time. –Otherwise, it immediately continues to listen on the port after executing the server.

20 /etc/inetd.conf (inetd, n.d.) user –This is the login ID of the user who will own the process when it is executing. server –Gives the full pathname of the server program to be executed. cmdline –This is the command line to be passed to the server. –This field is empty for internal services.

21 /etc/inetd.conf (inetd, n.d.) Sample File (Subset) 1. # 2. # inetd services 3. # 4. ftp stream tcp nowait root /usr/sbin/ftpd 5. login stream tcp nowait root /usr/sbin/rlogind 6. # 7. # inetd internal services 8. # 9. time stream tcp nowait root internal 10. time dgram udp nowait root internal 11. echo stream tcp nowait root internal 12. echo dgram udp nowait root internal

22 xinetd xinetd stands for eXtended InterNET services Daemon. Created by Panos Tsirigotis at the University of Colorado. More secure than inetd - designed to prevent Denial of Service attacks. Can control access by: –address of remote host –time of access –name of remote host –domain of remote host xinetd is sometimes referred to as the “super-server”.

23 xinetd.conf 0001: # 0002: # Simple configuration file for xinetd 0003: # 0004: # Some defaults, and include /etc/xinetd.d/ 0005: 0006: defaults 0007: { 0008: instances = : log_type = SYSLOG authpriv 0010: log_on_success = HOST PID 0011: log_on_failure = HOST 0012: cps = : } 0014: 0015: includedir /etc/xinetd.d 0016: xinetd is the name of the daemon process. xinetd config file: /etc/xinetd.conf instances: max number of simultaneous servers for a given service cps: –first number is max connections per second –second number is number of seconds to wait before re-enabling service after cps has been exceeded.

24 xinetd.d In addition to having a config file for the xinetd daemon itself, each supported service (ftp, telnet, etc) has its own config file in /etc/xinetd.d xinetd.d]# ls amanda cups-lpd eklogin ipop3 pop3s services time amandaidx daytime finger klogin rexec sgi_fam time-udp amidxtape daytime-udp gssftp krb5-telnet rlogin swat chargen dbskkd-cdb imap kshell rsh talk chargen-udp echo imaps ktalk rsync telnet comsat echo-udp ipop2 ntalk servers tftp

25 xinetd.d Example: What follows is the configuration file for telnet: 0001: # default: on 0002: # description: The telnet server serves telnet sessions; it uses \ 0003: # unencrypted username/password pairs for authentication. 0004: service telnet 0005: { 0006: flags = REUSE 0007: socket_type = stream 0008: wait = no 0009: user = root 0010: server = /usr/sbin/in.telnetd 0011: log_on_failure += USERID 0012: disable = no 0013: } 0014:

26 SSHD SSHD - OpenSSH SSH daemon replaces rsh and rlogin forks a new sshd daemon for each new connection communication is encrypted used on einstein and can comes configured on RedHat 9.0

27 SSHD SSHD supports: –ssh similar to telnet client uses tool like putty (Windows), ssh (Linux/Unix) –secure ftp similar to ftp client uses tool like winscp2 (Windows), sftp (Linux, Unix)

28 Samba Open Source application that runs on Linux, Unix, etc. It allows Linux machine to appear like a Windows file server to Windows client machines It also allows Windows clients to make use of printing services on a Linux machine. Supports Server Message Block (SMB) Protocol. Windows client machines can mount Unix directories to their PCs (as added drives) Included in most Linux distributions.

29 NFS (NFS, n.d.) Network File System A protocol developed by SUN in 1984 Allows a remote filesystem to be mounted on a local computer. Originally implemented on top of UDP Newer versions implement NFS protocol on top of TCP for better WAN support.

30 References http:// 3 Inetd, n.d. The inetd Super Server. Retrieved on 02/20/ NFS, n.d. Network File System (Sun). Retrieved on 02/20/