Transcript Document
Network+
© 2001 ComputerPREP, Inc. All rights reserved.
Lesson 1:
Overview of the Internet
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
•
•
•
•
•
•
•
•
•
Trace the evolution of the Internet
Define TCP/IP and explain how it is used
Describe the client/server model
Describe push and pull technology
List criteria for selecting an ISP
Identify and describe Internet protocols
Explain domain names and virtual domains
Discuss the ICANN and the InterNIC
Outline the current structure of the Internet
Evolution
of the Internet
•
•
•
•
•
Advanced Research Projects Agency
Advanced Research Projects Agency Network
National Science Foundation
The World Wide Web
Hypertext Markup Language
How the
Internet Works
• TCP/IP
– Routers
– Packets
• IP addresses
– IPv6
• Internet Service Providers
Client/Server
Model on the Internet
•
•
•
•
•
Client
Server
Network
Bandwidth
Pull and push technology
– Channel Definition Format
Connecting
to the Internet
• Popular ISPs
• Connection types
– Dial-up
• SLIP
• PPP
– Direct
• LAN
• Cable
• DSL
Internet
Protocols
• HTTP
• FTP
• E-mail
– POP
– SMTP
– IMAP
• Telnet
• Newsgroups
– NNTP
• Gopher
Domain
Name System
•
•
•
•
Learning to read domains
Domain name syntax
FQDN
Top-level domains
Typical
Domain Name
The Business
of Domain Names
• ICANN
• Original domain name registration
– .com
– .net
– .org
• InterNIC
• International domain name registration
• Virtual domain
Uniform
Resource Locators
•
•
•
•
Web page URL
FTP URL
Gopher URL
E-mail and newsgroup URLs
Intranets
and Extranets
• Intranets
– Internal, or in-house, Web sites used by
employees within a company
• Extranets
– Web sites provided specifically for existing
customers of a company
Summary
Trace the evolution of the Internet
Define TCP/IP and explain how it is used
Describe the client/server model
Describe push and pull technology
List criteria for selecting an ISP
Identify and describe Internet protocols
Explain domain names and virtual domains
Discuss the ICANN and the InterNIC
Outline the current structure of the Internet
Lesson 2:
Introduction
to Networking
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Define "networking," and explain this concept's
importance in today's data communications
marketplace
• Relate internetworks to the concept of the
corporate enterprise network
• Identify and describe the function of servers,
workstations and hosts
Objectives (cont'd)
• Identify network architectures, and provide at least
two defining characteristics of each
• Describe the basic network topology
characteristics
• Identify the major operating systems and their
respective clients
Networking Evolution
• Client/server model versus large, centralized
computer model
• Shift to Web-based, decentralized and more
affordable networking
Mainframes
• Mainframe (or centralized) computing provided the
first practical networking solution
– Centralized model used central servers (or
mainframes) and remote terminals
Mainframe Model
Mainframe
Terminal
Terminal
Terminal
Terminal
Client/Server Model
Client
Server
Client/Server
Advantages
•
•
•
•
Provides shared task processing
Provides modular approach to computing
Provides scalability
Allows for greater user control over files
Web-based
Networking
• Advantages
– Combines the power of mainframe computing
with the scalability of the client/server model
– Allows users to obtain information without
specialized software
Networking
Categories
• Peer-to-peer networks
• Server-based networks
• Enterprise networks
Peer-to-Peer Network
Workstation Workstation Workstation Workstation
Server-based Network
Client
Client
Client
Server
Network Topologies
•
•
•
•
•
Bus
Star
Ring
Hybrid
Mesh
Bus Topology
Star Topology
Server
Client
Ring Topology
Server
Client
Star Bus Network
Centralized Hub
Bus Trunk
Server
Client
Mesh Topology
Server
Client
Network
Operating Systems
• Novell NetWare
– NetWare clients
• Microsoft Windows NT and Windows 2000
– Windows NT 4.0/2000 Server clients
• UNIX
– UNIX clients
Summary
Define "networking," and explain this concept's
importance in today's data communications
marketplace
Relate internetworks to the concept of the
corporate enterprise network
Identify and describe the function of servers,
workstations and hosts
Summary (cont'd)
Identify network architectures, and provide at least
two defining characteristics of each
Describe the basic network topology
characteristics
Identify the major operating systems and their
respective clients
Lesson 3:
Networking Protocols
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Discuss the OSI/RM and its layers
• Explain packets and describe packet creation
• Differentiate between protocols at the network,
