Linux+ Guide to Linux Certification, Third Edition. Chapter 12 Network Configuration
|
|
- Olivia Harris
- 5 years ago
- Views:
Transcription
1 Linux+ Guide to Linux Certification, Third Edition Chapter 12 Network Configuration
2 Objectives Describe the purpose and types of networks, protocols, and media access methods Explain the basic configuration of TCP/IP Configure a Network interface to use TCP/IP Configure a modem, ISDN, and DSL interface Linux+ Guide to Linux Certification, 3e 2
3 Objectives (continued) Describe the purpose of host names and how they are resolved to IP addresses Configure TCP/IP routing Identify common network services Use command-line and graphical utilities to perform remote administration Linux+ Guide to Linux Certification, 3e 3
4 Networks Network: two or more computers joined via media and able to exchange information Local area networks (LANs): connect computers within close proximity e.g., used to allow connection to shared resources Wide area networks (WANs): connect computers separated by large distances e.g., used to connect to Internet Service Provider Internet service provider (ISP): company providing Internet access Linux+ Guide to Linux Certification, 3e 4
5 Networks (continued) Routers: computers capable of transferring information between networks Protocol: set of rules for communication between networked computers Packets: packages of data formatted by a network protocol Packets can be recognized by routers and other network devices Linux+ Guide to Linux Certification, 3e 5
6 Networks (continued) Linux network protocols: TCP/IP (Transfer Control Protocol/Internet Protocol) UDP/IP (User Datagram Protocol/Internet Protocol) IPX/SPX (Internetwork Packet Exchange/Sequence Packet Exchange) AppleTalk DLC (Data Link Control) DECnet (Digital Equipment Corporation network) Linux+ Guide to Linux Certification, 3e 6
7 Networks (continued) Media access method: defines how networked computers share access to the physical medium Contained within the hardware on NIC or modem Ethernet: most common network media access method Ensures that packets are retransmitted onto the network if a network error occurs Token ring: popular media access method Controls which computer has the ability to transmit information Linux+ Guide to Linux Certification, 3e 7
8 The TCP/IP Protocol Set of protocols with two core components TCP: ensures that packets are assembled in the correct order, regardless of arrival order IP: responsible for labeling each packet with destination address Together, TCP and IP ensure that information packets travel across the network as quickly as possible without getting lost Linux+ Guide to Linux Certification, 3e 8
9 IPv4 Addresses IP address: unique number that identifies a networked computer Octet: series of four 8-bit numbers Common format of IPv4 addresses Unicast: directed TCP/IP communication from one computer to another single computer Linux+ Guide to Linux Certification, 3e 9
10 IPv4 Addresses (continued) IPv4 addresses composed of two parts Network ID: network on which a computer is located Host ID: single computer on that network Two computers with different network IDs can have the same host ID Only computers with same network ID can communicate without a router Linux+ Guide to Linux Certification, 3e 10
11 Subnet Masks Define which part of IP address is the network ID and which part is the host ID Series of four octets Octet in subnet mask containing 255 is part of network ID Octet in subnet mask containing 0 is part of host ID ANDing: calculate network and host IDs from an IP address and subnet mask Compare binary bits Linux+ Guide to Linux Certification, 3e 11
12 Subnet Masks (continued) Figure 12-1: A sample IP address and subnet mask Linux+ Guide to Linux Certification, 3e 12
13 Subnet Masks (continued) = all networks = all computers on all networks 255 in an IP address can specify many hosts Broadcast addresses Linux+ Guide to Linux Certification, 3e 13
14 Default Gateway IP address of network interface on a router, to which you send packets Routers can distinguish between different networks Move packets between them Have assigned IP addresses on each attached network Linux+ Guide to Linux Certification, 3e 14
15 IPv4 Classes and Subnetting IP address class defines default subnet mask of associated device All IP address classes can be identified by first octet Class A: 8 bits for network ID, 24 bits for host ID Assigned to very large companies Class B: 16 bits for network ID, 16 bits for host ID Assigned to larger organizations with several thousand users Class C: 24 bits for network ID, 16 bits for host ID Used for small and home networks Linux+ Guide to Linux Certification, 3e 15
16 IPv4 Classes and Subnetting Multicast: TCP/IP communication destined for a certain group of computers Class D addresses Subnetting: divide a large network into smaller networks Control traffic flow Take bits from host ID; give to network ID Linux+ Guide to Linux Certification, 3e 16
17 IPv4 Classes and Subnetting (continued) Table 12-1: IP address classes Linux+ Guide to Linux Certification, 3e 17
18 The IPv6 Protocol Number of IP addresses using IPv4 is unsuitable for Internet growth IPv6 protocol: uses 128 bits to identify computers Addresses written using eight 16-bit hexadecimal numbers IPv6 address contains two portions First half assigned by ISP and identifies network Last half is link local portion: used to uniquely identify computers in a LAN Linux+ Guide to Linux Certification, 3e 18
19 The IPv6 Protocol (continued) Few networks have adopted IPv6 Proxy servers and NAT routers: computers or hardware devices that have an IP address and access to a network Used by other computers to obtain network resources on their behalf Allows computers behind different NAT routers or proxy servers to have the same IPv4 address Linux+ Guide to Linux Certification, 3e 19
20 Configuring a Network Interface If NIC detected during installation, Fedora Linux automatically configures appropriate driver insmod and modprobe commands: used to load kernel objects into the Linux kernel Can be used to load NIC drivers lsmod command: displays a list of currently loaded modules rmmod command: removes module from kernel Most modules loaded from dist.conf file in the /etc/modprobe.d directory Linux+ Guide to Linux Certification, 3e 20
21 Configuring a Network Interface (continued) ifconfig command: assign TCP/IP configuration to a NIC Also used without any arguments to view configuration of all network interfaces in computer dhclient command: receive TCP/IP configuration from DHCP or Boot Protocol (BOOTP) server Automatic private IP addressing (APIPA): automatic assignment of IP address in the absence of BHCP and BOOTP Linux+ Guide to Linux Certification, 3e 21
22 Configuring a Network Interface (continued) /etc/sysconfig/network-scripts/ifcfg-interface file: Stores NIC configurations Allows the system to activate and configure TCP/IP information at each boot time ifdown command: unconfigures a NIC ifup command: configures NIC using /etc/sysconfig/network-scripts/ifcfg-interface file ping (Packet Internet Groper) command: Check TCP/IP connectivity on a network -c option: limit the number of ping packets sent Linux+ Guide to Linux Certification, 3e 22
23 Configuring a Network Interface (continued) Figure 12-2: Configuring network interfaces Linux+ Guide to Linux Certification, 3e 23
24 Configuring a Network Interface (continued) Figure 12-3: Configuring TCP/IP information for a network interface Linux+ Guide to Linux Certification, 3e 24
25 Configuring a Network Interface (continued) Mobile commuters typically connect to many different NICs, both wired and wireless Network Manager daemon: allows users to quickly connect to wired and wireless networks from desktop environments Linux+ Guide to Linux Certification, 3e 25
26 Configuring a PPP Interface Run TCP/IP over serial lines using a WAN protocol Three common Point-to-Point Protocol (PPP) connection technologies: Modems ISDN DSL Linux+ Guide to Linux Certification, 3e 26
27 Configuring a PPP Interface (continued) Modems: send TCP/IP information across normal telephone lines Considered slow Transmit information on a serial port ISDN: set of standards designed to transmit data over copper telephone lines DSL: connects to Ethernet NIC and transmits data across normal telephone lines Linux+ Guide to Linux Certification, 3e 27
28 Configuring a PPP Interface (continued) Normally configured manually after Linux installation is complete Requires: Support for PPP compiled into kernel PPP daemon Supporting utilities such as chat program Can use graphical programs to configure files and utilities to allow PPP communication Linux+ Guide to Linux Certification, 3e 28
29 Configuring a PPP Interface (continued) Figure 12-5: Adding a network interface Linux+ Guide to Linux Certification, 3e 29
30 Configuring a PPP Interface (continued) Information about PPP devices stored in files named ifcfg-internetserviceprovidername Located in /etc/sysconfig/network-scripts directory Other configurations used by PPP daemon stored in /etc/ppp and /etc/isdn directories Incorrect passwords are the most common problem with PPP connections Need to activate PPP device after configuration Linux+ Guide to Linux Certification, 3e 30
31 Name Resolution Hostnames: user-friendly computer name Fully qualified domain name (FQDN): hostname following DNS convention DNS: hierarchical namespace for host names whois command: used to obtain registration information about a domain within a name space hostname command: view or set a computer s host name Linux+ Guide to Linux Certification, 3e 31
32 Name Resolution (continued) Figure 12-6: The domain name space Linux+ Guide to Linux Certification, 3e 32
33 Name Resolution (continued) TCP/IP cannot identify computers via hostnames Must map hostnames to IP addresses Can be done by placing entries in the /etc/hosts file ISPs list FQDNs in DNS servers on Internet Applications request IP addresses associated with a specific FQDN Configure by specifying the IP address of the DNS server in /etc/resolv.conf file Linux+ Guide to Linux Certification, 3e 33
34 Routing Route table: list of TCP/IP networks stored in system memory route command: displays the route table Multihomed hosts: computers with multiple network interfaces IP forwarding: forwarding packets from one interface to another Also known as routing Linux+ Guide to Linux Certification, 3e 34
35 Routing (continued) Enabling routing: Place number 1 in: /proc/sys/net/ipv4/ip_forward for IPv4 /proc/sys/net/ipv6/conf/all/forwarding for IPv6 To enable routing at every boot: Edit the /etc/sysctl.conf file to include: net.ipv4.ip_forward = 1 for IPv4 net.ipv6.conf.default.forwarding = 1 for IPv6 Linux+ Guide to Linux Certification, 3e 35
36 Routing (continued) Large networks may have several routers Packet may travel through several routers May require adding entries in the router table route add <route> command: add entries to route table route del <route> command: remove entries from route table ip command: can be used to manipulate the route table Linux+ Guide to Linux Certification, 3e 36
37 Routing (continued) Figure 12-7: A sample routed network Linux+ Guide to Linux Certification, 3e 37
38 Routing (continued) Contents of route table lost when computer powered off Add to /etc/rc.d/rc.local file Most routers configured with a default gateway For packets addressed to destinations not in route table traceroute command: troubleshoot routing Displays routers between current and remote computer Linux+ Guide to Linux Certification, 3e 38
39 Network Services Must identify types and features of network services before they can be configured Network services: processes that provide some type of valuable service for client computers on network Often presented by daemon processes that listen to certain requests Daemons identify packets to which they should respond using a port number Linux+ Guide to Linux Certification, 3e 39
40 Network Services (continued) Port: number uniquely identifying a network service Ensure that packets delivered to proper service Range from 0 to /etc/services file: lists ports and associated protocol Well-known port: ports from 0 to 1023 Represent commonly used services Linux+ Guide to Linux Certification, 3e 40
41 Network Services (continued) Table 12-2: Common well-known ports Linux+ Guide to Linux Certification, 3e 41
42 Network Services (continued) Internet super daemon (xinetd): initializes appropriate daemon to provide needed network service Stand-alone daemons: daemons that provide network services directly Log information themselves to subdirectories under /var/log chkconfig command or ntsysv utility can be used to configure most stand-alone daemons to start in various runlevels Linux+ Guide to Linux Certification, 3e 42
43 Network Services (continued) Figure 12-8: Interacting with network services Linux+ Guide to Linux Certification, 3e 43
44 Network Services (continued) Table 12-3: Common network services Linux+ Guide to Linux Certification, 3e 44
45 Network Services (continued) Table 12-3 (continued): Common network services Linux+ Guide to Linux Certification, 3e 45
46 Network Services (continued) Table 12-3 (continued): Common network services Linux+ Guide to Linux Certification, 3e 46
47 Network Services (continued) Table 12-3 (continued): Common network services Linux+ Guide to Linux Certification, 3e 47
48 Remote Administration: Telnet telnet command: traditionally used to obtain a command-line shell on remote server Receives host name or IP address of remote computer as argument Easiest way to perform remote administration Need to install telnet daemon using yum command Use regular commands and exit to kill remote BASH shell Linux+ Guide to Linux Certification, 3e 48
49 Remote Commands Remote commands: set of commands that can be used to execute commands on remote systems yum install rsh-server rlogin command: obtains a shell from remote computer on network rcp command: copies files between computers rsh command: used to execute a command on a remote computer Linux+ Guide to Linux Certification, 3e 49
50 Remote Commands (continued) r commands allow access to remote computers without a password, if remote computer has trusted access Trusted access: computers allowed to access a computer without providing a password Does not apply to root user Methods of setting up: Add host names of computers to /etc/hosts.equiv Create and.rhosts file in the home directory of each user who should get trusted access Linux+ Guide to Linux Certification, 3e 50
51 Secure Shell (SSH) Secure Shell (SSH): encrypts information passing between computers Secure replacement for r commands ssh command: connects to a remote computer running ssh daemon Receives host name or IP address of target computer as argument Accept RSA encryption fingerprint for target computer Can be used to transfer files between computers Linux+ Guide to Linux Certification, 3e 51
52 Secure Shell (SSH) (continued) Main types of encryption supported by ssh daemon: Triple Data Encryption Standard (3DES) Advanced Encryption Standard (AES) Blowfish Carlisle Adams Stafford Tavares (CAST) ARCfour Linux+ Guide to Linux Certification, 3e 52
53 Remote X Windows X Windows is a network application Can be used to obtain graphical utilities from remote Linux computer To obtain graphical utilities using X Windows: Edit /etc/gdm/custom.conf Use xhost + command within a graphical terminal to allow other computers to write X Windows clients on your computer Connect to remote computer with telnet or ssh, and export DISPLAY variable of the local computer Linux+ Guide to Linux Certification, 3e 53
54 Virtual Network Computing (VNC) Graphical option for administering Linux remotely Other computers run VNC client that connects to VNC server daemon installed on local computer to obtain a desktop environment Remote FrameBuffer (RFB): platform-independent protocol used to transfer graphics, mouse movements and keystrokes across network vncpasswd command: used to configure password for VNC connection vncviewer command: connects to VNC server Linux+ Guide to Linux Certification, 3e 54
55 Summary A network is a collection of connected computers that share information A protocol is a set of rules that defines the format of information that is transmitted across a network Each computer on a TCP/IP network must have a valid IPv4 or IPv6 address The IPv4 configuration of a network interface can be specified manually, obtained automatically from a DHCP or BOOTP server, or autoconfigured by the system Linux+ Guide to Linux Certification, 3e 55
56 Summary (continued) The IPv6 configuration of a network interface can be obtained from a router using ICMPv6, from a DHCP server, or autoconfigured by the system The /etc/sysconfig/network-scripts directory contains the configuration for NIC and PPP interfaces Host names are computer names that are easy for humans to remember; host names that follow the DNS are FQDNs Host names must be resolved to an IP address before network communication can take place Linux+ Guide to Linux Certification, 3e 56
57 Summary (continued) Routers are devices that forward TCP/IP packets from one network to another; each computer and router has a route table used to determine how TCP/IP packets are forwarded Network services are started by the Internet Super Daemon or by stand-alone daemons There are many ways to remotely administer a Linux system, including the telnet, rsh, rcp, rlogin, and ssh commands, X Windows and VNC Linux+ Guide to Linux Certification, 3e 57
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols
Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds
More informationCluster Computing Spring 2004 Paul A. Farrell
Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Internet Protocol Stack and Parameters NIC/OS Driver Maximum Amount of Data
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationChapter 6. The Protocol TCP/IP. Introduction to Protocols
Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationUnit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask
1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationCCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)
CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationNetwork+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking
Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationNetworks: Communicating and Sharing Resources
Networks: Communicating and Sharing Resources 1 Network Fundamentals Networks o Links multiple computer systems and enables them to share data and resources o Types of computer networks: Local area network
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationLAN Setup Reflection
LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other
More informationAdvanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices
Advanced Network Administration 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices 2. Duration 5 Days 3. Purpose This five day course for L-2 Network
More informationCluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks
Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Network Designs Impact of Network Design Security from outside attack Usability
More informationNetwork Access Layer Internet Layer Transport Layer Application Layer. Presentation. Transport. Physical
TCP/IP AND INTERNET ADDRESSING TCP/IP (TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL) TCP/IP is the most common networking protocol suite used in the world, each computer or node connected to the internet
More information1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?
95 Chapter 7 TCP/IP Protocol Suite and IP Addressing This chapter presents an overview of the TCP/IP Protocol Suite. It starts with the history and future of TCP/IP, compares the TCP/IP protocol model
More informationNETWORK CONFIGURATION AND SERVICES. route add default gw /etc/init.d/apache restart
NETWORK CONFIGURATION AND SERVICES route add default gw 192.168.0.1 /etc/init.d/apache restart NETWORK CONFIGURATION There are two main approaches to configuring a machine for network access: Static configuration
More informationNetwork+ Guide to Networks 5 th Edition. Chapter 4 Introduction to TCP/IP Protocols
Network+ Guide to Networks 5 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain how the TCP/IP protocols correlate
More information1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking
Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationLinux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationIP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa
IP Basics Unix/IP Preparation Course June 29, 2010 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are divided into separate
More informationMiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101
More informationComputer Networking Fundamentals
Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4414 / Version: 01 Measuring What Matters Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical
More informationBinary Octet to Decimal Format Conversion
IP Address An IP (Internet Protocol) address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationA+ Certification Guide. Chapter 16 (Part B) Networking
A+ Certification Guide Chapter 16 (Part B) Networking Chapter 16 (Part B) Objectives Installing and Configuring Network Interface Cards Networking Configuration for Small Network Switches and Routers Setting
More information01/17/08 TDC /17/08 TDC363-03
Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows
More informationNetworking Theory CSCI 201 Principles of Software Development
Networking Theory CSCI 201 Principles of Software Development Jeffrey Miller, Ph.D. jeffrey.miller@usc.edu Networking Overview IP Addressing DNS Ports NAT Subnets DHCP Test Yourself Outline USC CSCI 201L
More informationUnit 09 Computer Networks
Unit 09 Computer Networks Gain a knowledge about network devices. Discuss what network devices are required to create a basic network Draw a bespoke network drawing using Visio 2 In order to setup a network
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking
Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationUIP1869V User Interface Guide
UIP1869V User Interface Guide (Firmware version 0.1.8 and later) Table of Contents Opening the UIP1869V's Configuration Utility... 3 Connecting to Your Broadband Modem... 5 Setting up with DHCP... 5 Updating
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationJaringan Komputer (CCNA-1)
Jaringan Komputer (CCNA-1) #2 Configuring a Network Operating System Susmini I. Lestariningati, M.T Introduction (1) Home networks typically interconnect a wide variety of end devices including PCs, laptops,
More informationCNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems
Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...
More informationChapter 02 How Computers Find Each Other on Networks
Chapter 02 How Computers Find Each Other on Networks TRUEFALSE 1. A hexadecimal number is a number written in the base 16 number system. (A) True (B) False 2. DNS follows a centralized database model.
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationMicrosoft Exam
Volume: 176 Questions Question No: 1 One advantage of dynamic routing is that it: A. Automatically maintains routing tables. B. Limits traffic derived from routing protocols. C. Reduces broadcast traffic.
More informationDNS is the mechanism by which Internet software translates names to attributes such as addresses.
Full form: 1 PSTN : Public Switching Telephone Networks 2 ISDN : Integrated Services Digital Network. 3 DSL: Digital Subscribe Line. 4 CATV: Community Antenna Television. 5 DHCP: Dynamic Host Configuration
More informationNetworking Fundamentals Tom Brett
Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct
More informationChapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office
ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing
More informationCOPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.
Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small
More informationCCNA 1 Chapter 2 v5.0 Exam Answers %
CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when
More informationChapter 6: Network Layer
Chapter 6: Network Layer CCNA Routing and Switching Introduction to Networks v6.0 Chapter 6 - Sections & Objectives 6.1 Network Layer Protocols Explain how network layer protocols and services support
More informationFundamentals of Computer Networking AE6382
Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually
More informationSonicWALL TZ 150 Getting Started Guide
SonicWALL TZ 150 Getting Started Guide SonicWALL TZ 150 Security Appliance Getting Started Guide The SonicWALL TZ 150 is a total security platform delivering true layered security by integrating gateway
More informationMobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE
Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the
More informationFundamentals of Windows Server 2008 Network and Applications Infrastructure
COURSE OVERVIEW This five-day instructor-led course introduces students to network and applications infrastructure concepts and configurations provided by Window Server 2008. Students will be able to acquire
More informationexam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationCS 3201 Computer Networks 2014/2015 Handout: Lab 4
CS 3201 Computer Networks 2014/2015 Handout: Lab 4 Lab Content: - IP Addressing - IP Ports TCP/IP Fundamentals TCP/IP Settings - TCP/IP is a protocol that requires a little bit of knowledge to configure
More informationConfiguring the IP Settings
This section describes how to set up and configure the Management, DATA1, and DATA2 ports for the D9800 Network Transport Receiver. Setting up the IP Information, page 1 Setting up the Unicast Routing
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationTCP/IP Network Essentials
TCP/IP Network Essentials Linux System Administration and IP Services AfNOG 2012 Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationNetwork Devices Introduction into Network Devices
Network Devices Introduction into Network Devices Aims Gain a knowledge about network devices. Discuss what network devices are required to create a basic network Draw a bespoke network drawing using Visio
More informationLecture (03) Internet Protocol tcp/ip> OSI>
Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationEntry Level Assessment Blueprint Computer Networking Fundamentals
Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment safety and maintenance
More informationLAN Setup Reflection. Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external?
LAN Setup Reflection Ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other VMs in the classroom?
More informationCCRI Networking Technology I CSCO-1850 Spring 2014
CCRI Networking Technology I CSCO-1850 Spring 2014 Instructor John Mowry Telephone 401-825-2138 E-mail jmowry@ccri.edu Office Hours Room 2126 Class Sections 102 Monday & Wednesday 6:00PM-9:50PM, starts
More informationINTRODUCTION. What You Need to Read. What this LANbook Covers
Qwest DSLSM LANbook INTRODUCTION What You Need to Read If you are self-installing Qwest DSL on a local area network in your home or business, start with Chapter 1: Welcome to the Qwest DSL LANbook on page
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationSpecialized Programme on Internetworking Design and LAN WAN Administration
Specialized Programme on Internetworking Design and LAN WAN Administration OBJECTIVE OF THE PROGRAMME The main objective of the programme is to build capacity of the professionals drawn from industry,
More informationCTS2134 Introduction to Networking. Module : Troubleshooting
CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server
More informationMiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
CCNA1 v6.0 Chapter 2 Exam Answers 2017 (100%) MiPDF.COM 1. What is the function of the kernel of an operating software? It provides a user interface that allows users to request a specific task. The kernel
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along
More informationChapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network
Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationOn Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964
The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format
More informationSYLLABUS. Departmental Syllabus. Applied Networking I. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 1/30/2015 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: Applied Networking I CRTE0115 CREDIT HOURS: 2 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL:
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More informationPreface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.
Preface to the First Edition p. xv Preface to the Second Edition p. xvii Acknowledgments p. xix UNIX Operating System Environment p. 1 UNIX: Past and Present p. 2 History and Growth of UNIX p. 2 Flavors
More informationCTS2134 Introduction to Networking. Module Network Implementation
CTS2134 Introduction to Networking Module 05.5 05.8 Network Implementation NAT Facts NAT (Network Address Translation) allows you to connect a private network to the Internet without obtaining registered
More informationnetworks List various types of networks and their
Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationHome Networking. A home network generally conforms to one of the following configurations
Home Networking A home network generally conforms to one of the following configurations A stand-alone computer connected to the Internet. A peer-to-peer network containing two or more computers with no
More informationNetwork+ Guide to Networks, Seventh Edition Chapter 2, Solutions
Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions [C HD] Applying Concepts: Configure Address Translation Using NAT At the end of this chapter, you ll create your own NAT translation table
More informationTestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified
TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:
More informationCCNA 1 Chapter 2 v5.0 Exam Answers 2013
CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same
More informationNetworking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com
Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable
More informationComputer Networking Fundamentals
Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Copyright 2016. All Rights Reserved. General Assessment Information Computer Networking Fundamentals Blueprint
More informationTroubleshooting. Contacting Cisco TAC. Checking the Version Number of Cisco Configuration Engine APPENDIXA
APPENDIXA This appendix provides troubleshooting information. It contains information about: Contacting Cisco TAC Checking the Version Number of Cisco Configuration Engine Cannot Log in to the System System
More informationSOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0
SOHO 6 Wireless Installation Procedure Windows XP with Internet Explorer 5.x & 6.0 Before you Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card installed
More informationAppendix B Networks, Routing, and Firewall Basics
Appendix B Networks, Routing, and Firewall Basics This appendix provides an overview of IP networks, routing, and firewalls. Related Publications As you read this document, you may be directed to various
More informationIntroduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies
Introduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies p. 19 Ethernet p. 19 WAN Technologies p. 21 Dedicated
More informationIP Addressing and Subnetting
IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet
More informationCOMPUTER NETWORKING LAB EXERCISES (TP) 4
Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 4 IPV6 December 14, 2009 Abstract In this TP you will revisit some of the basic networking tools that were introduced in TP1, only this
More informationTroubleshooting Your Network
Troubleshooting Your Network Networking for Home and Small Businesses Chapter 9 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name, logo and
More informationThe OSI model of network communications
The OSI model of network communications The TCP/IP networking layers are mapped to the OSI model The Next Generation TCP/IP stack IPv6 is supported natively in Windows Vista, Windows 7, Windows Server
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram
More informationVendor: Cisco. Exam Code: Exam Name: Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Version: Demo
Vendor: Cisco Exam Code: 100-105 Exam Name: Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1 v3.0) Version: Demo DEMO QUESTION 1 If the resume command is entered after the sequence that is
More informationCertified Cisco Networking Associate v1.1 ( )
Certified Cisco Networking Associate v1.1 (640-802) Exam Description: The Cisco Certified Networking Associate v1.1 640-802 is the composite exam that is associated with Cisco CCNA Routing and Switching
More information8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista
8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and
More informationModule 9: TCP/IP Protocol Suite and IP Addressing
Module 9: TCP/IP Protocol Suite and IP Addressing 9.1 Introduction to TCP/IP 9.1.2 Application layer The application layer handles high-level protocols, representation, encoding, and dialog control. The
More informationCCNA. Course Catalog
CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)
More information