ppt1 - UTRGV Faculty Web

Download Report

Transcript ppt1 - UTRGV Faculty Web

CSCI 6345
Computer Networks
Dr. John P. Abraham, Professor
Textbook


Required Textbook: Comer, Douglas E.,
Computer Networks and Internets, 6th Edition,
Prentice Hall, 2015.
ISBN-10: 0133587932 (ISBN-13: 9780133587937)
Website used



All assignments and study questions will be
posted at
http://faculty.utpa.edu/jabraham/schcurrent.ht
m
Also check the Blackboard
Multiple choice questions



Many of the multiple choice questions will be
taken from
Behrouz A. Forouzan, TCP/IP Protocol Suite,
4th Ed., McGraw Hill, 2010. ISBN 978-0-07337604-2
I will post the multiple choice questions.
Attendance


Attendance and class participation is required to
pass the course. If you must miss an exam,
make prior arrangements. No make-up exams
will be given unless you contact me in advance!
Late homework will be levied heavy penalties.
Penalty: One day late 10%, 1 week late 20%, 2
weeks late 50%. Not accepted afterwards.
Grading




60%
Group Project
15%
Labs, programming & student Ass 20%
Online multiple choice (groups of 4) 5
Midterm and Final Exams
Practical portion (lab)












Virtual Machine
Peer to Peer
RDP
Domain
Netadmin
Join the domain
Create Security groups
Grant local Admin rights
Packet analyzer
WSUS
Backup
IIS
Group Project


Individually each person should complete the
task assigned. We do not have enough time
to present for such a large class. Therefore,
you will be placed in a group for presentation
purposes.
Meet as a group to discuss what each person
will present.
Group Project 1


Internetworking with Linux and Windows
Install Linux and Windows Server in two
different computers. Authentication should
be through the use of Windows Active
Directory. Share files between the two.
Samba provides integration between
Windows and Linux.
Group Project 2


Router setup using CISCO IOS and
creating Virtual Local Area Networks.
Set up a CISCO router using IOS. There are
home-Cisco router that do not come with
IOS; please do not use those. Make sure
you can browse the internet and share files.
Group Project 3


Cyber Security and Forensics
Using Backtrack or latest software show how
forensic analysis is conducted. Using readily
available programs in the internet show how
a malware can be planted and show how an
attacker then can take control of the system
Group Project 4

Microsoft System monitoring and management

Demonstrate Task Manager and show what you can do with each of
the tabs (Applications, Processes, Services, Performance,
Networking and Users)
Demonstrate the use of Regedit and show how you can search and
delete items that cause problems.
Demonstrate the use of MSconfig and show you can modify each of
those.
Demonstrate the use of computer management and explain the use
of System tools (task scheduler, event viewer – please spend
considerable time here, local users and groups and device
manager), disk management and services and application
management. There may be some overlap with item #1 here.



Group Project 5


WINDOWS SERVER GROUP POLICY
Demonstrate how to administer group
policies. Group policy administrative tools
include Group Policy Editor for Active
Directory and Sysvol, server side snap-ins,
Group Policy Management Console,
Resultant Set of Policy. Explain these and
show examples of using each. Write some
group policies for internet search sites, new
program installation, etc. and demo them.
Group Project 6



VPN
Communication Servers
Check the syllabus for more information
Programming portion

Please refer to syllabus
Introduction to Computer Networks
Dr. John P. Abraham
INTRODUCTION TO COMPUTER
NETWORKS
What is covered in the course

Lecture Portion






Network Applications & Network programming
Data communications (low level details)
Packet switching and network technologies
Internetworking with TCP/IP
Other concepts such as interoperability standards,
protocol suites and layering models
Practical portion

Virtual Machine networking
Lecture material


Your textbook is a very basic book
Since network is constantly evolving I will
provide lots of notes from outside the
textbook. You should take good notes.
Exam questions will come from both. I will
point you to a set of multiple choice questions
and answers. I will take majority of questions
from that site.
Socket programming