transport and application layers of the OSI/RM
• Identify key internetworking protocols and explain
the need for multiprotocol networks
Objectives (cont'd)
• Compare, contrast and discuss the functions of
network protocols
• Bind protocols to a NIC
• Identify the directory services for Windows NT,
Windows 2000, UNIX and NetWare
• Explain the functions of X.500 and LDAP
OSI/RM
•
•
•
•
•
•
•
Application
Presentation
Session
Transport
Network
Data link
Physical
OSI Model Layers
Packets
• Consists of three elements
– A header
– The actual data
– A trailer
Packet Structure
Application, Transport
and Network Protocols
Application-Layer
Protocols
•
•
•
•
•
SMTP
BOOTP
FTP
HTTP
AFP
•
•
•
•
•
SNMP
SMB
X.500
NCP
NFS
Transport-Layer
Protocols
•
•
•
•
•
TCP
SPX
NWLink
ATP
NetBEUI
Network Protocols
•
•
•
•
IP
IPX
NWLink
DDP
• NetBEUI
• X.25
• Ethernet
Major
Networking Protocols
•
•
•
•
•
•
TCP/IP
IPX/SPX
NetBEUI
AppleTalk
DLC
SNA
Stateful vs. Stateless
• Stateful
– Connection-oriented
• Stateless
– Connectionless
Choosing and
Combining Protocols
• Combining protocols
– Multiple protocols can increase maintenance
and troubleshooting time for a network
• Binding protocols
– Binding order determines which protocol the
system will use to send information first
Directory Services
•
•
•
•
•
Windows NT/2000
UNIX Network Information Services
Novell NDS
X.500
LDAP
Summary
Discuss the OSI/RM and its layers
Explain packets and describe packet creation
Differentiate between protocols at the network,
transport and application layers of the OSI/RM
Identify key internetworking protocols and explain
the need for multiprotocol networks
Summary (cont'd)
Compare, contrast and discuss the functions of
network protocols
Bind protocols to a NIC
Identify the directory services for Windows NT,
Windows 2000, UNIX and NetWare
Explain the functions of X.500 and LDAP
Lesson 3:
Network Devices
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Describe the basic attributes, purposes and
functions of LANs and WANs
• Identify and describe the function of NAPs
• Compare and contrast backbones and segments
• Identify network devices such as NICs, repeaters,
hubs, bridges, routers, brouters, switches,
gateways, CSUs/DSUs and patch panels
Objectives (cont'd)
• Recognize and describe common peripheral ports
• Identify the differences among common cable and
wireless types used in networking
• Describe the advantages and disadvantages of
coaxial, Category 3, Category 5, fiber optic, UTP
and STP cable
• Identify environmental factors that can affect
network performance
Local Area Networks
Novell
Server
IPX/SPX
Legacy
Host
SNA
Router
Hub
Node
NT
Server
TCP/IP
Wide Area Networks
Network Access Points
New York
Backbone
Atlanta
Boston
Chicago
Phoenix
Backbone
Seattle
San
Francisco
Common
Network Componentry
•
•
•
•
•
NICs
Repeaters
Hubs
Bridges
Routers
•
•
•
•
•
Brouters
Switches
Gateways
CSUs/DSUs
Patch panels
Networking Devices
Switch
Hub
Hub
NIC card
NIC card
NIC card
NIC card
Repeater
Repeater
Bridge
Bridge
Network
Segment
1
Network
Segment
2
Router
Router
Network
1
Network
2
Gateway
Network running
TCP/IP
Network running
IPX/SPX
Gateway
(Protocol Conv erter)
CSU/DSU
Telecom
Network
CSU/DSU
Router
Network
Patch Panel
CSU/DSU
Internet or other
WAN
Router
Wall Jack
Patch Panel
Wall Jack
Patch
Cord
Hub
Company President
Accounting 1
Accounting 2
Common
Peripheral Ports
•
•
•
•
•
•
Serial ports
Universal Serial Bus (USB)
FireWire
Parallel ports
PS/2 connectors
Small Computer System Interface (SCSI)
Transmission Media
• Twisted pair cable
– RJ-45 connectors
• Coaxial cable
– Thicknet
– Thinnet
– BNC connector
• Fiber optic cable
• Wireless media
Environmental Factors
• Room conditions
• Placement of building contents and personal
possessions
• Computer equipment
Summary
Describe the basic attributes, purposes and
functions of LANs and WANs
Identify and describe the function of NAPs
Compare and contrast backbones and segments
Identify network devices such as NICs, repeaters,
hubs, bridges, routers, brouters, switches,
gateways, CSUs/DSUs and patch panels
Summary (cont'd)
Recognize and describe common peripheral ports
Identify the differences among common cable and
wireless types used in networking
Describe the advantages and disadvantages of
coaxial, Category 3, Category 5, fiber optic, UTP
and STP cable
Identify environmental factors that can affect
network performance
Lesson 5:
Connecting
Your Network
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Define basic data transmission concepts
• Identify the IEEE 802 LAN standards
• Describe the access methods, wiring standards,
and devices used with the IEEE 802 LAN
technologies
• Define the length and speed of various types of
