Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff

Size: px
Start display at page:

Download "Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff"

Transcription

1 Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff Data security professionals in many organizations must protect data and applications running on local area networks (LANs). To do this, they should first understand how the components of their networks function. Then, they should learn how their particular network operating systems provide security. This article both explains the functions of LAN components and describes the security provisions of one of the most widely used operating systems Novel's NetWare. A companion article, Threats to NetWare Enterprise LANs ( ), describes threats to the NetWare enterprise LANs and recommends how to mitigate these dangers. Problems Addressed A LAN that houses important data and applications is known as an enterprise LAN. The security considerations involved in securing such a system differ dramatically from those found with traditional mainframes. For example, in the open environment of enterprise LANs, dial-in and dial-out activities occur frequently, and viruses often disrupt operations. Enterprise LANs must therefore be tightly controlled to ensure that they are maintained in a safe, reliable manner. The leading LAN operating systems used to construct complex networks are Novell's NetWare 3.X, Novell's NetWare 4.X, and Microsoft's Windows NT 3.X. Collectively, the two Novell operating systems account for more than 60% of the LAN installation base worldwide. This article provides an overview of the network environment and offers some suggestions on what to consider in securing NetWare enterprise LANs. Network Hardware Components An enterprise LAN contains four kinds of hardware components microcomputers, a cabling system, a file server, and a network traffic controlling device. Understanding these components is crucial to controlling and securing a LAN. Microcomputers The most visible component of all LANs is the microcomputer. Its main board (i.e., mother board or system board) links many of the microcomputer's internal components to each other (see Exhibit 1). Located on the main board is the Central Processing Unit chip, which directs all computer activities and performs such basic computer operations as executing computer instructions and performing input/output (I/O) operations. Random access memory(ram) chips and read-only memory (ROM) chips are also found on the main board. RAM chips house temporary data and instructions for computer execution, and ROM chips store permanent manufacturer-embedded, low-level instructions. Diagram of Main Board Computer peripherals include keyboards, display monitors, mouses, disk drives, and printers. A large section of a main board contains bus (i.e., expansion) slots where

2 peripherals are connected to the main board by expansion cards. Each peripheral communicates with the central processing unit (CPU) through its expansion card by using a unique I/O path that consists of four parameters interrupt level, memory address, ROM/ RAM address, and Direct Memory Access channel. Every time a new peripheral is added to a microcomputer, these four parameters must be properly configured to allow the new peripheral to exist harmoniously with other peripherals on the same main board. A user can configure a Disk Operating System-based microcomputer to support a unique combination of hardware and applications by configuring two microcomputer configuration files CONFIG.SYS and AUTOEXEC.BAT. The two files are typically stored in the root directory of the main hard drive. The CONFIG.SYS file instructs the DOS operating system how to run various peripherals and components. Commands in the AUTOEXEC.BAT file automatically perform a sequence of routines immediately after the instructions in the CONFIG.SYS file have been completely executed. Cabling System Each microcomputer connected to a NetWare LAN must have a Network Interface Card inserted into one of the bus slots residing on the main board. Again, the interrupt level, memory address, ROM/RAM address, and Direct Memory Access channel must be uniquely configured to allow the card to coexist with other peripherals. Next, the Network Information Center card is connected to the network's cabling system so the microcomputer can transmit data to and receive data from other computers on the network. The cabling system can vary in physical shape, transmission capacity, medium access control (MAC) method, and cost. The physical shape of a cabling system is known as its topology. The three basic network topologies are linear bus, star, and token ring; they are diagramed in Exhibit 1. In a linear bus topology, computers are connected to a central coaxial cable. In star and tokenring topologies, computers are connected to a concentrator, or hub. Token-ring concentrators manage network traffic more efficiently than star concentrators. A cabling system's transmission capacity typically depends on its medium type. Fiber optic cable has a much higher transmission capacity than coaxial cable (i.e., 100M bits per second versus 10M bits per second). The way in which a microcomputer accesses a cabling system to send data is called its MAC method. When a MAC method known as carrier sense multiple access with collision detection (Carrier Sense Multiple Access/Collision Detection) is used, the NIC card of the transmitting microcomputer first senses the cabling system to ensure that the cabling system is free of network traffic. Then, data is transmitted. Microcomputers on the network constantly monitor the cabling system to determine if data transmitted by one microcomputer collides with data transmitted by another. If a microcomputer detects a collision anywhere on a segment, that microcomputer transmits a jam pattern to inform other microcomputers on the same segment of the collision so they will refrain from transmitting data until the collision has cleared. Token ring is another MAC method. With it, a token circulates in the cabling system to invite microcomputers to transmit their data. A microcomputer can transmit data only after it has taken custody of the token; others must wait until it completes its transmission and releases the token. The cost of a cabling system depends on its topology, transmission capacity, and MAC method. When designing a network, network engineers select a combination of these factors that will meet the company's network traffic demand for the lowest possible installation and maintenance costs.

