Network Configuration

Size: px
Start display at page:

Download "Network Configuration"

Transcription

1

2 Network Configuration In order to access a network (whether a local area network or an Internet Service Provider), you need To have a network interface device for instance, an Ethernet card that physically connects to a network cable or is wireless, this would be called eth# such as eth0 there is also the loopback device which allows software running on your computer to communicate to your computer as if the communication came over the network, this device is called lo or localhost and is always denoted with the IP address of you cannot communicate over network if lo is down, but if lo is up it does not mean you can communicate over the network!

3 Network Configuration You need to have your network service running The network service establishes your IP address(es) Other services are useful but not critical such as your firewall (iptables) and nfs (to mount remote file systems) You need to have access to a network broadcast device This will typically be a router, gateway, switch or hub but may also be a MODEM

4 Computer Networks: Broadcast Devices Computers in a network operate by sending their messages to a nearby broadcast device The network is divided into subnets where each subnet is glued together by a broadcast device The hub is a device which broadcasts any received message to all connected devices The switch receives a message with an address and uses that address to send the message to one machine the address is a MAC address The router receives a message with an address and uses that address to send the message to one machine the address is a network address (IPv4, IPv6) The gateway is a router used to connect different types of networks together

5 Computer Networks Here we see a local area network in which two subnets uses switches and are connected together by a router The router knows how to route a message from network to network while the switch only knows how to route a message within the subnet or to the router

6 TCP/IP All Internet communication requires an implementation of TCP/IP This is a four-level protocol suite Each level can be implemented by one of many protocols

7 TCP/IP: Layers Application layer Application software takes your message and produces an initial, application-neutral message DNS, FTP, HTTP, IMAP, LDAP, MIME, NFS, POP, SSH, SMTP, SNMP, Telnet Transport layer Uniform interface between two resources Supports host-to-host communication Segments message into packets Adds detail such as packet number (6 of 9), checksum for error correction (if needed) TCP, UDP, also SCTP, DCCP, UDP Lite

8 TCP/IP: Layers Internet Layer Add appropriate address(es) to message header IPv4 or IPv6 addressing IPv4 uses 32 bits as 4 octets, each octet is 8 bits (or an integer between 0 and 255) 32 bits gives us a little over 4 billion addresses, most of which have been used so we need larger addresses and thus IPv6 IPv6 uses 128 bits as 32 hexadecimal digits Gives us over addresses! Communicate with routers Link layer Handles physical communication including such tasks as modulation, multiplexing Operates with MAC addresses instead of IP addresses

9 TCP/IP: Ports A 16-bit number assigned with a message s address as the destination for the message The port is a specification of the protocol that the message should use to be received The protocol then dictates the application software to be used to handle the message 16 bits gives us ports numbered 0 to 65,535 Most ports are unassigned but many of the first 1024 ports are assigned to currently used protocols or protocols being developed

10 TCP/IP: Common Ports Port Packet Type (TCP, UDP) Usage 20 both FTP data 21 TCP FTP control 22 both ssh (also SCP, SFTP) 23 both telnet 25 TCP SMTP 43 TCP WHOIS 53 both DNS 57 TCP Mail transfer protocol 67 UDP Bootstrap Protocol (used by DHCP) 68 UDP Bootstrap Protocol (used by DHCP) 70 TCP Gopher 80 TCP HTTP 109, 110 TCP POP2, POP3 118 both SQL 123 UDP Network time protocol

11 TCP/IP: Common Ports Port Packet Type (TCP, UDP) Usage 161 UDP SNMP 194 both IRC (Internet relay chat) 443 TCP HTTPS 514 UDP Syslog (Linux system logging) 530 both RPC 636 both LDAP 989 both FTPS data (FTP over TLS/SSL) 990 both FTPS control (FTP over TLS/SSL) 992 both Telnet over TLS/SSL 2049 both NFS 3128 TCP Squid proxy TCP IRC both BitTorrent 8008, 8080, TCP Alternate for HTTP 8090

12 TCP/IP: IPv4 vs IPv6 IPv4: 32 bit addresses Protocol dates back to the 80s at a time when there were thousands of hosts (instead of billions) IPv6: 128 bit stored as 32 hexadecimal digits grouped into 8 sections, separated by colons 1234:5678:90ab:cdef:0012:0034:0000:5678 a 0000 entry can be deleted so that the address 1234:5678:9000:0000:0000:0000:00bc:def0 can appear as 1234:5678:9000::00bc:def0