All underlying network applications such as email,
ftp, web, etc. use underlying technologies and
programs
The goal of this course is not to teach you
programming. Students should write three socket
programs in a language of their choice
Data Communication

Technologies used to send data across
communication lines





Modulation
Digital to analog
Light
Multiplexing
Encryption
Circuit and Packet Switching and
networking technologies

Circuit switching



Evolved from telegraph and telephone technologies
Mechanical connections are replaced with electronic
switches
Packet switching – eliminated the need for a
dedicated circuit


Devices through out the network should have information
about how to reach the target destination
Takes into account speed, cost, distance and size of
packets
Internetworking with TCP/IP


Tolerance of heterogeneity of underlying
technologies.
The internet is formed by interconncecting
multiple packet-switching networks, as well
as public and private networks.
Introduction to Computer Networks
Computer Networks

Computer
network
connects two or more
autonomous computers.

The computers
geographically
anywhere.
can be
located
Introduction to Computer Networks
LAN, MAN & WAN
Network in small geographical Area (Room,
Building or a Campus) is called LAN (Local Area
Network)
Network in a City is call MAN (Metropolitan Area
Network)
Network spread geographically (Country or across
Globe) is called WAN (Wide Area Network)
Computer network architectures

the client server


all communication happens between the server and the client
only.
A client does not communicate directly with another client.



If a client wishes to share a file with another client, it must place the
file in a commonly shared area at the server.
In case of an application, the client makes the request and the
server processes the request and returns the result to the client.
the peer-to-peer


any node can act as a server as well as a client.
Only very limited security is available on a peer-to-peer
network.
Components used in a Computer
Network






Computers
Communication ports
Cables
Hubs or switches
Routers
The network software.
Computers in a Client/Server
architecture

Must be be robust





must be able to run for months or years without being shut down.
Must be fast enough to handle many requests from all the requests
from the clients.
Must have large fast hard drives to store information for all users.
Must have enough memory to cache all the directory information as
well as most used pages.
The computers must be reliable in case of power failures and
hardware failures:

sufficient redundancy must exist.
Example of Types of Servers







Fileserver
print server
database server
domain name server
communication server
DHCP server
Name Server
Communication ports


Network may be done through any
communication ports such as serial,
parallel, network cards, etc.
Most common Network Cards used
today are Ethernet and Token Ring.
Network Interface Card

Plug and play (PNP).


Open the computer, install the card, and insert the driver
disk.
Legacy cards:


the interrupt request line (IRQ), base memory address,
and the base I/O port must be manually set up on the card
by setting the jumpers or DIP switches, or through the use
of the manufacturer provided setup software.
Speed: 10 Megabits per second (Mbps), 100
Mbps (Fast Ethernet) or 1000 Mbps (Gigabit
Ethernet) depending on the card.
Connectors on NIC


The connector on most Ethernet cards today is the RJ45 having 8 pins.
Older Ethernet cards may have a Bayonet Nut
Connector (BNC), an Attachment Unit Interface (AUI),
and/or a RJ-45 connector. A jumper or switch will
specify the type of connector used.
Network Addresses

Every computer connected to a network should have two
unique identifying numbers, a physical address and an
Internet Protocol (IP) address.
 The physical address
 a 6 Byte number, is encoded on a ROM chip on the
Ethernet card at the time of manufacturing
 the IP address
 A 4 byte address

is used to send messages to the outside world. The
physical address.
 configured on each machine.
Hub/Switch





A Hub or switch connects cables from different nodes together. When
purchasing them the number of ports required and the speed of
transmission must be specified.
An active hub amplifies all signals received and sends the amplified
signals on all its ports.
Passive hubs are signal splitters and are used only in wiring panels.
Even though a little more expensive, a switch will provide faster
communication and great deal of diagnostic features.
Switches provide link management through physical address
identification.
Hubs/Switches



As the network grows, multiple switches or hubs can be connected with
each other using an uplink port or a direct connect cable.
Most modern switches have the auto-sensing feature, which will allow
any port to work as an uplink.
The best location for a switch or hub is a centrally located closet to
which cables from all computers are brought.
Network Cabling