networking media
• Describe when coaxial, Category 3 and 5, fiber
optic, UTP and STP are appropriate
Objectives (cont'd)
• Identify the characteristics of MAC addresses
• Describe the access methods, transmission
media, and devices used with Apple LocalTalk and
FDDI
• Demonstrate knowledge of how a NIC is
configured
• Identify WAN protocols
• Define the T1 and T3 standards
Transmission Types
•
•
•
•
•
Asynchronous
Synchronous
Data transmission flow
Baseband and broadband
Logical and physical topologies
IEEE LAN
Standards
•
•
•
•
•
•
IEEE 802.2
Ethernet/IEEE 802.3
IEEE 802.3u—fast ethernet
IEEE 802.3z and 802.3ab—gigabit ethernet
IEEE 802.5—token ring
IEEE 802.12—VG-AnyLAN
LAN Standards
and the OSI/RM
LAN
Standards
OSI/RM
Layer
802.2
Data Link
Layer
Ethernet
Physical
Layer
802.3
802.3u
802.3z
802.3ab
802.5
802.12
FDDI
LLC and MAC Sublayers
Defined in IEEE 802.2
Data Link
Layer
Physical
Layer
Logical Link Control (LLC)
Media Access Control (MAC)
MAC Address
Components
00 – 80 – 5F – EA – C6 – 10
Vendor Code
Interface Serial Number
Token Ring
Network with MAU
Server
Multistation
Access
Unit
Client
Additional
LAN Standards
• Apple LocalTalk
• Fiber Distributed Data Interface
FDDI Standard
Server
Data
Flow
Data
Flow
Client
Configuring Your
Network Interface Card
• Identifying the manufacturer and product name
• Determining the physical address
Interrupt Requests (IRQ),
I/O Address, and DMA
•
•
•
•
•
IRQ lines
I/O address
Transceiver
Direct Memory Access
EPROM, EEPROM and flash memory
WAN Methods
• X.25
• Fast packet switching
– Frame relay
– Asynchronous transfer mode
Frame-Relay
Packet Switching
PVCs
Corporation
Ports
T-Carrier Services
• T1
• T2
• T3
Summary
Define basic data transmission concepts
Identify the IEEE 802 LAN standards
Describe the access methods, wiring standards,
and devices used with the IEEE 802 LAN
technologies
Define the length and speed of various types of
networking media
Describe when coaxial, Category 3 and 5, fiber
optic, UTP and STP are appropriate
Summary (cont'd)
Identify the characteristics of MAC addresses
Describe the access methods, transmission
media, and devices used with Apple LocalTalk and
FDDI
Demonstrate knowledge of how a NIC is
configured
Identify WAN protocols
Define the T1 and T3 standards
Lesson 6:
TCP/IP Architecture
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Explain TCP/IP's importance in a heterogeneous
environment
• Define and describe the Internet architecture
model
• Identify the nature, purpose and operation
essentials of TCP/IP
• Describe various TCP/IP protocols
• Describe port numbers and their functions
• Find and download RFC documents
The Internet
Architecture
Application Layer
Transport Layer
Internet Layer
Network Access Layer
Requests
for Comments
• Protocol states
• Internet Standards
• Reference RFCs
Internet Protocols
•
•
•
•
•
•
•
•
•
HTTP
FTP
Telnet
NNTP
Gopher
SMTP
SNMP
DNS
RARP
•
•
•
•
•
•
•
•
•
BOOTP
DHCP
TCP
UDP
ICMP
ARP
IP
IGMP
Media
De-multiplexing
Telnet
FTP
TFTP
TCP
SNMP
UDP
IGMP
ICMP
IP
RARP
ARP
ETHERNET
Port Numbers
Port Number Range
Description
1 to 1023
Well-known (reserved)
port numbers
1024 to 65535
Registered port numbers
Summary
Explain TCP/IP's importance in a heterogeneous
environment
Define and describe the Internet architecture
model
Identify the nature, purpose and operation
essentials of TCP/IP
Describe various TCP/IP protocols
Describe port numbers and their functions
Find and download RFC documents
Lesson 7:
Internet Addressing
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Explain IP addressing and the concept of
uniqueness
• Define IP address classes used on the Internet
• Determine reserved IP addressing
• Explain the use of private addresses in intranet
design
• Determine the IP address class and whether the
address is valid
Objectives (cont'd)
• Determine default subnet masks and use the
ANDing process
• Calculate custom subnet masks and CIDR notation
using supernetting techniques
• Describe the function of proxy servers and the
Internet Protocol version 6
• Identify the normal configuration parameters for a
workstation
Internet
Addressing
• Internet addresses are divided into the following
parts:
– Network
– Host
• Four fields separated by periods are a common
notation for specifying addresses:
– field1.field2.field3.field4
IP Address Fields
• Contain 8 bits per field
• Range from 0 to 255 decimal
1 = On
0 = Off
field1.field2.field3.field4
1
1
1
1
1
1
1
1
=
8
128
64
32
16
8
4
2
1
=
255
Internet
Address Classes
•
•
•
•
•
Class A
Class B
Class C
Class D
Class E
IP Addressing Rules
•
•
•
•
Loopback address
Broadcast addresses
Network and special-case source addresses
Reserved IP addressing
Subnetworks