13 TCP/IP: IPv4 vs IPv6 IPv4 is not set up to handle secure transmission Today, we add SSL on top of the protocol IPv6 is an attempt not only to increase the number of addresses but also to rectify other problems of IPv4 IPsec (IP security) for encryption auto configuration for hosts on a network optional header components for smaller (when available) header sizes but can also be expanded to what we call jumbograms

14 TCP/IP: IPv4 vs IPv6 Many networks are not yet IPv6 compliant Most operating systems can handle IPv6 but not all network administrators have set it up Or there are network devices that cannot handle it (e.g., routers) IPv4 and IPv6 are not compatible (different addresses, different headers) So most networks need to implement both versions (or at least IPv4) Another solution is to use a tunnel in IPv4 where inside the tunnel we have IPv6

15 The Internet: DNS The Internet is made up of domains and subdomains Domains and subdomains are managed by authorities We tend to use IP aliases to reference resources on the Internet because they are easier to remember than IP addresses However, we need to then have a mechanism to map from an IP alias to the proper IPv4 (or IPv6) address We use the domain name system (DNS) for this Scattered around the Internet are devices that contain this mapping information, DNS name servers

16 The Internet: Name Servers Every organization that exists in its own domain (subdomain) has its own DNS name server It is the authority for the devices within its domain If you want to map an IP alias to an address, how do you find that particular name server? You don t, instead you query your own name server and if it has the information cached locally, it returns it to you Otherwise, it kicks the request to another DNS name server This makes for recursive name servers and when a name server receives information from another, it can cache it locally making it a caching name server

17 The Internet: Domains and Subdomains The top-level domains of the Internet are well-defined.edu,.gov,.net,.com, etc Within each of these, subdomains are established by requesting a domain name and IP addresses amazon.com, nku.edu Within a subdomain, the organization can define further subdomains informatics.nku.edu it.nku.edu And then within the organization, you name your resources and provide them IP addresses This information is then stored in your organization s name server(s)

18 The Internet: Name Servers There are generally two forms of name servers Authorities those that an organization has that describes their domain and subdomains Caches those that merely cache responses from other authorities so that requests can be handled locally note that authorities can also be caching name servers In Linux Your local DNS name servers addresses are stored in the file /etc/resolv.conf If you already know the IP address for an alias and want to bypass DNS, store this mapping information locally in /etc/hosts (but if this information changes on you, you will have to update this yourself)

19 Linux: network Service network used to establish IP addresses for your interfaces loopback (lo) is always but eth0 (or other interface device) will not be established unless network is running network also establishes your /etc/resolv.conf DNS server addresses starting this service runs the script /etc/init.d/functions followed by /etc/sysconfig/network this gives you the environment variables NETWORKING=yes and HOSTNAME=hostname it then runs the script /etc/sysconfig/network-scripts/networkfunctions

20 Linux: network Service The network-functions script Queries devices for their statuses (up or down) Sets the interface s MAC address or if there is a wireless device available Establish values for variables hostname, IP address, default routes Locate the local network s gateway At this point, all network interface devices will be known and either be down or up with IP addresses assigned to them

21 Linux: network-scripts Directory This directory is used to house scripts that can start and stop interface devices It also stores the configuration files for all of your network devices (and lo) A script like ifup-eth or ifdown-eth can start or stop the given device Or, you can start or stop a device using the more generic ifup and ifdown by supplying the device name

22 Linux: ifcfg-eth0 This file contains a list of directives that establish environment variables for your eth0 device This will include (see the next slides for descriptions of these variables) BOOTPROTO HWADDR ONBOOT DEVICE and/or NAME BROADCAST or GATEWAY (assigned if static) IPADDR (assigned if static)

23 Linux: ifcfg-eth0 Variable Range/Type of Value Meaning BOOTPROTO static, dhcp, none Source of the IP address (static or via DHCP server or none at all) BROADCAST IP address Broadcast device s address (typically you will use this variable or GATEWAY but not both) DEVICE alphanumeric Device s name (e.g., eth0, ippp, lo) DHCP_HOSTNAME IP alias Name of DHCP server DHCP_TIMEOUT integer Number of seconds before timing out when waiting for DHCP server to respond GATEWAY IP address IP address of subnet router/gateway HWADDR hexadecimal address MAC address of device IPADDR IP address Set by system administrator for static IP IPV6INIT yes, no Initialize IPv6 address by default NAME alphanumeric Name of device, e.g., ethernet, loopback

24 Linux: ifcfg-eth0 Variable Range/Type of Value Meaning NETMASK Subnet mask The mask used to obtain the local network portion of the IP address, e.g., NETWORK network address IP address of the local network NM_CONTROLLED yes, no Whether the device is controlled by a network manager program ONBOOT yes, no Whether to start this interface upon boot or have it manually started TYPE alphanumeric Type of device, e.g., Ethernet, PPP USERCTL yes, no Is user allowed to control this device? UUID hexadecimal address Address of physical device

25 Internet: Netmask One variable needed for network communication is the netmask The netmask is used to obtain the network portion of an IPv4 address The netmask is either assigned by the network administrator or provided by the network s gateway The idea is to AND the netmask with the IP address which gives you the IP address of the local network hosting the resource If you NOT the netmask and apply this to the IP address of the resource you are given its local address within the network

26 Internet: Netmask Let s look at some examples Assume the IP address of And a netmask of AND = This example is not very illustrative of the concept because 240 AND 12 = 0, let s try the IP address AND =

27 Linux: Other Network Services snmpd (Simple Network Management Protocol daemon) Listen and respond to SNMP messages This is usually used by a network administrator to control a device remotely portreserve and portrelease While most ports that we use are already reserved, you can temporarily assign a port to a particular application and then release it later Avahi Discovers available services on y our local network such as printers and file servers

28 Linux: Other Network Services rdisc Locates your subnet s router using ICMP (Internet Control Message Protocol) dnsmasq A simplified DNS server that is primarily used to cache previously fulfilled IP alias to address mappings as provided by DNS name servers postfix Controls Linux and calls upon the sendmail program httpd The Apache web server certmonger Maintains your downloaded digital certificates and keeps them up to date

29 Linux: xinetd Service Sometimes known as a superserver It is a service that calls other network services on demand This is preferably than keeping the various on demand services running all the time Use the /etc/xinetd.conf file to configure it First define default configurations including number of available instances and who will handle logging and what should be logged Then for each service, provide a configuration that includes the service s executable location, whether the service can operate in a multithreaded mode and how logging information should be adjusted

30 Linux: xinetd Service Here we see a default setting followed by the specific setting for rsync defaults { instances = 50 log_type = RSYSLOG authpriv log_on_success = PID HOST DURATION EXIT log_on_failure = HOST cps = umask = 002 } includedir /etc/xinetd.d service rsync { disable = yes flags = IPv6 socket_type = stream wait = no user = root server = /usr/bin/rsync server_args = --daemon log_on_failure += USERID }

31 IP Addresses: Static The network administrator assigns the resource with its IP address This is typically reserved for servers as we would not want a server s IP address to change (or change often) but we would not have to do this for non-servers such as workstations In the ifcfg file (e.g., ifcfg-eth0) IPADDR=static address BOOTPROTO=static Manually assign NETMASK, HOSTNAME, GATEWAY (or BROADCAST)

32 IP Addresses: Dynamic An organization will have a limited number of addresses available Rather than assigning one per device, let the device request an address when the device is in use (booted) This approach uses dynamic IP addressing Some device needs to be in charge of handling the pool of addresses and assigning one on demand to a device Usually we will have our network s router or gateway handle this task

33 IP Addresses: DHCP Server Dynamic Host Configuration Protocol Based on the Boostrap Protocol from the early 90s The DHCP server receives a request from a client on its subnet and assigns it one of the available IP addresses Sometimes addresses are assigned temporarily known as a lease if the time limit expires, the client must request a new address but it may request the same one if it is still available DHCP is available for Linux, stored under /sbin/dhclient

34 IP Addresses: DHCP Server DHCP Directives Directive Meaning subnet DHCP s network (or subnet) address netmask DHCP s local network (or subnet) netmask range Range of IP addresses available to assign to clients, ranges are indicated by separating IP addresses with a space as in routers IP address (or alias) of router(s) that DHCP server will respond to domain-name organization (or subnet) domain name domain-nameservers IP addresses (or aliases) of domain DNS servers default-lease-time value value is the amount of time (in seconds) that an IP address can be made available to a client max-lease-time value value is the maximum amount of time IP address is leased authoritative If listed, means this DHCP is the official server for network log-facility level Use level listed for syslogd logging (e.g., local7) group Specify parameters that apply to a group of subnets

35 IP Addresses: DHCP Server Example configuration for a DHCP server operating on two subnets option domain-name somecompany.com; option domain-name-servers ; subnet netmask { range ; option broadcast-address ; option routers ; } subnet netmask { range ; broadcast-address ; option routers ; }

36 Linux: Network Programs The ip program is an umbrella program handling tasks of many older Linux network instructions It can assign/display/delete IP addresses for interfaces It can assign/display a network device It can manipulate, replace, display or delete router tables It can add, change, delete or display neighbor ARP and cache entries It can create a tunnel over IP The syntax of the instruction differs by the object type (e.g., address versus route versus tunnel) Each object type will have its own type of operation such as set, show, add, change, del, flush, or replace

37 Linux: Network Programs ifconfig set or display IP addresses of interfaces (including lo), replaced by ip ping/traceroute send out packets and respond about time to receive responses (traceroute also outputs the routers in the path taken) route display or modify the router table(s), replaced by ip ss display socket usage information and statistics netstat provide network connection information, replaced by ss

38 The Firewall A firewall is a program that examines messages and decides whether the messages should be allowed passed the firewall A firewall can examine incoming messages, outgoing messages and forwarding messages Messages being forwarded are usually only of interest to broadcast devices like routers, we typically wouldn t worry about such messages for our PCs A stateful firewall is one that can apply rules not just to one message but to many related messages Such as the messages that make up a session with a remote host

39 The Firewall Firewalls can run on PCs/laptops and mobile devices We can also implement them in routers We can also implement them in other software/servers like Proxy servers While a firewall is software, we might have a dedicated computer serve as a firewall for an organization In this case, the firewall is both software and hardware We would implement the firewall on a device the serves as our Internet connection A firewall uses a set of rules which analyze a message for specific criteria to decide what to do with the message

40 The Firewall Here we seen an example of a firewall which is allowing all outgoing messages to move from the computer to the Internet while restricting incoming messages to only those that pass the firewall s rules

41 The Firewall: iptables In Linux, the firewall service is called iptables There is also ip6tables for IPv6 Each of these has two files of note iptables-config (and ip6tables-config) which is the configuration file that dictates mostly how the firewall information can be viewed iptables (and ip6tables) which is the rules file You can also adjust the firewall through the Firewall GUI (refer back to chapter 11)

42 The Firewall: iptables The config file uses the following directives Directive Meaning Default IPTABLES_MODULES List of modules to load (none) IPTABLES_MODULES_UNLOAD Unloads modules on stop/restart yes IPTABLES_SAVE_ON_STOP IPTABLES_SAVE_ON_RESTART IPTABLES_SAVE_COUNTER Rules may be added to your firewall from the command line; if this directive is set to yes then rules are saved to iptables upon stopping the firewall If set to yes, saves all current rules to iptables uponrestarting the firewall Saves all chains of rules and counters for rules to iptables upon stop or restart IPTABLES_STATUS_NUMERIC Print IP addresses and ports in numeric yes format IPTABLES_STATUS_VERBOSE Print statistics about packets and bytes yes IPTABLES_STATUS_LINENUMBERS Print line numbers of rules yes no no no

43 The Firewall: iptables Here we see the output of /sbin/service iptables status with the following directive values IPTABLES_STATUS_VERBOSE=yes IPTABLES_STATUS_LINENUMBERS=yes

44 The Firewall: iptables Rules are placed into chains For instance, all INPUT rules are in one chain, all OUTPUT rules are in a separate chain Most rules use the A option to indicate that we are adding this rule to an existing chain Syntax: -A chain [options] [-j target] The chain will be INPUT, OUTPUT, FORWARD Options specify the criteria by which this rule will judge a packet, such as destination port or source IP address Target is one of ACCEPT, REJECT, DROP or LOG

45 The Firewall: iptables The targets are defined as follows ACCEPT permit the packet entry to the system REJECT reject the packet and notify the sender DROP reject the packet without notifying the sender LOG log the packet but continue chaining rules to reach one of the other targets. The distinction here is between REJECT and DROP because DROP does not notify sender You would use DROP if you feel the message was spam or an attack

46 The Firewall: iptables Option Meaning Example -p protocol True if the message is of the given protocol -p tcp -i interface True if message received by given interface -i eth0 -o interface True if message sent over given interface -o lo -s address True if message originated from given IP -s address -s /16 -d address True if message being sent to IP address -d dport port True if message is intended to be received --dport 431 at given port --sport port True if message originated from port --sport 22 --dports port1,port2, --sports port1,port2, True if message intended for any ports --dports 80,8080,443 True if message originated from any ports --sports 67,68

47 The Firewall: iptables Another option is m to specify a further module to use There are numerous modules (see the next slide) One module is state which will test the state of the message Is this a new message, a message in response to an already established communication, or a message related to an already established communication? By using this module with ESTABLISHED and/or RELATED then you can allow messages in through your firewall if they are in response to messages that you initiated (such as an HTTP request)

48 The Firewall: iptables Module Meaning Extensions addrtype Match based on source --src-type type address type or destination --dst-type type address type Types include BLACKHOLE, BROADCAST, MULTICAST, NAT, UNICAST conntrack Match based on the connection s status --ctstate state States include INVALID, ESTABLISHED, NEW, RELATED, SNAT, DNAT icmp Match based on ICMP type --icmp-type [!] type Type can be any ICMP type or its corresponding number iprange Match if message s source or destination falls within the given range [!]--src-range range [!]--dst-range range Range denoted as address1-address2 length Match if message s length is equal to, or within the range, provided limit Limit the number of received messages time Match if specified time is met --length [!] length[:length] Examples: --length 500: length! 0 --limit-burst number --timestart value, --timestop value, --days days, --datestop days value is a time given in hh:mm format and days is Mon, Tue, Wed, etc

49 The Firewall: iptables You can add a default rule to serve at the end of a chain -P INPUT REJECT if the message does not match any rule in the INPUT chain, then reject it If you want to start with all new rules, use F to flush the current chain and then define new rules This makes more sense when you are defining rules from the command line To input a rule from the command line, prepend iptables to the rule as in iptables A INPUT To list all rules of a chain, use -L

50 The Firewall: iptables Here we look at an example P INPUT REJECT # default for incoming packets P OUTPUT ACCEPT # allow all outgoing messages P FORWARD DROP # do not perform forwarding # Forwarding is commonly used for routers, not workstations. A INPUT i lo j ACCEPT # accept anything over lo A INPUT p tcp --dport 22 j ACCEPT # accept incoming ssh A INPUT m state --state ESTABLISHED,RELATED j ACCEPT # accept continuation messages of previously established connections A INPUT p icmp j ACCEPT # accept ICMP messages A INPUT i eth0 s /24 j ACCEPT # accept messages from # subnet A INPUT p tcp s facebook.com --sports 80, 443 j DROP # drop webpage responses from facebook.com

51 The Firewall: iptables Additional rules A INPUT p tcp m multiport --dports 80,8080,443 m state --state NEW,ESTABLISHED -j ACCEPT -A INPUT s /13 j DROP A INPUT p tcp m multiport --dports 80, 443 m limit --limit 25/minute --limit-burst 100 j ACCEPT A INPUT p icmp --icmp-type echo-request j DROP A OUTPUT p icmp --icmp-type echo-reply j DROP A LOGGING --log-level 7 j LOG A LOG j DROP

52 Network Scripts We wrap up by looking at some shell scripts that might be useful tools try_ip( ) { ip=$1 num=$2 x=`ping c $num q $ip awk '/received/ {print $4}'` if [ $x eq 0 ]; then echo "$ip not responsive on `date` with $num tries" >> /root/net_stats/non_responding_devices.txt fi } list=( ) for ip in $list; do try_ip $ip 10 done

53 Network Scripts try_wget( ) { filename=$2.index /usr/bin/wget q --tries=$1 $2 O /root/$filename if [ -e $filename ] then rm /root/$filename return 0 else return 1 fi }

54 Network Scripts urls=( numattempts=0 contact=0 while [[ $contact eq 0 && $numattempts lt ${#urls[@]} ]] do u=${urls[numattempts]} try_wget 5 $u if [ $? eq 0 ]; then contact=1 fi numattempts=$((numattempts+1)) done if [ $contact eq 1 ]; then echo Warning, Internet connection appears to be down fi

55 Network Scripts list= # start list as NULL count=0 for user in `who egrep v $USER awk '{print $1}'`; do if [ -z `echo $list grep $user awk '{print $1}'` ]; then list="$list $user" fi done echo "Users at `date` are $list" >> /root/logged_in_users.txt

NETWORK CONFIGURATION AND SERVICES. route add default gw /etc/init.d/apache restart

NETWORK CONFIGURATION AND SERVICES. route add default gw /etc/init.d/apache restart NETWORK CONFIGURATION AND SERVICES route add default gw 192.168.0.1 /etc/init.d/apache restart NETWORK CONFIGURATION There are two main approaches to configuring a machine for network access: Static configuration

More information

Cluster Computing Spring 2004 Paul A. Farrell

Cluster Computing Spring 2004 Paul A. Farrell Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Internet Protocol Stack and Parameters NIC/OS Driver Maximum Amount of Data

More information

Certification. Securing Networks

Certification. Securing Networks Certification Securing Networks UNIT 9 Securing Networks 1 Objectives Explain packet filtering architecture Explain primary filtering command syntax Explain Network Address Translation Provide examples

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Linux Networking: network services

Linux Networking: network services Linux Networking: network services David Morgan Client and server: matched pairs Client process inter-process communication Server process 1 OK as long as there s a way to talk Client process Server process

More information

01/17/08 TDC /17/08 TDC363-03

01/17/08 TDC /17/08 TDC363-03 Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration

Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration Linux+ Guide to Linux Certification, Third Edition Chapter 12 Network Configuration Objectives Describe the purpose and types of networks, protocols, and media access methods Explain the basic configuration

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask 1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe

More information

LAN Setup Reflection

LAN Setup Reflection LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other

More information

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external?

LAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? LAN Setup Reflection Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other VMs in the classroom?

More information

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

Debian/GNU Linux Networking

Debian/GNU Linux Networking Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network

More information

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa IP Basics Unix/IP Preparation Course June 29, 2010 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are divided into separate

More information

Using the Command Line Interface

Using the Command Line Interface CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs

More information

Cluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks

Cluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Network Designs Impact of Network Design Security from outside attack Usability

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

THE INTERNET PROTOCOL/1

THE INTERNET PROTOCOL/1 THE INTERNET PROTOCOL a (connectionless) network layer protocol designed for use in interconnected systems of packet-switched computer communication networks (store-and-forward paradigm) provides for transmitting

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name

firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal"

More information

Static and source based routing

Static and source based routing Static and source based routing Lab setup For this lab students have to work in teams of two. Two team of two students (that is overall four students) should form a group and perform lab tasks together.

More information

TCP/IP Network Essentials

TCP/IP Network Essentials TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Application Layer Transport Layer Network Layer Link Layer Physical Layer 2 Application Layer HTTP DNS IMAP

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

IP Packet. Deny-everything-by-default-policy

IP Packet. Deny-everything-by-default-policy IP Packet Deny-everything-by-default-policy IP Packet Accept-everything-by-default-policy iptables syntax iptables -I INPUT -i eth0 -p tcp -s 192.168.56.1 --sport 1024:65535 -d 192.168.56.2 --dport 22

More information

Unit 28 Website Production ASSIGNMENT 1

Unit 28 Website Production ASSIGNMENT 1 Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web

More information

COMS3200/7201 Computer Networks 1 (Version 1.0)

COMS3200/7201 Computer Networks 1 (Version 1.0) COMS3200/7201 Computer Networks 1 (Version 1.0) Assignment 3 Due 8pm Monday 29 th May 2017. V1 draft (hopefully final) Note that the assignment has three parts Part A, B & C, each worth 50 marks. Total

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Fundamentals of Computer Networking AE6382

Fundamentals of Computer Networking AE6382 Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

Objectives. Chapter 10. Upon completion you will be able to:

Objectives. Chapter 10. Upon completion you will be able to: Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Assignment - 1 Chap. 1 Wired LAN s

Assignment - 1 Chap. 1 Wired LAN s Assignment - 1 Chap. 1 Wired LAN s 1. (1 Mark) 1. Draw the frame format of Ethernet. 2. What is unicast, multicast and broadcast address? 3. State the purpose of CRC field. 2. (5 Marks) 1. Explain how

More information

TCP, UDP Ports, and ICMP Message Types1

TCP, UDP Ports, and ICMP Message Types1 Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found

More information

Command Manual Network Protocol. Table of Contents

Command Manual Network Protocol. Table of Contents Table of Contents Table of Contents Chapter 1 IP Address Configuration Commands... 1-1 1.1 IP Address Configuration Commands... 1-1 1.1.1 display ip host... 1-1 1.1.2 display ip interface... 1-1 1.1.3

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information

ECE 435 Network Engineering Lecture 23

ECE 435 Network Engineering Lecture 23 ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 30 November 2017 HW#11 will be posted Announcements Don t forget projects next week Presentation

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer SE 4C03 Winter 2003 Final Examination Answer Key Instructor: William M. Farmer (1) [2 pts.] Both the source and destination IP addresses are used to route IP datagrams. Is this statement true or false?

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Review Questions 1. Which part of a MAC address is unique to each manufacturer? A. The network identifier B. The OUI C. The device identifier

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

Addresses, Protocols, and Ports Reference

Addresses, Protocols, and Ports Reference APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP

More information

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions [C HD] Applying Concepts: Configure Address Translation Using NAT At the end of this chapter, you ll create your own NAT translation table

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports APPENDIXB This appendix provides a quick reference for IP addresses, protocols, and applications. This appendix includes the following sections: IPv4 Addresses and Subnet Masks, page B-1 IPv6 Addresses,

More information

ip dhcp-client network-discovery through ip nat sip-sbc

ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery, page 3 ip dhcp-client update dns, page 5 ip dhcp drop-inform, page 8 ip dhcp-relay information option server-override,

More information

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Chapter 02 How Computers Find Each Other on Networks

Chapter 02 How Computers Find Each Other on Networks Chapter 02 How Computers Find Each Other on Networks TRUEFALSE 1. A hexadecimal number is a number written in the base 16 number system. (A) True (B) False 2. DNS follows a centralized database model.

More information

Stream Control Transmission Protocol - Wikipedia, the free encyclopedia

Stream Control Transmission Protocol - Wikipedia, the free encyclopedia Page 1 of 9 Stream Control Transmission Protocol From Wikipedia, the free encyclopedia In the field of The five-layer TCP/IP model 5. Application layer DHCP DNS FTP Gopher HTTP IMAP4 IRC NNTP XMPP MIME

More information

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview

More information

iptables and ip6tables An introduction to LINUX firewall

iptables and ip6tables An introduction to LINUX firewall 7 19-22 November, 2017 Dhaka, Bangladesh iptables and ip6tables An introduction to LINUX firewall Imtiaz Rahman SBAC Bank Ltd AGENDA iptables and ip6tables Structure Policy (DROP/ACCEPT) Syntax Hands on

More information

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 23th 2018 Last name: First name: Student number: I conrm with my signature that I will process the written examination alone and that I feel healthy and

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports This chapter provides a quick reference for IP addresses, protocols, and applications. IPv4 Addresses and Subnet Masks, page 1 IPv6 Addresses, page 5 Protocols and Applications, page 11 and Ports, page

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

LINUX ADMINISTRATION TYBSC-IT SEM V

LINUX ADMINISTRATION TYBSC-IT SEM V 1 LINUX ADMINISTRATION TYBSC-IT SEM V 2 UNIT 4 CHAPTER 1 : INTERNET SERVICES WHAT IS AN INTERNET SERVICE? Internet Service can be defined as any service that can be accessed through TCP/IP based networks,

More information

Network+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 5 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain how the TCP/IP protocols correlate

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

ECE 435 Network Engineering Lecture 23

ECE 435 Network Engineering Lecture 23 ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 4 December 2018 Announcements HW#9 graded Don t forget projects next week Presentation schedule

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture

( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Chapter 4 Software-Based IP Access Control Lists (ACLs)

Chapter 4 Software-Based IP Access Control Lists (ACLs) Chapter 4 Software-Based IP Access Control Lists (ACLs) This chapter describes software-based ACLs, which are ACLs that processed traffic in software or CPU. (This type of ACL was also referred to as flow-based

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Loadbalancer.org Virtual Appliance quick start guide v6.3

Loadbalancer.org Virtual Appliance quick start guide v6.3 Loadbalancer.org Virtual Appliance quick start guide v6.3 What are your objectives?...2 What is the difference between a one-arm and a two-arm configuration?...2 What are the different load balancing methods

More information

Appendix B Policies and Filters

Appendix B Policies and Filters Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control

More information

Network Administra0on

Network Administra0on Network Administra0on (Introduc0on) Administración en Red 1 Index Introduc0on (TCP/IP) Network Interface Link Layer Network Layer Monitoring/Test Administración en Red 2 Introduc0on (TCP/IP) Protocol Suite,

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information