FAQ: Real-World Networks

Size: px
Start display at page:

Download "FAQ: Real-World Networks"

Transcription

1 Question 1: What are client-side and server-side processes? Answer 1: The terms client-side and server-side are sometimes called frontend (client) and back-end (server) processes (Davis & Rajkumar, 2004). Generally speaking, any activity controlled by the user is a front-end process. Querying a database, clicking a mouse, pressing keys on a keyboard, logging on to a system, directing file storage, requesting encryption, directing a document be printed, and calling for are all front-end processes (Dean, 2006). A client creates input. Based on that input, the server will provide output, which is the back-end process. Server processes include encrypting data by providing an algorithm, using TCP/IP protocol to send traffic across a network, searching a database for information, and displaying it to the user. It might also include connecting to Web services for access to the Internet, calling from the storage site (simple mail transfer protocol-smtp), issuing an authentication challenge to a user, and permitting access. Even in a standalone system, the back-end process responds to the user's request. The front-end/back-end processes are always there. At the network level, back-end control of these processes occurs in the management or directory services (Davis & Rajkumar, 2004). If the service is not available for the user locally, the back-end process may redirect service requests to another backend provider outside the system. Question 2: What is TCP/IP protocol? Answer 2:TCP/IP stands for transmission control protocol/internet protocol, and it is a group of rules and applications that establish and maintain networking connectivity. The term protocol refers to the structure and rules that allow electronic network data transfers. TCP/IP was designed to provide data control, format, structure, process management, and accountability for data transferred between network nodes. It is considered a free open source software that is modifiable by the users and developers. It is supported by all network environments (LAN, MAN, and WAN) and is the standard in all networking applications (Dean, 2006). TCP/IP is actually two principle protocols: the TCP and the IP. The TCP TCP protocol is responsible for reliable data transfers; it sizes the data so the receiver has the ability to use it (Dean, 2006). TCP validates receipt of all data sent at each end of the connection (sender/receiver) no matter how far 1

2 away the data is transferred (Davis & Rajkumar, 2004). It also establishes an agreement with the receiver concerning how the information is to be sent regarding size and format; this is initiated by a connection handshake (Dean, 2006). Finally, TCP provides packet sequencing so the receiver can reassemble the data correctly and flow control. All packets are validated by a message sent from the receiver verifying (acknowledging) the packets received to the sender. The IP The other core protocol in this suite is the Internet protocol. IP is associated with addressing and identifying routing from the source (sender) to the receiver (destination) through all the intermediate nodes. It is a connectionless protocol relying on TCP to validate sent data. IP addressing is applied to the IP datagram (encapsulated frame) packet before sending along with routing instruction to the network (Dean, 2006). It can also apply encryption called IPSec. Question 3: What are some basic functionalities of a network operating system (NOS)? Answer 3: Not all network operating systems (NOSs) are equal. However, the incorporation of the following functions can be achieved by installing a base OS and optional server components. These are the most prominent NOSs on the market today: Windows Servers (2000, 2003) UNIX (both proprietary and open source) Macintosh OS X Linux (most distributions) Novell NetWare The OS is centrally managed and controls the system resources, applications, data remote access services, security, and network devices. The NOS will provide secure access to the network using policy, procedure, software, and devices such as firewalls, routers, and switches. The NOS will also provide the following functions to users on the network: Remote access using authentications Connection to other network entities and networks (an organization's 2

3 extranet, intranet, and peer network domains) Backup processes to ensure data integrity and availability Simple modification of the client lists such as being able to add, delete, and change permissions for clients Applications that monitor the status of network components' functionality System updates to all nodes Manages efficient server functionality and capability including load balancing, virtual machine implementation, and resource duplication in a distributed network configuration Mitigates internal network problems such as hardware or software failure using fault tolerance techniques The network OS must be able to function as a computer OS and network OS because of the fact that the node it is installed on must manage its internal client/server requirements. Question 4: What are some primary factors to consider when selecting a NOS for an organization? Answer 4: Not all NOSs support all computer systems and applications. Commonly used NOSs provide compatibility or can be configured to support system requirements. Interoperability among these NOSs is available through installation of client/server protocol applications like Samba, NWLink, or shared directory service (SDS) for UNIX. The following are some of the primary considerations when selecting a network OS environment: Compatibility A NOS must be compatible with the systems currently being used. For example, if a peer-to-peer network is the current system and the organization wants to deploy a NOS that uses a different OS platform, the file systems do not work well together; therefore, a Samba client would be required on the Windows computer. The application must be considered part of the network upgrade. Security A NOS must be able to provide system security for the organization. Implementation of some NOSs reduces the security protection of other systems. For example, if a system is using Windows 2000 Professional with a 3

4 new technology file system (NTFS), encrypted files could be saved to the Fat32 file system, but all encryption would be lost. Summary There are other considerations as well. Every organization must keep in mind its users' knowledge of systems, resistance to change, and training users on new OSs. It is also important to consider the cost of a new system, upgrades, and maintenance. Question 5: What are the hardware requirements to install different OSs? Answer 5: Each network operating system has a set of minimum hardware support requirements to function. The following are the minimum requirements for different OSs: Windows Server 2003 Processor > 133 MHz or higher Pentium type (550 MHz recommended; the install supports 4 processors in a single server.) Memory > 128 MB RAM is the absolute minimum (recommended 256 MB), and maximum support is 4 GB RAM Storage > compatible hard drive with 1.5 GB of free space CD/ROM is required unless the install is over a network connection Solaris10 Processor > AMD or Pentium Memory > 512 MB RAM Storage 5 to 7 GB CD/ROM or DVD/ROM drive for input Solaris 10 can support up to 128 processors per server (clustering is possible) MAC OS X Processor > G3, G4, G5, imac, emac (Macintosh computers), or an Intel Pentium 3 (as of Aug 2005) platform Memory > 256 MB RAM Storage > 4 GB of available disk space 4

5 CD/DVD drive required Linux Server Processor > Intel X86 compatible (any AMD/Intel) Memory > 64 MB RAM Storage > Linux compatible hard disk drive with 2 GB free space Linux compatible CD/ROM drive or paired 3.5 inch floppy disk Novell NetWare 6.5 Server Processor > IBM compatible Pentium II, AMD K7 (Up to 32 processors can be supported at one time.) Memory > 512 MB of RAM (recommended 1 GB) Storage > at least 2 GB of free space (recommended 4 GB) CD/ROM required for install Windows Server 2008 Windows Server 2012 All operating systems have a hardware compatibility list (HCL) that identifies what devices can be used with each OS. If the device is not on the HCL, there is no assurance that it will work with that OS. Some of the devices on the HCL may require special configuration to work properly. Plug and Play (PNP) components can be used on most operating system platforms when configured properly. In many cases, software compatibility lists also identify what programs can be used on specific platforms. Question 6: How can different NOSs share files? Answer 6: Most operating systems can share data files despite the difference between platforms (Dean, 2006). The industry has established common standards for data reading and transfer. Common text formats like the ASCII (American Standard Code for Information Interchange) provide a numerical value for the letters, spaces, numbers, and special characters on the keyboard. These universally implemented values are seen as the characters they represent in all OSs. Along with the standard direct conversion, internal applications within the OS provide access to the file system. The file access protocols provide different OSs access to different file formats (Dean, 2006). Within Windows Server 2003 and Windows XP, file access is through CIFS (common Internet file system) (Davis & Rajkumar, 2004). CIFS 5

6 is widely supported in commercial software products. Additionally, connecting network platforms requires unique applications to support the data transfer. Novell Client for Windows provides the Window Server control of Novell client nodes. NWLink supports Windows client management by Novell servers. Samba allows file sharing in client and server configurations by a UNIX or Linux platform supporting Windows and Mac OS X (Davis & Rajkumar, 2004). In some cases, "a universal software application called middleware is necessary to translate requests and responses between the client and server" (Dean, 2006). With middleware, other applications such as Samba are unnecessary. Question 7: What are some differences between network operating systems? Answer 7: NOSs are more alike than they are different in their functionalities; however, there are some components that make each NOS unique. Some NOSs even have different editions of the same NOS to meet diverse customer needs. For example, Windows Server 2003 has four different editions. Management applications, files types, and system 6

7 management are just some areas where NOSs vary in functionality. Management Applications In Windows Server 2003, management applications are predefined using Microsoft Management Console (MMC). The routines or snap-ins provide tools for common tasks such as creating accounts, changing passwords, monitoring event logs, and permitting the administrators to script their own snap-in and service calls. Service snap-ins minimize the need for command line interfaces (Dean, 2006). Although Linux has some of these common administrative functions, it does not have to use a graphical user interface (GUI). Commands can be implemented using a command line interface. Nearly all the administration processes in Windows Server 2003 are executed by snap-in. File types In Windows Server 2003 (WinSrv2003), file management supports the following file types: FAT16 FAT32 UDF (Universal Disk Format used on CD-ROMs) CDFS (CD-ROM file system allowing CD file sharing and application installation) NTFS (new technology file system) However, the common FAT16 and FAT32 are also supported by other OSs. The UDF support is available on Linux and Novell platforms, but not on UNIX or MAC OS X. UNIX/Linux NFS cannot directly be supported by Window Server 2003 (WinSrv2003) but can be managed with Samba. NTFS is the file system of choice with Windows Server 2003 and XP because of its security support (Davis & Rajkumar, 2004). Files managed in NTFS can be stored as encrypted files and transfer from one NTFS system to another; the encryption remains enforced. When files are transferred to a different file system, the encryptions are in a plain text format. NTFS is supported by the security suite Kerberos that establishes security mechanisms and authentication controls for the network. Kerberos is available with other OSs 7

8 as an option instead of a standard. WinSrv bit processor format can support the NT file system (NTFS). It can establish file partition as large as 16 exabytes (EB 2 64 bytes). No other NOS can do this. WinSrv2003 and MAC OS X communicate using NTFS (Dean, 2006). Built into WinSrn2004 is a compression algorithm that can automatically compress files up to 40%. This saves a lot of disk space considering that 10 GB HD fully converted to NTFS uses only 6 GB. None of the other NOSs have that ratio of compression. Interface Design WinSvr2003 was designed to provide GUI interface for all activities providing easy use and a short learning curve. It uses a familiar interface mouse base execution and pointer pen and stored system applications. UNIX and some Linux distributions rely on the command line interface; however, GUI interface are available for both. The applications to support the OS are still mostly command line scripts. Mac OS X and NetWare provide primary GUI interfaces. The built-in applications are limited and third party support is needed (Dean, 2006). System management WinSrv2003 maintains its files and management systems using an application called Active Directory (AD) (Davis & Rajkumar, 2004). Active Directory works as the system manager and primary backup domain controllers. The purpose of AD is to provide the system copies of the user account data and a file system image so in the event a server fails, the system will automatically have access to user accounts on other servers. Any server that AD is installed on will have the user data (Dean, 2006). In most other operating systems, the management function must be specifically delegated to the server. No automatic assignment is available. The exception to this rule is with Novell Netware 6.5 NDS; Netware Directory Service and e-directory assumes the role as domain control. Question 8: How can Windows Server 2003 interact with other network operating systems (NOSs)? Answer 8: It is not uncommon for a network to contain multiple platform 8

9 OSs and servers (Dean, 2006). The following are some examples of how Windows Server 2003 can interact with different NOSs. Netware and Windows Server 2003 If a user must update client information in the Windows Server 2003 Active Directory, the application Microsoft Directory Synchronization Service (MSDSS) must be installed. The Windows server must be the domain controller to run this service. The installation provides administrative access between WinSrv2003 Active Directory and NetWare's e-directory database (Dean, 2006). What happens if it was the other way around? Perhaps a Windows client on a Windows server needs access to the NetWare server. A Windows client can access the NetWare server if the Windows server has installed Client Services for NetWare (CSNW) and NWLink. These two services permit a Windows client to logon to a NetWare server to access services like printers, files, and other resources controlled by that server. Windows can operate with NetWare and NetWare can work with Windows simply by installing services. MAC OS X OS X is based on an open source UNIX kernel, but the MAC OS X Server is a proprietary UNIX OS. One of the unique aspects about UNIX-like systems is that they can use similar applications to interact. Samba is a client and server application that allows UNIX systems to communicate with Windows. What allows Windows to communicate with UNIX? UNIX-type systems and Windows have access to a service called LDAP (Lightweight Directory Access Protocols) that sets up a common directory format. Due to its TCP/IP protocol and LDAP compatibility, these two OSs can communicate. What happens if the LDAP is not established between Windows and UNIX? Windows can work with that as well. Microsoft has software that comes with the server OS that will integrate the servers' directory allowing the clients on the UNIX side to access resources to the Windows resources. The application belongs to the Microsoft Service for UNIX Suite. UNIX and Novell 9

10 Connectivity between UNIX and Novell may be a surprise as well. Recently, Novell has decided to implement a SUSE Linux kernel (one of the over four hundred Linux distributions available) to provide interoperability and access resources on the UNIX/Linux platforms. Question 9: How can users help maintain a secure system? Answer 9: The user is the most important entity in the security process. Breaches of security can be caused by user oversight, complacency, or ignorance. The user must understand his or her part in establishing a secure work site. Simple things may have the most impact. The following are some ways that a user can assist in maintaining a secure system: User Security The user has to protect the information that allows him or her to use the system; it consists of a user ID password and digital signature. The user should avoid writing down the password and use the same cautions with this information that he or she would use with bank statements or other personal information. Individual Workstations A system can be compromised if a user opens a bad file, plugs in a personal thumb drive, or downloads an attachment and opens it. The results of these actions can infect an entire network with a virus and shutdown the system. The user should take adequate care of the privilege of using the system. As a user, there are certain responsibilities to ensure an organization's network remains secure. Here are some appropriate uses of an individual workstation: Follow any policy regarding the use of the company's asset. If the use of personal devices or downloading is acceptable, the user should run a virus check before opening or using the device. If there is a breach in security, the user should cooperate with any investigation conducted. Password Compromise 10

11 A user should never write a password down. If anybody other than the user sees the password, it is compromised. A password provides a user with access to the business assets that he or she needs to do a job. A compromised password opens the system up for attacks and security breaches. Question 10: What are some security services in a client/server environment? Answer 10: Security service encompasses a wide array of functions provided by the system, including user/group account management (network administration), password management (password policy), policy enforcement (monitoring compliance), lockout policy management (security log violations), access control lists for users to open applications and files (access granted/denied), and file permission allowing a user to read, write, or modify any files accessed. Security services manage authentication and authorized access from remote sites, creating the interface for the RADIUS or TACACS servers as well and the CHAPS services (Dean, 2006). The services keep track of system keys for encryption, records revoked accesses, requests certificates, and manages digital signatures and hashed password files. The security services provide for implementation of NAT (Network Address Translation) protocol, monitor and enforce boundary security (access in and out of the private network by user) through the firewall configurations, and provide a vehicle to audit access attempts through the intrusion detection systems. All system-controlled security processes are considered security services. References Davis, W. S., & Rajkumar, T. M. (2004). Operating systems: A systematic view (6th ed.). Boston, MA: Prentice Hall. Dean, T. (2006). Network+ guide to networks (4th ed.). Boston, MA: Thomson Technology. 11

Question 1: What are some reasons an organization might choose one operating system over another?

Question 1: What are some reasons an organization might choose one operating system over another? Question 1: What are some reasons an organization might choose one operating system over another? Answer 1: An organization chooses a network operating system (NOS) for several possible reasons. The system

More information

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking

Network+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Objectives Discuss the functions and features of a network operating system Define

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Lesson 1: Preparing for Installation

Lesson 1: Preparing for Installation 2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install

More information

Brief Table of Contents

Brief Table of Contents Brief Table of Contents Introduction... xiii Chapter 1 What s New in Windows 2000 Professional... 1 Chapter 2 Installing and Deploying Windows 2000 Professional... 27 Chapter 3 Microsoft Management Console

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS?

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS? Introduction to LAN TDC 363 Lecture 05 Nt Network rkoprti Operating Systems tm Windows Based Networking NetWare Based Networking Book Reading: Chapters 8 1 Course Outline Network operating system (NOS)

More information

Downloaded from various sources on the NET

Downloaded from various sources on the NET Overview Computers. Hardware components of a Computer. Purpose and functions of computer operating systems. Evolution of computer operating systems. Operating systems available today. Downloaded from various

More information

1. The first true 32-bit operating system developed by Microsoft was Windows 3.1.

1. The first true 32-bit operating system developed by Microsoft was Windows 3.1. Chapter 02 TRUE/FALSE 1. The first true 32-bit operating system developed by Microsoft was Windows 3.1. F PTS: 1 REF: 58 2. Windows 95 used cooperative multitasking for 16-bit applications and preemptive

More information

What does a file system do?

What does a file system do? System files What does a file system do? A file system is a method for storing and organizing computer files and the data they contain to make it easy to find and access them. File systems exist on hard

More information

Unit 11 Computer Network Introduction to Network Operating Systems

Unit 11 Computer Network Introduction to Network Operating Systems Unit 11 Computer Network Introduction to Network Operating Systems Network Operating Systems Just as a computer cannot operate without a computer operating system, a network of computers cannot operate

More information

3 INSTALLING WINDOWS XP PROFESSIONAL

3 INSTALLING WINDOWS XP PROFESSIONAL INSTALLING WINDOWS XP PROFESSIONAL.1 Preparing for installation Objectives.1.1 Windows XP Professional Hardware Requirements.1.2 Hardware Compatibility List (HCL) check.1. Hard Disk Partition.1.4 Required

More information

A+ Guide to Managing and Maintaining your PC, 6e. Chapter 2 Introducing Operating Systems

A+ Guide to Managing and Maintaining your PC, 6e. Chapter 2 Introducing Operating Systems A+ Guide to Managing and Maintaining your PC, 6e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn how an OS interfaces

More information

Windows 2000 System Administration Handbook, 1/e

Windows 2000 System Administration Handbook, 1/e Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

Network Implementation

Network Implementation 3............................................. Network Implementation Domain 3.0: Network Implementation Objective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication,

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

Table of Contents. Introduction... xiii. Chapter 1 What s New in Windows XP Professional iii

Table of Contents. Introduction... xiii. Chapter 1 What s New in Windows XP Professional iii Table of Contents Introduction... xiii Chapter 1 What s New in Windows XP Professional... 1 Easier to Use 2 More Reliable and Dependable 4 Built on New Windows Engine 4 Device Driver Rollback 4 Enhanced

More information

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1 Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Selected Sections of Applied Informatics

Selected Sections of Applied Informatics Selected Sections of Applied Informatics M.Sc. Marcin Koniak koniakm@wt.pw.edu.pl http://www2.wt.pw.edu.pl/~a.czerepicki Based on lecture: Dr inż. Andrzej Czerepicki a.czerepicki@wt.pw.edu.pl 2018 Lecture

More information

Networks with Cisco NAC Appliance primarily benefit from:

Networks with Cisco NAC Appliance primarily benefit from: Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,

More information

DELL POWERVAULT NX3500 INTEGRATION WITHIN A MICROSOFT WINDOWS ENVIRONMENT

DELL POWERVAULT NX3500 INTEGRATION WITHIN A MICROSOFT WINDOWS ENVIRONMENT DELL POWERVAULT NX3500 INTEGRATION WITHIN A MICROSOFT WINDOWS ENVIRONMENT A Dell Technology White Paper Version 1.0 THIS TECHNOLOGY WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 2-22-14 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate NetWare OS targets

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

I. Ch 5 System Software

I. Ch 5 System Software I. Ch 5 System Software A. Competencies 1. Describe the differences between system software and application software 2. Discuss the four types of system software 3. Discuss the basic functions, features

More information

Terms you ll need to understand:

Terms you ll need to understand: 7 Network Operations Terms you ll need to understand: Network operating system (NOS) Preemptive multitasking Cooperative multitasking Time slicing Client software Redirector Designator UNC naming Server

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

BioPassport TM Enterprise Server

BioPassport TM Enterprise Server BioPassport TM Enterprise Server The BioPassport Enterprise AD Server is the intelligence behind all of IdentAlink s biometric modules. Password management for a network or application can cost hundreds

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Pre-Installation Checklist v5.0

Pre-Installation Checklist v5.0 Pre-Installation Checklist v5.0 November 2010 Table of Contents Introduction 3 Network infrastructure 4 ShareScan Manager PC 5 Devices 7 ecopy Connectors 8 Network Communication 13 Document Management

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Updated 3-3-18 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate *NIX OS targets Introduction

More information

Novell. ZENworks. for Desktops 3.2 Preboot Services ADMINISTRATION

Novell. ZENworks. for Desktops 3.2 Preboot Services ADMINISTRATION 3.2 Novell ZENworks for Desktops 3.2 Preboot Services www.novell.com ADMINISTRATION Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 1-11-17 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate *NIX OS targets

More information

Configuring L2TP over IPsec

Configuring L2TP over IPsec CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts File services Domains, DNS 1 DHCP Server Scripts Intranet and Extranets Web services HNC COMPUTING - Network Concepts A domain is a logical grouping of networked computers that share a central directory

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Requirements and Dependencies

Requirements and Dependencies CHAPTER 2 You can install and use Security Manager as a standalone product or in combination with several other Cisco Security Management Suite applications, including optional applications that you can

More information

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

Mailbox Manager Getting Started Guide. Licensing Installation Options System Requirements Installation Instructions

Mailbox Manager Getting Started Guide. Licensing Installation Options System Requirements Installation Instructions Mailbox Manager Getting Started Guide Licensing Installation Options System Requirements Installation Instructions Mailbox Manager Release 5.4 December 2006 Table of Contents Introduction... 1 Licenses...

More information

HP Advanced Server V5.1B-3 for UNIX. Overview

HP Advanced Server V5.1B-3 for UNIX. Overview Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information

MS Operating Systems and Networks

MS Operating Systems and Networks In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. 3. Send this assessment with the answers via: a. FAX to (212) 967-3498. Or b. Mail the answers

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

Table of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1.

Table of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1. WebView v1.0 Installation Guide Revision 3 7/29/2003 WebView v1.0 Installation GuG ide Revision 3 7/29/2003 u Introduction Table of Contents Section 1: DocSTAR WebView v1.0 Requirements & Installation

More information

System Architecture Overview. Version 1.1.1

System Architecture Overview. Version 1.1.1 System Architecture Overview Version 1.1.1 The information in this document is subject to modification without any previous notice. Data used in the examples are fictitious. It is prohibited to reproduce

More information

NETWORK AUDIT FOR CHOPPY AND SONS, LLC

NETWORK AUDIT FOR CHOPPY AND SONS, LLC GENERAL DESCRIPTION The data network at Choppy and Sons is an unswitched Ethernet LAN 100BT with LAN based Internet access via a cable modem link. There are 15 nodes on this peer to peer network, typical

More information

Symantec Multi-tier Protection

Symantec Multi-tier Protection Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched

More information

Product Name DCS v MozyPro v2.0 Summary Multi-platform server-client online (Internet / LAN) backup software with web management console

Product Name DCS v MozyPro v2.0 Summary Multi-platform server-client online (Internet / LAN) backup software with web management console Summary Multi-platform server-client online (Internet / LAN) backup software with web management console Windows and MAC platform server client backup software Supported Platforms 32 / 64 bit OS Supported

More information

Leverage the Citrix WANScaler Software Client to Increase Application Performance for Mobile Users

Leverage the Citrix WANScaler Software Client to Increase Application Performance for Mobile Users Leverage the Citrix WANScaler Software Client to Increase Application Performance for Mobile Users Daniel Künzli System Engineer ANG Switzerland Citrix Systems International GmbH Specifications and Architecture

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Chapter 2 Operating-System Structures

Chapter 2 Operating-System Structures This chapter will discuss the following concepts: 2.1 Operating System Services 2.2 User Operating System Interface 2.3 System Calls 2.4 System Programs 2.5 Operating System Design and Implementation 2.6

More information

Chapter 1: Windows Platform and Architecture. You will learn:

Chapter 1: Windows Platform and Architecture. You will learn: Chapter 1: Windows Platform and Architecture Windows 2000 product family. New features/facilities of. Windows architecture. Changes to the kernel and kernel architecture. New features/facilities. Kernel

More information

Network Implementation

Network Implementation 03 078973110x CH03 3/26/04 9:48 AM Page 97 3............................................. Network Implementation Domain 3.0-Network Implementation Objective 3.1: Identify the Basic Capabilities (i.e.,

More information

OPERATING SYSTEMS & UTILITY PROGRAMS

OPERATING SYSTEMS & UTILITY PROGRAMS OPERATING SYSTEMS & UTILITY PROGRAMS System Software System software consists of the programs that control the operations of the computer and its devices. Functions that system software performs include:

More information

Sysgem Enterprise Manager

Sysgem Enterprise Manager Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering

More information

1 Attended Installation of Windows 2000 Server

1 Attended Installation of Windows 2000 Server 770c01.qxd 10/5/00 5:45 PM Page 1 1 Attended Installation of Windows 2000 Server TEST YOURSELF OBJECTIVES 1.01 Preparing for Installation 1.02 Four-Step Process from CD-ROM 1.03 Installing Over the Network

More information

Full file at

Full file at Chapter 2: Current Hardware and PC Operating Systems Chapter 2 Answers to Review Questions 1. An EPIC CPU design: a. evolved from the CISC processor b. was created in a joint project between Apple and

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

Novell ZENworks Asset Management 7

Novell ZENworks Asset Management 7 Novell ZENworks Asset Management 7 w w w. n o v e l l. c o m July 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 Upgrade/Update Matrix...1 Installation Choices...2 ZENworks Asset

More information

Windows 2000/XP History, and Data Management

Windows 2000/XP History, and Data Management Unit 5 Windows 2000/XP History, and Data Management Copyright 2002 Heathkit Company, Inc. All rights reserved. Microsoft Windows98 Microsoft WindowsMe Microsoft Windows 2000 Professional Microsoft Windows

More information

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication

More information

Novell ichain. Welcome to ichain 2.1 SYSTEM REQUIREMENTS. QUICK START

Novell ichain. Welcome to ichain 2.1 SYSTEM REQUIREMENTS.   QUICK START Novell ichain 2.1 QUICK START www.novell.com Welcome to ichain Novell ichain provides comprehensive documentation to help you understand and deploy the product in your network. Documentation is available

More information

Microsoft Exam Security fundamentals Version: 9.0 [ Total Questions: 123 ]

Microsoft Exam Security fundamentals Version: 9.0 [ Total Questions: 123 ] s@lm@n Microsoft Exam 98-367 Security fundamentals Version: 9.0 [ Total Questions: 123 ] Question No : 1 The Active Directory controls, enforces, and assigns security policies and access rights for all

More information

Windows 2000 Flavors Windows 200 ws 0 Profess 0 P ional Windows 2000 Server Windows 200 ws 0 Advan 0 A ced Server Windows 2000 Datacen ter Server 2

Windows 2000 Flavors Windows 200 ws 0 Profess 0 P ional Windows 2000 Server Windows 200 ws 0 Advan 0 A ced Server Windows 2000 Datacen ter Server 2 Copyright 2006 Heathkit Company, Inc. All Rights Reserved Lab 9-3 Windows 2000 Pre-Installation Windows 2000 Flavors Windows 2000 Professional Windows 2000 Server Windows 2000 Advanced Server Windows 2000

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Minimum System Requirements for Horizon s new Windows Product

Minimum System Requirements for Horizon s new Windows Product Introduction The Windows Version of Horizon s PROMISE home care management software is a web-enabled application that will be hosted on your own in-house server and accessed over your local area or wide-area

More information

Features - SRM Windows File System Agent

Features - SRM Windows File System Agent Page 1 of 53 Features - SRM Windows File System Agent Table of Contents Overview System Requirements - SRM Windows File System Agent Installation Install the SRM Windows File System Agent Install the SRM

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

Copyright 2006 Prentice-Hall. All rights reserved. 1

Copyright 2006 Prentice-Hall. All rights reserved. 1 PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

SISTEM OPERASI PELAYAN (SERVER) SKS 3104 SISTEM OPERASI RANGKAIAN SIJIL SISTEM KOMPUTER & SOKONGAN KOLEJ KOMUNITI PAYA BESAR

SISTEM OPERASI PELAYAN (SERVER) SKS 3104 SISTEM OPERASI RANGKAIAN SIJIL SISTEM KOMPUTER & SOKONGAN KOLEJ KOMUNITI PAYA BESAR SISTEM OPERASI PELAYAN (SERVER) SKS 3104 SISTEM OPERASI RANGKAIAN SIJIL SISTEM KOMPUTER & SOKONGAN KOLEJ KOMUNITI PAYA BESAR It is important to know the basics about popular NOS families. Many networks

More information

Habanero BMC Configuration Guide

Habanero BMC Configuration Guide Habanero BMC Configuration Guide Version 1.0 Copyright Copyright 2015 MiTAC International Corporation. All rights reserved. No part of this manual may be reproduced or translated without prior written

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Kaspersky Administration Kit 8.0 REFERENCE GUIDE Kaspersky Administration Kit 8.0 REFERENCE GUIDE P R O G R A M V E R S I O N : 8. 0 C R I T I C A L F I X 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you

More information

Module 9. Configuring IPsec. Contents:

Module 9. Configuring IPsec. Contents: Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring

More information

IBM SecureWay On-Demand Server Version 2.0

IBM SecureWay On-Demand Server Version 2.0 Securely delivering personalized Web applications IBM On-Demand Server Version 2.0 Highlights Delivers personalized Web solutions on demand to anyone, anywhere using profile serving Provides industry-leading,

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

2272 : Implementing and Supporting Microsoft Windows XP Professional

2272 : Implementing and Supporting Microsoft Windows XP Professional 2272 : Implementing and Supporting Microsoft Windows XP Professional Introduction The purpose of this course is to address the implementation and desktop support needs of customers that are planning to

More information

Proficy* Workflow. Powered by Proficy SOA GETTING STARTED

Proficy* Workflow. Powered by Proficy SOA GETTING STARTED Proficy* Workflow Powered by Proficy SOA GETTING STARTED Version 1.5 SP4 February 2012 All rights reserved. No part of this publication may be reproduced in any form or by any electronic or mechanical

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security

Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security Operating System Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security White Paper Abstract The Microsoft Windows operating system includes technology to secure communications

More information

Automated Deployment Services

Automated Deployment Services Building Out the Enterprise Using Automated Deployment Services Automated Deployment Services (ADS), a component of the Microsoft Windows Server 2003 operating system, includes a new set of imaging tools

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don

More information