Cabling is the most time consuming part of networking, particularly
when cables need to be hidden inside the walls.
For that reason it is advisable to have the cables installed or conduits
placed at the time of the building construction.
To hide wires inside existing buildings, a tape fish will be needed.
It may be well worth the time to investigate the wireless technology,
particularly when a small area is being networked.
Network cabling 2






Three types of cables are used today: coaxial, twisted pair, and fiberoptic.
Twisted pair cables either can be unshielded or shielded with a foil.
Unshielded twisted pair (UTP) cable can transmit 10 Megabits per
second and the shielded can transmit more than 100 Mbps, perhaps all
the way up to 1000 Mbps.
Wires in each pair are twisted to reduce cross-talk and minimize the
effect of external electromagnetic interference.
Twisted pair cables are categorized into five categories, from Cat 1 to
Cat 5, based on the bandwidth capabilities.
The maximum length of a segment is 100 meters.
Network Cabling 3




The UTP cable has 4 pairs of color-coded (orange, green, blue
and brown) wires.
The color of one of the wires in a pair will be solid and the other
will be striped with white.
Pins in the RJ-45 jack are numbered from 1 to 8.
When two computers are connected directly without the use of a
hub or a switch some wires need to be crossed (Transmit to
Receive). Such a cable is called a crossover cable. Crossover
cables need to be used when two hubs or switches that lack
uplink ports are connected together.
T-568A Straight-Through Ethernet
Cable
T-568B Straight-Through Ethernet
Cable
RJ-45 Crossover Ethernet Cable
Crossover cable
Network Protocols



7 layer OSI model
5 layer TCP/IP suite
There exists three TCP/IP network environment today, Novell
Networking, Microsoft Windows Networking, and the UNIX/LINUX
networking.
Network Operating Systems




The Novell Networking incorporates its original IPX/SPX protocol suite
as well as the TCP/IP protocol suite.
Windows and Unix operating systems include TCP/IP networking as
part of their operating system.
All versions of Windows provide the peer-to-peer networking
capabilities, while the NT, 2000 professional, and the XP professional
provide for Client/Server architecture.
The UNIX/LINUX has consistently adhered to the Client/Server
architecture.
Windows peer-to-peer networking



may use the TCP/IP protocol suite or some other simpler protocols such
as the NetBIOS and the NetBEUI.
The NetBIOS, an application program interface (API) extends the BIOS
to include the support for I/O calls over a network.
The NetBIOS Extnded User Interface (NetBEUI), developed by IBM and
Microsoft, is the protocol used by Windows Workgroup networking.
Windows peer-to-peer networking



NetBios is non-routable, therefore could not reach beyond the local
physical network.
It does not require an IP address, rather works with the name
registration within a workgroup.
In the newer Windows operating systems, the NetBEUI is encapsulated
inside the TCP/IP, referred to as NetBIOS over TCP/IP (NBT), and uses
the IP address.
Configuring the windows network





From the control panel’s, local area network, add a NIC if it does
not show up already. Insert the appropriate driver software.
Next Choose the protocols to be bound to the network card,
NetBios, TCP/IP, IPX/SPX, Appletalk, etc.
Set up the properties for the protocol you chose. For example, for
the TCP/IP, you will asked to either obtain the addresses
automatically or type in the IP Address, mask, default gateway, and
DNS. The default gateway is the address of the host through which
internetworks can be reached (a router or a computer that shares
Internet). DNS is the server that provides the IP address given a
domain name.
Install the client services and give your computer a name and a
group.
Finally, you may want to share your resources.
Introduction to Computer Networks
Applications of Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
See next slide
Application of network 2
Remote computing
Virtualization (see future slides)
Supercomputing - used
for highly calculation-intensive
tasks in quantum physics, genetics, weather
modeling, etc.
Distributed processing – A program running on top of a
network that distributes the job.
GRID Computing – very similar to distributed. A middleware
is used to manage all the computers in the system (see next
slide).
Cloud computing (see future slide)
Grid computing