3 File Server Each network has at least one microcomputer that acts as a file server a powerful computer that stores data and software and sends data to other microcomputers, called clients. Clients are network microcomputers that are used by end users to perform their business duties. NetWare 3.X requires at least 4M bytes of RAM, and NetWare 4.X needs at least 8M bytes. However, because the file server often holds temporarily on RAM chips a great deal of data that will be written to its hard drive or transmitted to clients, its actual memory requirement may be much higher, depending on how busy the server is or how many users it supports. Because a file server may have several large hard disks that centrally house group, departmental, or corporate data and software, the size of this storage medium depends on the amount of data, the number and size of programs, and the number of users that it supports. The file server's hard disk is divided into DOS and NetWare partitions. The DOS partition houses the file server's main operating system program, called SERVER.EXE, which boots the file server. The NetWare partition, where network data and applications are kept, is further broken down into volumes. The SYS: volume contains all NetWare network commands and utilities, and possibly user data and application software, if desired. Network Traffic Controlling Device A complex LAN can include multiple network segments, or subnetworks. One segment may have too much network traffic, and another may have very little. One segment may cover a large geographical area, yet another may cover a small area. A network with multiple segments needs such devices as bridges, repeaters, or routers (see Exhibit 1). Bridges reduce heavy network traffic on a segment by isolating network data of different groups of microcomputers on different sections of the segment. When a computer transmits its data to a remote network segment, repeaters extend the transmission distance of the cabling system, and routers move data to its destination by switching data from segment to segment. Network Software The network hardware components previously described are common to all LANs, regardless their Network Operating System. Hardware components by themselves do not initiate network traffic, but software components do. An application residing on the file server or on the client's microcomputer initiates network data and passes it to the network operating systems for transmission on the cabling system. An organization can use NetWare, Windows NT, another system, or a combination of these as its Network Operating System. When NetWare is chosen, it must be installed on both the file server and the client microcomputers to permit client/server communications. Network printing activities can be managed by print server software. However, if dialin and dial-out activities become a security concern, communications server software can be purchased and installed to manage printing activities. File Server The most important operating system software in NetWare is SERVER.EXE, which is stored on the Disk Operating System partition of the file server's hard disk. When SERVER.EXE is loaded, it takes over the operation of the computer from DOS. Peripheral interface software is another kind of operating system software. Developed by hardware manufacturers and distributed by Novell, this software includes such

4 programs as disk and Network Information Center. card drivers. They allow NetWare to communicate with various types of hard drives and Network Interface Card. NetWare loadable modules (NLMs) are typically developed by Novell or third parties to provide additional network capabilities to those provided by SERVER.EXE. Many NLMs are already bundled with the operating system software; others must be purchased as add-on products. STARTUP.NCF and AUTOEXEC.NCFare file server boot files. They work as CONFIG.SYS and AUTOEXEC.BAT files do in the DOS environment. STARTUP.NCF loads disk drivers to allow NetWare to communicate with various types of hard drives. AUTOEXEC.NCF defines the file server's network environment (i.e., name, file server ID, network address) and loads additional NLMs or services not provided by SERVER.EXE. These boot files are created and customized during the file server's installation. The last category of operating system software consists of login scripts and menus for customizing the user environment. A login script typically is a set of instructions that locates directories or applications needed by a user or group of users. A client logging into the file server automatically executes a script stored on the file server's hard disk. Menus show the user a list of application software for selection. Both login scripts and menus can be created or modified during the file server's installation, the installation of a new application, or the creation of a new user or group of users. Client Microcomputers A series of operating system programs must be loaded on the microcomputer's RAM chips for it to communicate with the network file server. The first program is VLM.EXE; it determines whether an application I/O request is for local or network processing. A local request is sent to DOS; a network request is sent to IPXODI.COM for network processing. The second program, IPXODI.COM, contains various protocol stacks to format data to be sent to the file server. The third operating system program is a Network Interface Card driver such as NE2000.COM, which moves data from RAM chips into the network interface card (NIC) so it can be transmitted on the cabling system. The fourth program is the Link Support Layer, or LSL.COM, which determines the format of incoming network data in order to send the data to the appropriate protocol stack in IPXODI.COM for processing. Print Server Network users can print on a local printer connected directly to their microcomputers, on a network printer attached to a file server, or on a printer connected to another network microcomputer. Network printing activities are managed by print server software. This software is created by using a NetWare utility named PCONSOLE and can reside on a microcomputer dedicated to the printing task (i.e., a dedicated print server) or on the file server. Network printers are typically connected to a microcomputer where the print server software resides. Client microcomputers sending their print jobs to network printers must execute a CAPTURE command to route print jobs to appropriate print queues. There, print jobs wait to be retrieved by the print server software for routing to the appropriate printer. Communications Server Dial-in dial-out activities on a NetWare network can be supported by widely dispersed modems and such simple communications software as PCAnywhere. However, but this arrangement provides little control or audit trail. When remote activities become a security concern, modems can be consolidated on a few modem boards installed on a single microcomputer so that remote users can be organized and controlled with communications

5 server software. This software must reside on the microcomputer housing the modems. This microcomputer can be a dedicated communications server or an existing file server. Novell's current communications server software, called Net Connect, can efficiently manage a pool of modems, control remote access to the network, and generate dial-in/dialout audit data. NetWare Security Levels NetWare 3.X and 4.X protect resources residing on the file server with three levels of security: user authentication, directory and file system security, and directory and file attributes. NetWare 4.X provides an additional level of security, NetWare Directory Services. Remote users are first authenticated by Net Connect if this software is in use. Both remote and local users are authenticated by the login process in which a valid user name and password are verified. Additional login restrictions(e.g., date, time, other password measures, intruder protection, and Network Information Center hardware address) are also available to restrict access to the file server. Directory and File System Security The second level of security is directory and file system security. It restricts access to various directories and files on the file server to users or user groups that have been granted appropriate rights. A summary of NetWare rights is provided in Exhibit 2. A user receives access rights to a given directory or a file from three different sources: rights from these sources are additive. These sources are: The explicit granting of access rights to a user. The explicit granting of access rights to a group to which the user belongs. The explicit granting of access rights to a user. NetWare Access Rights Rights Read Write Create Erase Modify File scan Access Control Description Gives user the right to open files in the directory and read their contents or to run programs. Gives the user the right to open and change the contents of files. Gives the user the right to create new files and subdirectories. Gives the user the right to delete a directory, its files, and subdirectories. Gives the user the right to change the attributes or name of directories and files. Gives the user the right to see files and directories. Gives the user the right to change access privileges and inherited rights filters.

6 Supervisory Gives the user all rights to a directory, its files and subdirectories. Supervisory directory/file rights cannot be blocked by an inherited rights filter. A user who has supervisory rights can grant any right to other users. Rights Description Read Gives user the right to open files in the directory and read their contents or to run programs. Write Gives user the right to open and change contents of files. Create Gives user the right to create new files and subdirectories. Erase Gives user the right to delete a directory, its files, and subdirectories. Modify Gives user the right to change the attributes or name of directories and files. File Scan Gives user the right to see files and directories. Access Control Gives user the right to change access privileges and inherited rights filters. Supervisory Gives user all rights to a directory, its files and subdirectories. Supervisory directory/file rights cannot be blocked by an inherited rights filter. A user who has supervisory rights can grant any right to other users * Note: An inherited rights filter is a technique for removing certain rights from flowing down to lower-level subdirectories. This final source of access rights is called security equivalence. Rights given to a user at a given directory flow down to lower-level subdirectories and their files. In other words, the user inherits the same rights at lower-level directories as those explicitly granted at a higher-level directory. The inheritance of access rights can be curtailed or stopped by the use of inherited rights filters or by a new granting of access rights at lower-level subdirectories. Access rights are granted by using either the SYStem CONsole utility or the FILER utility in Novell 3.X or using the NetWare Administrator graphical utility in Novell 4.X. Inherited rights filters are set by using FILER in Novell 3.X or using NetWare Administrator graphical utility in Novell 4.X. Directory and File Attributes The third level of security is the use of directory and file attributes. They are considered another form of prevention control. A summary of NetWare directory and file attributes is provided in Exhibit 3. NetWare Directory and File Attributes Abbreviation A CI DI X H P Attribute Archive Needed (files only) Copy Inhibit (files only) Delete Inhibit (files and directories) Execute Only (files only) Hidden (files and directories) Purge(files and directories)

7 Ro Rw RI Sh Sy T Read Only (files only) Read Write (files only) Rename Inhibit (files and subdirectories) Shareable (files only) System (files and directories) Transactions (files only) Abbreviation Attribute A Archive Needed (files only) CI Copy Inhibit (files only) DI Delete Inhibit (files and directories) X Execute Only (files only) H Hidden (files and directories) P Purge (files and directories) Ro Read Only (files only) Rw Read Write (files only) RI Rename Inhibit (files and subdirectories) Sh Shareable (files only) Sy System (files and directories) T Transaction (files only) Directory and file attributes can be used to override directory and file access rights when they have been applied to prevent all network users and groups from gaining unwanted access to specific directories or files. For example, if a user has been explicitly granted the eraseright to a file, but a read-only attribute has been assigned to the file, the user cannot erase the file. To erase the file, the user must change the file's attribute to read/write before erasing it. Directory and file attributes are set using the FLAG utility in Novell 3.X or the NetWare Administrator graphical utility in Novell 4.X. NetWare Directory Services With NetWare 3.X, a server defines and manages users, groups, network resources, and network security. NetWare 4.X, on the other hand, has a network management feature known as NetWare Directory Services (NDS) that manages users, groups, network resources, and network security globally. In a NetWare 4.X network, business units, subunits, groups, users, file servers, and print servers are called objects. They are defined, tied together hierarchically, and stored in a common data base called an NDS data base. Objects are of two types: container and leaf. Container objects contain other objects. In addition to leaf objects, container objects can contain business unit, subunit, or user group objects. Leaf objects are terminal objects and typically include users, file servers, and print servers. Access to the NDS data base is necessary to manage network resources, and it is governed by NDS security. Only users with network administrative responsibilities can access all or part of the data base. It is secured in the same way as directory and file system access is; network administrators are granted the rights necessary to manage the entire NDS data base or a few container objects. A summary of NDS object rights is provided in Exhibit 4. Object Rights Rights Description

8 Supervisor Browse Create Rename Gives administrator all access privileges to the object. However, a privilege can be blocked by an inherited rights filter. Gives administrator the right to see the object in the NDS database. Gives administrator the right to create a new object in the NDS database. Gives administrator the right to change the name of the object in the NDS database. Rights Description Supervisor Gives administrator all access privileges to the object. However, a privilege can be blocked by an inherited rights filter. Browse Gives administrator the right to see the object in the NDS data base. Create Gives administrator the right to create a new object in the NDS data base. Rename Gives administrator the right to change the name of the object in the NDS data base. Rights given to an administrator at a given container object flow down to lower-level objects. In other words, the administrator inherits the same administrative rights at lowerlevel objects as those object rights explicitly granted at a higher-level container object. However, the inheritance of object rights can be curtailed or stopped by the use of inherited right filters. This feature allows different sections of the NDS data base to be administered by different administrators by completely blocking object rights given to other NDS administrators from higher-level container objects. LAN administrators with appropriate NDS rights can explicitly grant two types of access: NDS and file and directory. They can grant NDS access to another LAN administrator to manage a user, group of users, subunit, or business unit. File and directory access can be granted directly to a user, a group of users, a subunit, or a business unit. NDS is therefore a powerful tool for managing network resources globally. Because the NDS data base stores all network resource information and access control data, it is the one gateway to the NetWare 4.X network and must be protected from disaster. Disaster recovery is provided by dividing the NDS data base into partitions and creating their replicas. The original partitions are stored on file servers, close to their users for efficient network access. Their replicas are stored on geographically remote file servers to serve as backup copies of the original partitions. Partitions and replicas are typically managed by using Partition Manager, a subset of the NetWare Administrator graphical tool. Recommended Course of Action Data security professionals attempting to secure a NetWare LAN should first make sure they understand how the network's components work. Then, they should study the security features found in the NetWare operating system. Next, they should read Threats to NetWare Enterprise LANs ( ). Author Biographies H. Van Tran H. Van Tran is an associate professor of accounting at the University of Houston at Clear Lake in Houston TX. Cynthia D. Heagy

9 Cynthia D. Heagy, DBA, CPA, CMA, is an associate professor of accounting at the University of Houston at Clear Lake in Houston TX.

10

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

Network Administration

Network Administration 16-Bit Core - Loading... 3:28 32-Bit Core - Loading... 3:27 802.3... 1:36 802.4... 1:36 802.5... 1:36 A Account Database Synchronization... 11:29 Account Policy... 7:20 Account Policy - Managing... 7:22

More information

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal DATA PROCESSING NOTES FOR SS THREE FIRST TERM 2016/2017 SESSION SCHEME OF WORK Week 3 Week 4 Continuation of Spreadsheet(Practical) Computer Virus Types Of Computer Virus Sources Of Virus Virus Warning

More information

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 12 Behind the Scenes: Networking and Security 1 Networking Advantages Networks Increase productivity Enable the sharing of hardware resources Facilitate knowledge sharing Enable

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node Topic 2 focuses on networking. It covers: Definition of a network. Characteristics and functions of network devices. Specification of local area network (LAN). Network software. Application software. Basic

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Introduction to Computer Science (I1100) Networks. Chapter 6

Introduction to Computer Science (I1100) Networks. Chapter 6 Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and

More information

Maintaining the NDS Database

Maintaining the NDS Database Chapter 7 Maintaining the NDS Database Overview..................................................................2 Concepts to Know....................................................... 2 Preserving the

More information

Glossary. The target of keyboard input in a

Glossary. The target of keyboard input in a Glossary absolute search A search that begins at the root directory of the file system hierarchy and always descends the hierarchy. See also relative search. access modes A set of file permissions that

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Downloaded from various sources on the NET

Downloaded from various sources on the NET Overview Computers. Hardware components of a Computer. Purpose and functions of computer operating systems. Evolution of computer operating systems. Operating systems available today. Downloaded from various

More information

Ebook : Overview of application development. All code from the application series books listed at:

Ebook : Overview of application development. All code from the application series books listed at: Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop

More information

Different network topologies

Different network topologies Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical

More information

Network+ Guide to Networks 6 th Edition

Network+ Guide to Networks 6 th Edition Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

Chapter 5: Configuring ServerProtect

Chapter 5: Configuring ServerProtect Chapter 5: Configuring ServerProtect Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the types of ServerProtect tasks Describe which actions

More information

How to create a System Logon Account in Backup Exec for Windows Servers

How to create a System Logon Account in Backup Exec for Windows Servers How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Design Checklist. Application Architecture. Initial cost and Total Cost of Ownership (TCO) Enterprise Resource Planning (ERP) Peter Lo

Design Checklist. Application Architecture. Initial cost and Total Cost of Ownership (TCO) Enterprise Resource Planning (ERP) Peter Lo Design Checklist Application Architecture Peter Lo Before selecting application architecture, the analyst must consider the following issues: Enterprise resource planning Initial cost and Total Cost of

More information

HP JetDirect Print Servers. HP JetAdmin. Setup Guide

HP JetDirect Print Servers. HP JetAdmin. Setup Guide R HP JetDirect Print Servers HP JetAdmin Setup Guide Setup Guide HP JetAdmin Copyright Hewlett-Packard Company 2000 All rights reserved. Reproduction, adaptation, or translation without prior written

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

M4.3-R4: INTRODUCTION TO ICT RESOURCES

M4.3-R4: INTRODUCTION TO ICT RESOURCES M4.3-R4: INTRODUCTION TO ICT RESOURCES NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF

More information

Netwoking Essentials

Netwoking Essentials Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies 1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections Computers: Tools for an Information Age Chapter 7 Networking: Computer Connections Objectives Describe the basic components of a network Explain the methods of data transmission, including types of signals,

More information

Chapter One: Networking Fundamentals Computer Networks

Chapter One: Networking Fundamentals Computer Networks 1.1 Bandwidth Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time. It is important to understand the concept of bandwidth for the following

More information

Local Area Network(LAN)

Local Area Network(LAN) Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Contents. Introduction to Networking. Preface...i. Introduction... xix

Contents. Introduction to Networking. Preface...i. Introduction... xix Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and

More information

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them) Computers are useful machines, but they are generally useless by themselves. Computers are usually part of a system a computer system includes: Hardware (machines) Software (programs, applications) Communication

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Computers Are Your Future

Computers Are Your Future Computers Are Your Future Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Objectives Discuss the functions and features of a network operating system Define

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

NOVELL NETWARE 5.1 ADMINISTRATION CONTENTS

NOVELL NETWARE 5.1 ADMINISTRATION CONTENTS CNA Certification Guide: Novell NetWare 5.1 Administration CERTIFICATION GUIDE: NOVELL NETWARE 5.1 ADMINISTRATION CONTENTS AUTHOR ACKNOWLEDGEMENTS... XIII INTRODUCTION... XV UNIT 1 NETWARE ACCESS... 1-1

More information

(Self-Study) Identify How to Back Up and Restore NetWare Systems

(Self-Study) Identify How to Back Up and Restore NetWare Systems SECTION 18 (Self-Study) Identify How to Back Up and Restore NetWare Systems The following objective will be tested: Develop a Network Backup Strategy In this section you learn how you can back up and restore

More information

Fundamentals of Networking Types of Topologies

Fundamentals of Networking Types of Topologies Fundamentals of Networking Types of Topologies Kuldeep Sonar 1 Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Introduction to Networking

Introduction to Networking Networking BASICS Introduction to Networking... 2 Network Media... 4 Network Design... 5 Network Architectures... 7 Protocols and Network Software... 9 1 Introduction to Networking A computer network is

More information

Novell Client for Windows Vista User Guide. novdocx (en) 6 April NovellTM Client. for Windows Vista * USER GUIDE.

Novell Client for Windows Vista User Guide. novdocx (en) 6 April NovellTM Client. for Windows Vista * USER GUIDE. Novell Client for Windows Vista User Guide NovellTM Client for Windows Vista * 1.0 August 2007 USER GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to

More information

Download from Powered By JbigDeaL

Download from  Powered By JbigDeaL 1. If a word is typed that is not in Word s dictionary, a wavy underline appears below the word. (A) red (B) green (C) blue (D) black 2. The button on the quick access Toolbar allows you to cancel your

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

NetWare Protocols. Background. Technology Basics CHAPTER

NetWare Protocols. Background. Technology Basics CHAPTER CHAPTER 19 NetWare Protocols Background NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc. and introduced to the market in the early 1980s. Then,

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Q1. Describe C.P.U and its subunits with the help of diagram?

Q1. Describe C.P.U and its subunits with the help of diagram? Q1. Describe C.P.U and its subunits with the help of diagram? Ans. C.P.U (CENTRAL PROCESSING UNIT) Book page # 27 The C.P.U is the brain of computer.it controls and supervises all the units. Processing

More information

Installing and Configuring DHCP with NetWare 5

Installing and Configuring DHCP with NetWare 5 BY JOHN E. JOHNSTON Installing and Configuring DHCP with NetWare 5 The Dynamic Host Configuration Protocol (DHCP) function and its options are essential in the creation of a TCP/IP environment. The DHCP

More information

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved. Unit 10 Networks Copyright 2005 Heathkit Company, Inc. All rights reserved. The basic components of a network: Connections (Physical Medium) Protocols (Common language) Services (Clients, Servers, and

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

Table of Contents. 1 Introduction. 2 Wireless Configurations. 3 Setting Up your LAN Administrator Station

Table of Contents. 1 Introduction. 2 Wireless Configurations. 3 Setting Up your LAN Administrator Station Table of Contents 1 Introduction About Avaya Wireless 1-1 About Avaya Wireless Tools 1-2 About Avaya Wireless Access Points 1-5 About This User s Guide 1-6 About Icons used in this Document 1-7 On-line

More information

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island!

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island! CS61C Machine Structures Lecture 37 Networks April 24, 2006 John Wawrzynek Page 1 No Machine is an Island! Computer Processor (active) Control ( brain ) Datapath ( brawn ) Memory (passive) (where programs,

More information

Lecture 1. Computer Technology

Lecture 1. Computer Technology Lecture 1 First Grade 2018-2019 College of Education Computer Science Department Mustansiriyah University الجامعة المستنصرية 1 LECTURE ONE COMPUTER CONCEPTS AND THEIR APPLICATIONS 1.1 Introduction and

More information

Hardware and Software Requirements

Hardware and Software Requirements Hardware and Software Requirements WideOrbit s WO Media Sales is a full client-server based sales system. Users run a thick client on a Windows 10*, Windows 8 or Windows 7, which connects directly to a

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

E3-E4 CM TECHNICAL IT INFRASTRUCTURE

E3-E4 CM TECHNICAL IT INFRASTRUCTURE E3-E4 CM TECHNICAL IT INFRASTRUCTURE WELCOME This is a presentation for the E3-E4 CM Technical Module for the Topic: IT Infrastructure. Eligibility: Those who have got the Up-gradation from E3 to E4. This

More information

Print Server Administration User s Guide

Print Server Administration User s Guide Print Server Administration User s Guide ii About This Guide Table of Contents ABOUT THIS GUIDE... 1 What s Not Covered in This User s Guide... 1 Contents of the User s Guide... 2 INTRODUCTION... 3 Background

More information

Chapter 17: Distributed Systems (DS)

Chapter 17: Distributed Systems (DS) Chapter 17: Distributed Systems (DS) Silberschatz, Galvin and Gagne 2013 Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Types of Computer and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area ) 1 MAN (Metropolitan Area ) 2 WAN (Wide Area ) 3 Problems to be discussed when presenting

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Motivation Topology Network Types Communication Design Strategies 15.1 Node Types Mainframes (IBM3090, etc.) example applications: airline reservations banking

More information

You can administer Policy and Distribution Services by using the following:

You can administer Policy and Distribution Services by using the following: IPolicy and Distribution Services Novell ZENworks 7 Server Management Policy and Distribution Services is a software, configuration, and behavioral management system for servers. Through Policy and Distribution

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

IT 2004 Data Communication & Networking

IT 2004 Data Communication & Networking IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala Why networks? To share resources (such as printer,

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Novell Open Enterprise Server 2: Deploying Virtualized NetWare on Linux *

Novell Open Enterprise Server 2: Deploying Virtualized NetWare on Linux * Technical White Paper WORKGROUP COLLABORATION Novell Open Enterprise Server 2: Deploying Virtualized NetWare on Linux * Novell Open Enterprise Server 2: Deploying Virtualized NetWare on Linux Table of

More information

Troubleshooting Tools

Troubleshooting Tools CHAPTER 2 Troubleshooting Tools This chapter presents information about the wide variety of tools available to assist you in troubleshooting your internetwork. This chapter consists of the following sections:

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Silberschatz and Galvin Chapter 15

Silberschatz and Galvin Chapter 15 Silberschatz and Galvin Chapter 15 Network Structures CPSC 410--Richard Furuta 3/30/99 1 Chapter Topics Background and motivation Network topologies Network types Communication issues Network design strategies

More information

Ready-to-Run Applets. Visual Click Software, Inc.

Ready-to-Run Applets. Visual Click Software, Inc. Ready-to-Run Applets Visual Click Software, Inc. Copyrights This manual contains proprietary information that is protected by copyright. The information in this manual is subject to change without notice.

More information

TECHNOLOGY STREAM: HARDWARE AND NETWORK ENGINEERING KCTS 121 : SYSTEM ADMINISTRATION AND NETWORK FUNDAMENTALS

TECHNOLOGY STREAM: HARDWARE AND NETWORK ENGINEERING KCTS 121 : SYSTEM ADMINISTRATION AND NETWORK FUNDAMENTALS TECHNOLOGY STREAM: HARDWARE AND NETWORK ENGINEERING KCTS 121 : SYSTEM ADMINISTRATION AND NETWORK FUNDAMENTALS Examination Topics Familiarization of PC Components Overview of computer system CPU Input Units

More information

COMPUTER NETWORKING. By: Dr. Noor Dayana Abd Halim

COMPUTER NETWORKING. By: Dr. Noor Dayana Abd Halim COMPUTER NETWORKING By: Dr. Noor Dayana Abd Halim Defining Computer Network Computer network is a collection of computers and other hardware devices so that network users can share hardware, software,

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

G.H.RAISONI COLLEGE OF ENGINEERING, NAGPUR Department:-Computer Science & Engineering Branch:-8 th Semester[CSE] Subject:- Computer Networks

G.H.RAISONI COLLEGE OF ENGINEERING, NAGPUR Department:-Computer Science & Engineering Branch:-8 th Semester[CSE] Subject:- Computer Networks G.H.RAISONI COLLEGE OF ENGINEERING, NAGPUR Department:-Computer Science & Engineering Branch:-8 th Semester[CSE] Subject:- Computer Networks List of Experiments 1. Write a program in C for PC to PC communication

More information

DNS is the mechanism by which Internet software translates names to attributes such as addresses.

DNS is the mechanism by which Internet software translates names to attributes such as addresses. Full form: 1 PSTN : Public Switching Telephone Networks 2 ISDN : Integrated Services Digital Network. 3 DSL: Digital Subscribe Line. 4 CATV: Community Antenna Television. 5 DHCP: Dynamic Host Configuration

More information

Input/Output Problems. External Devices. Input/Output Module. I/O Steps. I/O Module Function Computer Architecture

Input/Output Problems. External Devices. Input/Output Module. I/O Steps. I/O Module Function Computer Architecture 168 420 Computer Architecture Chapter 6 Input/Output Input/Output Problems Wide variety of peripherals Delivering different amounts of data At different speeds In different formats All slower than CPU

More information

OPERATING SYSTEMS & UTILITY PROGRAMS

OPERATING SYSTEMS & UTILITY PROGRAMS OPERATING SYSTEMS & UTILITY PROGRAMS System Software System software consists of the programs that control the operations of the computer and its devices. Functions that system software performs include:

More information

DSRAZOR Packaged Applets

DSRAZOR Packaged Applets DSRAZOR provides hundreds of modular tools (called services) you can use to construct your own applets to maintain and report on your edirectory/nds network. However, DSRAZOR also provides over 140 applets

More information

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS?

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS? Introduction to LAN TDC 363 Lecture 05 Nt Network rkoprti Operating Systems tm Windows Based Networking NetWare Based Networking Book Reading: Chapters 8 1 Course Outline Network operating system (NOS)

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

OPERATING SYSTEM. Functions of Operating System:

OPERATING SYSTEM. Functions of Operating System: OPERATING SYSTEM Introduction: An operating system (commonly abbreviated to either OS or O/S) is an interface between hardware and user. OS is responsible for the management and coordination of activities

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7 Local rea Network! Question - What are the station types supported by HDLC? Describe each. References: Chapters 15 and 16 Stallings Chapters 14 and 16 Forouzan Study Guide 8 Review

More information

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:

More information