• Subnet masks
• ANDing
• Custom subnet masks
IP Address
Conservation
• Proxy servers
• CIDR
• Internet Protocol version 6
Normal TCP/IP
Configuration Parameters
• Basic configurations
• Name resolution configurations
Summary
Explain IP addressing and the concept of
uniqueness
Define IP address classes used on the Internet
Determine reserved IP addressing
Explain the use of private addresses in intranet
design
Determine the IP address class and whether the
address is valid
Summary (cont'd)
Determine default subnet masks and use the
ANDing process
Calculate custom subnet masks and CIDR notation
using supernetting techniques
Describe the function of proxy servers and the
Internet Protocol version 6
Identify the normal configuration parameters for a
workstation
Lesson 8:
Routing
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Explain the difference between direct and indirect
routing, and determine whether a route is direct or
indirect
• Describe the routing process and explain the
function of routing information tables
• Compare static routing with dynamic routing, and
manually configure a static routing table
• Explain the difference between interior and
exterior routing protocols
Objectives (cont'd)
•
•
•
•
Compare and contrast RIP with OSPF
Compare and contrast IPX, NLSP, SAP and OSPF
Identify the EGP and the BGPv4
Describe distance-vector, link-state, and pathvector protocols
• Describe CIDR
Introduction
to Routing
• Direct routing
• Indirect routing
– The tracert command
Routing Process
• Routing information tables are databases
maintained by a router
Static vs.
Dynamic Routing
• The route command
• The ping command
Routing
and Packets
• Routing does not change the original packet
– Source and destination addresses (such as IP
and IPX addresses) stay the same
Routing Protocols
• Interior routing protocols are used within an
organization's network
– Examples include RIP and OSPF
• Exterior routing protocols are used outside an
organization's network
– Examples include EGP and BGP
Routing
Information Protocol
• How RIP works
• Disadvantages of RIP
• SAP and RIP
Open Shortest Path First
• Allows rapid convergence and reduces network
traffic
• Eliminates the count-to-infinity problem
• Supports variable length subnetting
Exterior
Gateway Protocol
• A path-vector protocol (spans multiple
autonomous systems)
– Provides routing table information between the
Internet's backbone routers, and between the
backbone routers and the domain router(s)
chosen by an organization to act as exterior
gateways
Border
Gateway Protocol
• BGPv4
– Supports the routing table aggregation
procedures demanded by CIDR
Summary
Explain the difference between direct and indirect
routing, and determine whether a route is direct or
indirect
Describe the routing process and explain the
function of routing information tables
Compare static routing with dynamic routing, and
manually configure a static routing table
Explain the difference between interior and
exterior routing protocols
Summary (cont'd)
Compare and contrast RIP with OSPF
Compare and contrast IPX, NLSP, SAP and OSPF
Identify the EGP and the BGPv4
Describe distance-vector, link-state, and pathvector protocols
Describe CIDR
Lesson 9:
TCP/IP Utilities
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Describe the protocol and services files, and
explain their usefulness to the network
• Describe ICMP concepts and message types
• Identify the functions of commands that can assist
general network troubleshooting
• Identify the functions of commands that can assist
name and address troubleshooting
Useful Network Files
• The services file
• The protocol file
Internet Control
Message Protocol
• Source-quench error messages
• Echo-request and echo-reply query messages
General
Network Commands
•
•
•
•
•
ping
tracert
netstat
ftp
telnet
Name and
Address Commands
•
•
•
•
•
•
ipconfig
winipcfg
arp
nslookup
hostname
nbtstat
Resolving IP Addresses
to Ethernet Addresses
IP address (32-bit)
Ethernet address (48-bit)
Summary
Describe the protocol and services files, and
explain their usefulness to the network
Describe ICMP concepts and message types
Identify the functions of commands that can assist
general network troubleshooting
Identify the functions of commands that can assist
name and address troubleshooting
Lesson 10:
Internetworking Servers
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• List the essential functions of internetworking
servers
• Identify and describe the functions and features of
file and print, HTTP, proxy, mail, mailing list, media,
DNS, FTP, news, certificate, directory, catalog and
transaction servers
• Describe how each Internetworking server type
uses different TCP/IP protocols
Objectives (cont'd)
• Describe the term daemon and identify the
function of the Internet-related daemons named,
inetd and telnetd
• Define server selection criteria
• Identify specific business needs and choose the
server that meets those needs
• Describe benefits and drawbacks of specific
servers
• Differentiate between server suites
Internetworking Servers
•
•
•
•
•
•
•
File and print
HTTP
Proxy
Mail
Mailing list
Media
DNS
•
•
•
•
•
•
FTP
News
Certificate
Directory
Catalog
Transaction
The Internet
Daemon: inetd
• smtp: the SMTP daemon
• tftd: the Trivial File Transport daemon
• telnetd: the Telnet daemon
Choosing the
Ideal Server
• Typical Internet server functions include:
– Generating company recognition
– Processing orders
– Processing payments
– Providing service and support
– Creating long-distance communities
– Ensuring security
Determining Company
Needs and Abilities
• Internet versus intranet solutions
• Which server type does the company need?
• Proprietary elements
Product Advantages
and Disadvantages
•
•
•
•
Product support
Product testing
Simplicity of use
Scalability
Popular
Server Products
•
•
•
•
•
Apache Web server
Microsoft Internet Information Server
Lotus Domino series
Netscape servers
Novell Web Server
Summary
List the essential functions of internetworking
servers
Identify and describe the functions and features of
file and print, HTTP, proxy, mail, mailing list, media,
DNS, FTP, news, certificate, directory, catalog and
transaction servers
Describe how each Internetworking server type
uses different TCP/IP protocols
Summary (cont'd)
Describe the term daemon and identify the
function of the Internet-related daemons named,
inetd and telnetd
Define server selection criteria
Identify specific business needs and choose the
server that meets those needs
Describe benefits and drawbacks of specific
servers
Differentiate between server suites
Lesson 11:
Name Resolution
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
•
•
•
•
•
•
•
Identify the purpose of name resolution
Define and configure hosts files
Explain DNS and its evolution
Define the DNS architecture
Identify DNS records and list record types
Install a DNS server and client
Explain the function of WINS and the purpose of
the lmhosts file
Hosts File
• A simple text file that is referenced locally by
applications and commands for name-to-address
resolution
Domain Name System
• DNS hierarchy
– Root-level domain
– Top-level domain
– Second-level domain
• DNS components
– Name server
– Name resolver
DNS Server Types
• Root server
• Master server
• Primary server
• Secondary server
• Caching and cachingonly server
• Forwarding server
• Slave server
DNS Records
• Common DNS records include:
– Internet (IN)
– Name Server (NS)
– Start of Authority (SOA)
– Address (A)
– Canonical Name (CNAME)
– Mail Exchanger (MX)
– Pointer (PTR)
Berkeley Internet
Name Domain
• The most common implementation of DNS
• A public domain software that can be implemented
on most versions of UNIX
Windows Internet
Naming Service
• The lmhosts file
• WINS and DNS
Summary
Identify the purpose of name resolution
Define and configure hosts files
Explain DNS and its evolution
Define the DNS architecture
Identify DNS records and list record types
Install a DNS server and client
Explain the function of WINS and the purpose of
the lmhosts file
Lesson 12:
Address and Parameter
Allocation for TCP/IP Hosts
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Define the function and roles of the BOOTP server
and client
• Define the function and roles of the DHCP server
and client
• Compare and contrast RARP, BOOTP and DHCP
• Explain the difference between dynamic and
manual address allocation
• Install and configure a DHCP server and client
BOOTstrap Protocol
• A client/server program that can return information
such as IP addresses, subnet masks, default
gateway addresses, and name server addresses
Dynamic Host
Configuration Protocol
• Offers finite address leases, allowing network
addresses to be reused
• Offers additional configuration options
DHCP
Initialization Process
Discover
Offer
Request
Acknowledgment
DHCP client
DHCP server
DHCP
Implementation
• Two common types of DHCP address allocation:
– Dynamic allocation
– Manual allocation (client reservation)
Summary
Define the function and roles of the BOOTP server
and client
Define the function and roles of the DHCP server
and client
Compare and contrast RARP, BOOTP and DHCP
Explain the difference between dynamic and
manual address allocation
Install and configure a DHCP server and client
Lesson 13:
Remote Connectivity
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Describe two remote connectivity solutions:
remote access servers and VPNs
• Identify the two remote connectivity types
• Describe remote access protocols
• Compare analog dial-up connections with ISDN
connections
• Determine modem configuration parameters
• Install and configure the RAS server
Types of
Remote Connectivity
• Remote control
• Remote node
Remote Access Servers
• Remote access server solutions include:
– Remote access server software
– Two or more modems
– Phone line or ISDN line
– Remote computer
Typical Remote
Connectivity Solution
Remote computer
Modem
Modem
Remote Access Server
Hub
Network Server Network Server
Dial-up Protocols
• PPP
• SLIP
Common Methods for
Accessing an RAS
• Plain Old Telephone Service (POTS)
• ISDN
– Basic Rate Interface (BRI)
– Primary Rate Interface (PRI)
Remote Access
Server Software
•
•
•
•
•
•
•
•
Microsoft RAS and dial-up networking
Modem configurations
Installing the service
Port usage
Protocols
Installing dial-up networking
Logging on using dial-up networking
Troubleshooting RAS sessions
Virtual Private Networks
• PPTP
• Accessing a VPN
Summary
Describe two remote connectivity solutions:
remote access servers and VPNs
Identify the two remote connectivity types
Describe remote access protocols
Compare analog dial-up connections with ISDN
connections
Determine modem configuration parameters
Install and configure the RAS server
Lesson 14:
User Management
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Define authentication
• Explain the share and user-level access security
models
• Identify the purpose and function of logon
accounts, groups and passwords
• Create a network password policy using standard
practices and procedures
Objectives (cont'd)
• Discuss permissions issues
• Describe the relation between permissions and
user profiles
• Use administrative utilities for specific networks
and operating systems
• Identify the permissions needed to add, delete or
modify user accounts
Authentication
• You can prove your identity by:
– What you know
– What you have
– Who you are
Security Models
and Authentication
Peer-lev el
Access
te x t
User-lev el
Access
Peer-level Access
• Advantages
– Less expensive and easier to implement than
networks that enforce user-level access
• Drawbacks
– Less secure
– Less control over file and resource
management
– Not as scalable
Peer-to-Peer
Network Security Model
Athena
Aphrodite
Hermes
Printer
Apollo
Ares
User-level Access
• Advantages
– Increased security
– Support for a larger number of users
– Increased control over access to resources
– Ability to monitor access to resources through
system logs
– Ability to grow in response to an organization's
needs
User-based Network
Athena
Aphrodite
Hermes
Printer B
Printer A
User Accounts
Database
Apollo
Ares
Creating
User Accounts
•
•
•
•
Logon accounts
User name
Password
Group associations
Creating
User Names
stangerj
James
Stanger
lanep
Patrick
Lane
mckennaj
Jill
McKenna
User Accounts Database
Placing Global Group
into Local Group
Local group
Global
group
Server
Laser printer
Permissions
• Can be either local or share-based
– Local permissions grant or deny access to
users who are logged on locally
– Share-level permissions apply only across a
network
User Accounts Database
and User Permissions
Print
Server
Print
Write
Read
Print
Server
Write
Print
User Accounts
Database
Printer
Universal
Permissions
•
•
•
•
Read
Write
Execute
Print
Windows 2000, UNIX
and Novell Permissions
• Windows 2000 access permissions
• UNIX permissions
• Novell rights
Additional Logon
Account Terms
• Logon scripts
• Home directories
• Local and roaming profiles
Standard
Password Practices
• Qualities of a strong password
• Implementing a password policy
• Password file placement
Network
Security Policies
•
•
•
•
•
•
•
Password aging
Password length
Password history
Account lockout
Share creation
User creation
Local logging
Standard Operating
Procedures
• All written policies on which IT and management
agree
• Usually apply to IT employees rather than to users
Summary
Define authentication
Explain the share and user-level access security
models
Identify the purpose and function of login
accounts, groups and passwords
Create a network password policy using standard
practices and procedures
Summary (cont'd)
Discuss permissions issues
Describe the relation between permissions and
user profiles
Use administrative utilities for specific networks
and operating systems
Identify the permissions needed to add, delete or
modify user accounts
Lesson 15:
Network Printing
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Describe the components used in network
printing, including print servers and print queues
• Discuss the flow of a print job from client to
network printer
• Set up and use a network printer
• Configure a network printer
Overview of
Network Printing
• Network printing requires the following
components
– Print servers
– Print queues
Network Printing
• Windows 2000 introduces specific terminology for
network printing, including:
– Printer
– Print server
– Print device
Flow of a Print Task
Workstation Workstation Laptop
Ethernet
Network Printer
Printer
Server
Configuring a
Network Printer
•
•
•
•
Client configuration
Using forms
Separator pages
Printing pools
Printing Pool Model
Printer
Printer
Server
Computer
Printer
Administration
• Document control
• Printer control
Summary
Describe the components used in network
printing, including print servers and print queues
Discuss the flow of a print job from client to
network printer
Set up and use a network printer
Configure a network printer
Lesson 16:
Data Protection
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Identify ways to establish a baseline of your
system's status
• Explain RAID levels and their significance for fault
tolerance
• Discuss data protection devices
• Describe standard backup measures
• Prepare for disaster recovery on a Windows 2000
system by creating a boot disk and an emergency
repair disk
Establishing
a Baseline
• Documenting your system's current status should
include:
– Physical drives and their configurations
– Partitions or logical drives and their
configurations
– Volumes or volume sets and their
configurations
Fault Tolerance
• Two primary types of drive fault tolerance
– RAID
– Tape backup
Disk Striping
Disk 1
Disk 2
File 1
File 2
File 3
Disk 3
Disk Mirroring
Disk 1
Disk 2
File 1
File 2
File 3
Disk Striping
with Large Blocks
Disk 1
Disk 2
File 1
File 2
File 3
Parity
Disk 3
Disk Striping with Parity
Disk 1
Disk 2
File 1
File 2
File 3
Parity
Disk 3
Other Types of
Data Protection
• Uninterruptible Power Supply
• Folder replication
• Removable media
Planning a
Backup Strategy
•
•
•
•
Determine which files to back up
Choose local or network backup types
Select a backup method
Plan and practice restore procedures
Disaster Recovery
• Windows 2000 boot disk
• Emergency Repair Disk
• Last Known Good Configuration option
Summary
Identify ways to establish a baseline of your
system's status
Explain RAID levels and their significance for fault
tolerance
Discuss data protection devices
Describe standard backup measures
Prepare for disaster recovery on a Windows 2000
system by creating a boot disk and an emergency
repair disk
Lesson 17:
Network
Security Essentials
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Explain the need for network security and identify
resources that need security
• List the two major categories of security threats
• Discuss two types of hackers and determine
attack types
• Describe a computer virus and explain how to
protect your computer from virus attacks
Objectives (cont'd)
• List key security standards
• Explain the purpose of security organizations
• Explain the audit process
Defining Security
• A means to reduce, to the greatest extent possible,
the vulnerability of data and resources
Defining Assets
•
•
•
•
Local resources
Network resources
Server resources
Database and information resources
Security Threats
• Accidental threats
• Intentional threats
– Hackers
• Casual attackers
• Determined attackers
Types of Attacks
• Spoofing (masquerade)
attacks
• Man-in-the-middle
(hijacking) attacks
• Denial-of-service attacks
• Insider attacks
•
•
•
•
•
•
Front-door-attacks
Brute-force attacks
Trapdoor attacks
Replay attacks
Trojan horse attacks
Social engineering attacks
Viruses
•
•
•
•
•
Macros
Executables
Boot sector
Stealth
Polymorphic
The Robert Morris
Internet Worm
• An example of several attack methods, including:
– Bug-based attack
– Denial-of-service attack
The Hacker Process
• Stage 1: Discovery
• Stage 2: Penetration
• Stage 3: Control
Defeating Attacks
• OSI/RM security services include:
– Authentication
– Access control
– Data confidentiality
– Data integrity
– Nonrepudiation
Security Standards
• Trusted Computer System Evaluation Criteria
security levels
–D
– C1
– C2
– B1
– B2
– B3
– A1
Key Security
Organizations
• CERT
• CSRC at the NIST
• CIAC at the DOE
Auditing Phases
• Status quo analysis
• Risk analysis
• Threat analysis
Securing a Server
• Change your system defaults
• Determine user and group permissions
• Train users to use certificates, encryption and
passwords
• Begin automated logging
• Establish a baseline of activity
• Combine OS and Internet server policies
• Change the system topology
• Establish a written policy
Summary
Explain the need for network security and identify
resources that need security
List the two major categories of security threats
Discuss two types of hackers and determine
attack types
Describe a computer virus and explain how to
protect your computer from virus attacks
Summary (cont'd)
List key security standards
Explain the purpose of security organizations
Explain the audit process
Lesson 18:
Enterprise Network Security—
Encryption and Firewalls
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Describe the three major types of encryption
• Describe enterprise-level security protocols
• List and discuss the four major types of firewalls
The Internet:
An Open Network
• Networking is a cumulative practice: One
technology builds on another
Encryption
• Symmetric-key encryption
• Asymmetric-key encryption
• One-way encryption (hash encryption)
Symmetric-Key
Encryption
Public-Key
Encryption
Network-level
Protocols and Encryption
•
•
•
•
VPNs
Kerberos
Password generators and OTPs
SSL
Creating an SSL Session:
The Server-Side View
• Certificate types:
– Certificate Authority (CA)
– Server
– Personal
– Software publisher
Firewalls
• Filter packets
• Serve as a circuit-level or application-level
gateway
• Detect intrusions
• Provide enhanced password authentication
• Log and report
• Take evasive action
• Permit encrypted access (with a VPN)
Packet Filters
• Devices that inspect each packet for predefined
content
Proxy Servers
• Circuit-level gateways
• Application-level gateways
Network
Address Translation
• Masquerading
• NAT considerations
• NAT and vendor terminology
Firewall Topology
• Four common firewall implementations
– Packet filter
– Single-homed bastion host
– Dual-homed bastion host
– Screened subnet
Summary
Describe the three major types of encryption
Describe enterprise-level security protocols
List and discuss the four major types of firewalls
Lesson 19:
Maintaining
Your Network
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
• Explain the importance of version control
• Describe the strategies for version control
• Identify the appropriate times for verifying
functionality when moving or changing equipment
• Determine how and when to apply patches and
fixes to your system
• Plan the key areas of support for your network
Version Control
•
•
•
•
Upgrading programs
Upgrading operating systems
Removing outdated files
Resolving file conflicts and replacing overwritten
files
Moving or
Changing Equipment
• Verifying functionality
– Servers
– Network equipment
Patches and Fixes
• Microsoft service packs
• Novell support packs
• Red Hat Linux errata
Supporting
Your Network
• User support
– In-person assistance
– User education
– Technical service
– Prioritization
Summary
Explain the importance of version control
Describe the strategies for version control
Identify the appropriate times for verifying
functionality when moving or changing equipment
Determine how and when to apply patches and
fixes to your system
Plan the key areas of support for your network
Lesson 20:
Troubleshooting the
Network and Diagnostic Tools
© 2001 ComputerPREP, Inc. All rights reserved.
Objectives
•
•
•
•
Analyze the scope of network problems
Formulate troubleshooting methods
Analyze common troubleshooting indicators
Explain common troubleshooting tools and their
uses
Analyzing the
Scope of the Problem
• How many machines or network segments are
affected?
• How frequently does the problem occur?
• Can the problem be duplicated?
Applying
Troubleshooting Methods
• DETECT
– D: Discover the problem
– E: Evaluate the scope of the problem
– T: Track possible approaches to
solving the problem
– E: Execute an approach
– C: Check for problem resolution
– T: Transfer knowledge
Troubleshooting
Name Resolution
• Domain Name System
• Windows Internet Naming Service
Using
Troubleshooting Indicators
•
•
•
•
•
Indicator lights
Error logs and messages
Event Viewer
Task Manager
Performance monitor
Using
Troubleshooting Tools
•
•
•
•
•
Crossover cables
Hardware loopback devices
Tone generators and tone locators
Vendor resources
Protocol analyzers
Summary
Analyze the scope of network problems
Formulate troubleshooting methods
Analyze common troubleshooting indicators
Explain common troubleshooting tools and their
uses
Network+
Overview of the Internet
Introduction to Networking
Networking Protocols
Network Devices
Connecting Your Network
TCP/IP Architecture
Internet Addressing
Routing
Network+ (cont'd)
TCP/IP Utilities
Internetworking Servers
Name Resolution
Address and Parameter Allocation for TCP/IP
Hosts
Remote Connectivity
User Management
Network+ (cont'd)
Network Printing
Data Protection
Network Security Essentials
Enterprise Network Security—
Encryption and Firewalls
Maintaining Your Network
Troubleshooting the Network and Diagnostic Tools