Multiple independent computing clusters
which act like a “grid” because they are
composed of resource nodes not located
within a single administrative domain.
Offering online computation or storage
(like electricity sale).
The creation of a “virtual supercomputer”
by using spare computing resources
within an organization
Virtualization
the act of decoupling one computing resource
from others without impacting the usability
across these resources.
User state virtualization
Application virtualization.
Client-Hosted Desktop virtualization
Server-based Desktop virtualization
Application Virtualization
User state virtualization.


separates the user data and settings from
any PC and enables IT to store them
centrally (i.e., in the datacenter) while also
making them accessible on any PC. It also
simplifies the central backup of user data
since data is already stored centrally on
servers.
http://technet.microsoft.com/enus/windows/ff629664
Application virtualization




Only need to install once. Can run it from any
machine. Isolates applications from each other and
solves application to application compatibility issues
by allowing applications to run together even though
they may require the same resources from the OS
Application virtualization allows IT to store the
application centrally and stream the application to a
desktop based on user access.
http://www.youtube.com/watch?v=kSa9VBYyyk4
http://www.installfree.com/beta-signup
Client-Hosted Desktop Virtualization.



technology (such as Microsoft® Virtual PC or
Sun xVM Virtual Box ) that separates
the operating system from the physical
hardware and allows a single PC to run
virtual machines side by side with the host
OS.
http://www.microsoft.com/virtualization/assets
/media/chv/local/index.htm
http://www.youtube.com/watch?v=0Y2eClEy7
jU
Server-Based Desktop Virtualization:

Allows the execution of an environment at one place and
presentation of that environment or user interface at a different
location. These technologies usually use remote desktop
protocols, such as RDP, to decouple the user interface location
from the execution environment location. Remote execution
enables organizations to use older PCs as “thin clients,” giving
users the benefit of newer applications and versions of Windows
while helping save the environment by avoiding the dumping of
electronics into landfills.

http://www.cio.com/article/504348/Desktop_Virtualizati
on_5_Most_Popular_Flavors_Explained
Cloud Computing





is location independent computing
shared servers provide resources, software, and data to
computers.
computing is moved away from personal computers or an
individual application server to a “cloud” of computers.
Users of the cloud only need to be concerned with the computing
service being asked for, as the underlying details of how it is
achieved are hidden. This method of distributed computing is
done through pooling all computer resources together and being
managed by software rather than a human.
http://www.microsoft.com/en-us/server-cloud/new.aspx
Introduction to Computer Networks
Network Topology
The network topology
defines the way in which
computers, printers, and
other
devices
are
connected. A network
topology describes the
layout of the wire and
devices as well as the
paths used by data
transmissions.
Introduction to Computer Networks
Bus Topology
Commonly referred to as
a linear bus, all the
devices
on
a
bus
topology are connected
by one single cable.
Introduction to Computer Networks
Star & Tree Topology
The star topology is the most
commonly used architecture in
Ethernet LANs.
When installed, the star topology
resembles spokes in a bicycle
wheel.
Larger networks use the extended
star topology also called tree
topology. When used with network
devices that filter frames or
packets, like bridges, switches, and
routers, this topology significantly
reduces the traffic on the wires by
sending packets only to the wires of
the destination host.
Introduction to Computer Networks
Ring Topology
A frame travels around the ring,
stopping at each node. If a node wants
to transmit data, it adds the data as
well as the destination address to the
frame.
The frame then continues around the
ring until it finds the destination node,
which takes the data out of the frame.
Single ring – All the devices on the
network share a single cable
Dual ring – The dual ring topology
allows data to be sent in both
directions.
Introduction to Computer Networks
Mesh Topology
The
mesh
topology
connects
all
devices
(nodes) to each other for
redundancy and fault
tolerance.
It is used in WANs to
interconnect LANs and
for
mission
critical
networks like those used
by banks and financial
institutions.
Implementing the mesh
topology is expensive
and difficult.
Introduction to Computer Networks
Applications
E-mail
Searchable Data (Web Sites)
E-Commerce
News Groups
Internet Telephony (VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio