SlideShare une entreprise Scribd logo
1  sur  18
Chapter 8
Simple Network Operations

Networking Concepts – Eric Vanderburg ©2005
NOS
 DOS,

Windows 3x – LAN Manager
 OS Features
Bridges Hardware & Software (another layer to
minimize complexity)
 Memory management
 Multitasking – many processes at the same time


Preemptive – OS controls process access to CPU (uses
time slices) Win95 & higher
 Cooperative – OS cannot stop processes once they start
using the CPU


Networking Concepts – Eric
Vanderburg ©2005
NOS Functions
 Share

computer resources & peripherals
 Control remote machines
 Implement security for resources
 Authentication
 Permissions
 Rights

 Maintain

directory of resources
 Provide network services to applications
Networking Concepts – Eric
Vanderburg ©2005
Components
 Naming


Services

UNC (Universal Naming Convention)
ComputerNameShareName
 UNC Aware – allows R or W to network storage via UNC
path (non-UNC aware require mapped drives)


DNS
 NetBIOS


Only 8 character name allowed in DOS (8.3 rule)
 Certain illegal characters
 Hidden names (ComputerNameSecretShare$)


Networking Concepts – Eric
Vanderburg ©2005
Directory Services





Search for the resource you need
Restricts views based on ACL
Microsoft AD (Active Directory)
Novell eDirectory or NDS









NAL (NetWare Application Launcher) – does a network
inventory and stores it in eDirectory
Formerly used a flat file database called the Bindery (NW3x)
NW4x systems can run Bindery emulation to work with 3x

Linux NIS (Network Information System)
Sun Directory Server
X.500
LDAP (Lightweight Directory Access Protocol)
Networking Concepts – Eric
Vanderburg ©2005
Client Software
 Logon
 Requests

resources
 Redirector
 Designator – substitutes UNC name for
a mapped drive letter

Networking Concepts – Eric
Vanderburg ©2005
Access Control
 Who

can access what resources
 What they can do with those resources
 How many can access resources
simultaneously
 When can they access those resources

Networking Concepts – Eric
Vanderburg ©2005
Server Responsibilities
 Manage

users and groups
 Authenticate users
 Advertise resources, resolve names &
maintain a directory
 Management, logging, & auditing
 Provide redundancy

Networking Concepts – Eric
Vanderburg ©2005
Installation
 Before

you begin:

Consider server role
 Determine file system
 Available hardware
 Choose a name & naming conventions
 Understand network size, topology, and network
OS types
 Redundancy options


Clustering
 Mirroring
 Duplexing




Placement within forest & domain
Networking Concepts – Eric
Vanderburg ©2005
Naming Conventions
 Names

should be based on a system
 Users & resources
Eric Vanderburg, username:evanderburg
 Proper hierarchy


 Computer


names & DNS names

First Cleveland Domain Controller, name: CleDC01

 Educate

users to save files with proper file
name structures in the proper folders
 Titles of email messages
Networking Concepts – Eric
Vanderburg ©2005
Storage
 Partition

– logical section of disk space
 Multiple boot – select from many OS’s upon
computer startup
 Single partition, single drive, single OS
 Multiple partitions, single drive, single OS
Separation is good
 One drive so activity is high


 Multiple


partitions, multiple drives, single OS

Distributes drive activity

 Fault

tolerant storage
Networking Concepts – Eric
Vanderburg ©2005
File System









FAT (File Allocation Table)
FAT32
NTFS
CDFS
EFS (Extent File System)
GPFS (General Parallel File System)
Different file systems support different sized disks,
security options, file size, naming, and cluster sizes
Some file systems cannot be used in some OS’s

Networking Concepts – Eric
Vanderburg ©2005
Network Services
 Installing

Services
 Starting & stopping services
 Services in Linux
 Edit

config files
 Install new package
 Package manager may be available

Networking Concepts – Eric
Vanderburg ©2005
Sharing in Linux
 Use

NFS for Linux only share
 Use Samba for Linux to Windows shares

Networking Concepts – Eric
Vanderburg ©2005
Network Applications








Multiple concurrent use
Email
Messaging
Scheduling
Groupware
Databases
Architectures




Centralized – fully stored on server
File-system sharing – client app with shared storage area or
database
True client/server – some components are on the client and
some on the server. Effectively uses client processing
Networking Concepts – Eric
Vanderburg ©2005
Email








X.400
IMAP (Internet Message Access Protocol) –
downloads and displays messages, can be sent to a
client or run from a web based app, fault tolerant with
advanced controls for group collaboration.
MHS (Message Handling System) – Novell’s
messaging service
POP3 (Post Office Protocol version 3) – downloads
messages to the client, messages managed locally
SMTP – standard for sending mail messages
X.500 – improved directory and has a global address
database
Networking Concepts – Eric
Vanderburg ©2005
Messaging










Oscar – AIM protocol, now used for ICQ also, direct
connections do not go through AIM servers
File sharing services often have chat (Napster, Direct
Connect, eDonkey, ect..)
IRC – primarily for group chats, oldest (1989)
Jabber – Uses TCP & XML, email-like names used.
Can use other services also:
username@aim.jabber.org
Novell GroupWise Manager – uses SSL
Lotus Sametime
XMPP (Extensible Messaging & Presence Protocol)
SIMPLE (*SIP for Instant Messaging & Presence
Leveraging Extensions)

Networking
*SIP - Session Initiation Protocol Concepts – Eric
Vanderburg ©2005
Scheduling & Groupware
 Scheduling
 Calendars
 Integrated

into other programs

 Groupware
 Many

users collaborate on a single file
 Novell GroupWise
 Lotus Notes
 Microsoft SharePoint
Networking Concepts – Eric
Vanderburg ©2005

Contenu connexe

Tendances (20)

Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
Wireless
WirelessWireless
Wireless
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Networking
NetworkingNetworking
Networking
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Wifi
WifiWifi
Wifi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
 
Wi fi
Wi fiWi fi
Wi fi
 

En vedette

TylerResume.docx (1)
TylerResume.docx (1)TylerResume.docx (1)
TylerResume.docx (1)Tyler Nickel
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopologyManoj Kumar
 
Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0Hossein Zahed
 
network essential ppt
network essential pptnetwork essential ppt
network essential pptVikas Tiwari
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric VanderburgEric Vanderburg
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
Network Essentials
Network EssentialsNetwork Essentials
Network EssentialsIffu Slides
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and GopherManoj Kumar
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Network Design
Network DesignNetwork Design
Network Designcornimar
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnetAmandeep Kaur
 

En vedette (20)

TylerResume.docx (1)
TylerResume.docx (1)TylerResume.docx (1)
TylerResume.docx (1)
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopology
 
Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0
 
network essential ppt
network essential pptnetwork essential ppt
network essential ppt
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric Vanderburg
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Network Essentials
Network EssentialsNetwork Essentials
Network Essentials
 
Networking basics Tutorial 1
Networking basics Tutorial 1Networking basics Tutorial 1
Networking basics Tutorial 1
 
Network design - Topology
Network design  - TopologyNetwork design  - Topology
Network design - Topology
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Networking
NetworkingNetworking
Networking
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Network Design
Network DesignNetwork Design
Network Design
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Network design
Network designNetwork design
Network design
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 

Similaire à Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg

Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8APSU
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Conceptsaritasingh19866
 
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...MrKarwega
 
Web server administration
Web server administrationWeb server administration
Web server administrationsawsan slii
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgEric Vanderburg
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network conceptsDuressa Teshome
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systemsrahmanitayulia
 
Operating System and Basic Networks
Operating System and Basic NetworksOperating System and Basic Networks
Operating System and Basic NetworksJherome Tenorio
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxachutachut
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networkingnurulaisyah5324
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1Abu Sayed Adhar
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 

Similaire à Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg (20)

Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Unit09
Unit09Unit09
Unit09
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
 
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
Nfs
NfsNfs
Nfs
 
Nas fundamentals
Nas fundamentalsNas fundamentals
Nas fundamentals
 
Cl115
Cl115Cl115
Cl115
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
 
Nas101
Nas101Nas101
Nas101
 
Operating System and Basic Networks
Operating System and Basic NetworksOperating System and Basic Networks
Operating System and Basic Networks
 
Ch06
Ch06Ch06
Ch06
 
NAS Concepts
NAS ConceptsNAS Concepts
NAS Concepts
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 

Plus de Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Plus de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg

  • 1. Chapter 8 Simple Network Operations Networking Concepts – Eric Vanderburg ©2005
  • 2. NOS  DOS, Windows 3x – LAN Manager  OS Features Bridges Hardware & Software (another layer to minimize complexity)  Memory management  Multitasking – many processes at the same time  Preemptive – OS controls process access to CPU (uses time slices) Win95 & higher  Cooperative – OS cannot stop processes once they start using the CPU  Networking Concepts – Eric Vanderburg ©2005
  • 3. NOS Functions  Share computer resources & peripherals  Control remote machines  Implement security for resources  Authentication  Permissions  Rights  Maintain directory of resources  Provide network services to applications Networking Concepts – Eric Vanderburg ©2005
  • 4. Components  Naming  Services UNC (Universal Naming Convention) ComputerNameShareName  UNC Aware – allows R or W to network storage via UNC path (non-UNC aware require mapped drives)  DNS  NetBIOS  Only 8 character name allowed in DOS (8.3 rule)  Certain illegal characters  Hidden names (ComputerNameSecretShare$)  Networking Concepts – Eric Vanderburg ©2005
  • 5. Directory Services     Search for the resource you need Restricts views based on ACL Microsoft AD (Active Directory) Novell eDirectory or NDS        NAL (NetWare Application Launcher) – does a network inventory and stores it in eDirectory Formerly used a flat file database called the Bindery (NW3x) NW4x systems can run Bindery emulation to work with 3x Linux NIS (Network Information System) Sun Directory Server X.500 LDAP (Lightweight Directory Access Protocol) Networking Concepts – Eric Vanderburg ©2005
  • 6. Client Software  Logon  Requests resources  Redirector  Designator – substitutes UNC name for a mapped drive letter Networking Concepts – Eric Vanderburg ©2005
  • 7. Access Control  Who can access what resources  What they can do with those resources  How many can access resources simultaneously  When can they access those resources Networking Concepts – Eric Vanderburg ©2005
  • 8. Server Responsibilities  Manage users and groups  Authenticate users  Advertise resources, resolve names & maintain a directory  Management, logging, & auditing  Provide redundancy Networking Concepts – Eric Vanderburg ©2005
  • 9. Installation  Before you begin: Consider server role  Determine file system  Available hardware  Choose a name & naming conventions  Understand network size, topology, and network OS types  Redundancy options  Clustering  Mirroring  Duplexing   Placement within forest & domain Networking Concepts – Eric Vanderburg ©2005
  • 10. Naming Conventions  Names should be based on a system  Users & resources Eric Vanderburg, username:evanderburg  Proper hierarchy   Computer  names & DNS names First Cleveland Domain Controller, name: CleDC01  Educate users to save files with proper file name structures in the proper folders  Titles of email messages Networking Concepts – Eric Vanderburg ©2005
  • 11. Storage  Partition – logical section of disk space  Multiple boot – select from many OS’s upon computer startup  Single partition, single drive, single OS  Multiple partitions, single drive, single OS Separation is good  One drive so activity is high   Multiple  partitions, multiple drives, single OS Distributes drive activity  Fault tolerant storage Networking Concepts – Eric Vanderburg ©2005
  • 12. File System         FAT (File Allocation Table) FAT32 NTFS CDFS EFS (Extent File System) GPFS (General Parallel File System) Different file systems support different sized disks, security options, file size, naming, and cluster sizes Some file systems cannot be used in some OS’s Networking Concepts – Eric Vanderburg ©2005
  • 13. Network Services  Installing Services  Starting & stopping services  Services in Linux  Edit config files  Install new package  Package manager may be available Networking Concepts – Eric Vanderburg ©2005
  • 14. Sharing in Linux  Use NFS for Linux only share  Use Samba for Linux to Windows shares Networking Concepts – Eric Vanderburg ©2005
  • 15. Network Applications        Multiple concurrent use Email Messaging Scheduling Groupware Databases Architectures    Centralized – fully stored on server File-system sharing – client app with shared storage area or database True client/server – some components are on the client and some on the server. Effectively uses client processing Networking Concepts – Eric Vanderburg ©2005
  • 16. Email       X.400 IMAP (Internet Message Access Protocol) – downloads and displays messages, can be sent to a client or run from a web based app, fault tolerant with advanced controls for group collaboration. MHS (Message Handling System) – Novell’s messaging service POP3 (Post Office Protocol version 3) – downloads messages to the client, messages managed locally SMTP – standard for sending mail messages X.500 – improved directory and has a global address database Networking Concepts – Eric Vanderburg ©2005
  • 17. Messaging         Oscar – AIM protocol, now used for ICQ also, direct connections do not go through AIM servers File sharing services often have chat (Napster, Direct Connect, eDonkey, ect..) IRC – primarily for group chats, oldest (1989) Jabber – Uses TCP & XML, email-like names used. Can use other services also: username@aim.jabber.org Novell GroupWise Manager – uses SSL Lotus Sametime XMPP (Extensible Messaging & Presence Protocol) SIMPLE (*SIP for Instant Messaging & Presence Leveraging Extensions) Networking *SIP - Session Initiation Protocol Concepts – Eric Vanderburg ©2005
  • 18. Scheduling & Groupware  Scheduling  Calendars  Integrated into other programs  Groupware  Many users collaborate on a single file  Novell GroupWise  Lotus Notes  Microsoft SharePoint Networking Concepts – Eric Vanderburg ©2005