Networking Operating Systems (CO32010)

Size: px
Start display at page:

Download "Networking Operating Systems (CO32010)"

Transcription

1 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling Objectives: To discuss the advantages of a distributed file system. To outline the different methods of mounting remote file systems onto a file system structure. To outline practical implementations of a distributed file systems, especially NFS. To show how domains can be created and managed, especially using standard protocols, such as NIS. 7. Encryption 3. Distributed processing 8. NT, UNIX and NetWare 4.1 Distributed File Systems 4.2 Active Directories 4.3 Exercises 4.4 Sample exam question 6. Routers 5. Routing protocols 4. Distributed file systems

2 4.1 Distributed file system Administration services Mounted as a local drive Network Localized File storage (rather than accessing a remote file) Networked file system (NFS) Distributed databases Centralized Configuration (passwords, user IDs, and so on)

3 4.2 Advantages of distributed file systems File system mirrors the corporate structure. File systems can be distributed over a corporate network, which might span cities, countries or even continents. The setup of a complete network file system over a corporation can allow the network to mirror the logical setup of the organization, rather than its physical and geographical organization. For example the Sales Department might be distributed around the world, but the network in which they connect to is identical to the way that the Sales Department is organized. Easier to protect the access rights on file systems. In a distributed file system it is typical to have a strong security policy on the file system, and each file will have an owner who can define the privileges on this file. File systems on user computers tend to have limited user security. Increased access to single sources of information. Many users can have access to a single source of information. Having multiple versions of a file can cause a great deal of problems, especially if it is not know as to which one is the most up-to-date. Automated updates. Several copies of the same information can be stored, and when any one of them is updated they are synchronized to keep each of them up-to-date. Users can thus have access to a local copy of data, rather than accessing a remote copy of it. This is called mirroring files.

4 4.3 Advantages of distributed file systems Improved backup facilities. A user s computer can be switched-off, but their files can still be backed-up from the distributed file system. Increased reliability. The distributed file system can have a backbone which is constructed from reliable and robust hardware, which are virtually 100% reliable, even when there is a power failure, or when there is a hardware fault. Larger file systems. In some types of distributed file systems it is possible to build-up large file systems from a network of connected disk drives. Easier to administer. Administrators can easily view the complete file system. Interlinking of databases. Small databases can be linked together to create large databases, which can be configured for a given application. The future may also bring the concept of data mining, where agent programs will search for information with a given profile by interrogating databases on the Internet. Limiting file access. Organizations can setup an organization file structure, in which users can have a limited view of complete file system.

5 4.4 Traditional file structure v. corporate structure UNIX \ \ NDS/ Active Directories orgname orgname users users config config sales sales production production progs progs research research Tree structure fred fred bert bert UK UK Office Office US US Office Office

6 4.5 Flat structures \\ \\ Windows NT NT uses uses a flat flat structure, where nodes join join into into a domain \\bert \\bert \\fred \\fred Network \\freddy Local disk Local disk Local disk Domain Flat structure

7 4.6 Forest of drives v. single tree Single tree /etc Global File system /progs Drives mounted over the network to create a single tree /user /sys Network Forest of drives C: D: E: F: Drives mounted over the network to a forest of drives

8 4.7 NFS services protocol stack Application NFS NIS Presentation XDR XDR defines a common data format for the conversion of data values. Session Transport Network Data link Physical RPC TCP IP Ethernet/ Token Ring RPC defines a a number of procedures which can be executed on the server, such as WRITE, CREATE, and so on. RPC is stateless, where a NFS server waits for a client to contact it for a client to contact it, it then gets a request for a service, and sends back the results.

9 4.8 Some RPC procedures used by NFS No Procedure void NULL(void) attrstat GETATTR(fhandle) attrstat SETATTR(sattrargs) readres READ(readargs) attrstat WRITE(writeargs) diropres CREATE(createargs) stat REMOVE(diropargs) stat RENAME(renameargs) stat LINK(linkargs) diropres MKDIR(createargs) stat RMDIR(diropargs) Name No operation Get file attributes Set file attributes Read from file Write to file Create file Remove file Rename file Create link to file Create symbol link Create directory

10 4.9 RPC procedures and responses NFS server Remotely accessed file system RPC procedures getattr, setattr, read, write, create, remove, rename, link, symlink, mkdir, rmdir, readdir Network RPC response Requested data, parameters or status flag (such as: NFS_OK and NFSERR_PERM) File system either mounted onto a single tree or as a forest of drives NFS client

11 #/etc/protocols #/etc/protocols ip 0 IP ip 0 IP icmp 1 ICMP icmp 1 ICMP ggp 3 GGP ggp 3 GGP tcp 6 TCP tcp 6 TCP Server 4.10 NIS domain Master NIS server maintains: /etc/passwd Domain passwords /etc/groups Domain groups /etc/hosts IP addresses and host names /etc/rpc RPC processes /etc/network Used to map IP address to networks /etc/protocols Known network layer protocols /etc/services Known transport layer protocols #/etc/hosts #/etc/groups #/etc/hosts #/etc/groups bath root::0:root bath root::0:root compuserve other::1:root,hpdb compuserve other::1:root,hpdb niss bin::2:root,bin niss bin::2:root,bin hensa sys::3:root,uucp hensa sys::3:root,uucp janet freds_grp::4:fred,fred2,fred janet freds_grp::4:fred,fred2,fred3 Clients NIS Domain #/etc/passwd #/etc/passwd root:fdec6.32:1:0:super unser:/user:/bin/csh root:fdec6.32:1:0:super unser:/user:/bin/csh fred:jt.06hldisdaa:2:4:fred Blogs:/user/fred:/bin/csh fred:jt.06hldisdaa:2:4:fred Blogs:/user/fred:/bin/csh fred2:jty067sdisfaa:3:4:fred Smith:/user/fred2:/bin/csh fred2:jty067sdisfaa:3:4:fred Smith:/user/fred2:/bin/csh #/etc/rpc #/etc/rpc portmapper portmap sunrpc portmapper portmap sunrpc rstatd rstat rstat_svc rstatd rstat rstat_svc rusersd rusers rusersd rusers nfs nfsprog nfs nfsprog ypserv ypprog ypserv ypprog #/etc/services #/etc/services ftp 21/tcp ftp 21/tcp telnet 23/tcp telnet 23/tcp smtp 25/tcp smtp 25/tcp pop3 110/tcp pop3 110/tcp #/etc/networks #/etc/networks loopback loopback localnet localnet Production Production

12 4.11 NIS master and slave(s) Master NIS Server maintains: /etc/passwd /etc/groups /etc/hosts /etc/rpc /etc/network /etc/protocols /etc/services and so on. NIS Domain Master sends updates to NIS slaves Slave NIS server 2. Client broadcasts an NIS request to the domain Slave NIS server 3. The client then binds to the first server which responds NIS client 1. Client is started

13 4.12 inetd.conf defines the network services that are started # <service_name> <sock_type> <proto> <flags> <user> <server_path> <args> # Echo, discard and daytime are used primarily for testing. echo stream tcp nowait root internal echo dgram udp wait root internal discard stream tcp nowait root internal discard dgram udp wait root internal daytime stream tcp nowait root internal daytime dgram udp wait root internal time dgram udp wait root internal # # These are standard services. ftp stream tcp nowait root /usr/sbin/tcpd /usr/sbin/wu.ftpd telnet stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.telnetd # # Shell, login, exec and talk are BSD protocols. shell stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.rshd login stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.rlogind talk dgram udp wait root /usr/sbin/tcpd /usr/sbin/in.ntalkd ntalk dgram udp wait root /usr/sbin/tcpd /usr/sbin/in.ntalkd # # Pop mail servers pop3 stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.pop3d # bootps dgram udp wait root /usr/sbin/tcpd /usr/sbin/in.bootpd # finger stream tcp nowait daemon /usr/sbin/tcpd /usr/sbin/in.fingerd systat stream tcp nowait guest /usr/sbin/tcpd /usr/bin/ps -auwwx

7 Distributed File Systems

7 Distributed File Systems Single tree /etc Global File system /progs Drives mounted over the network to create a single tree /user /sys Network Forest of drives 7 Distributed File Systems C: D: E: F: Drives mounted over the network

More information

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p. Preface to the First Edition p. xv Preface to the Second Edition p. xvii Acknowledgments p. xix UNIX Operating System Environment p. 1 UNIX: Past and Present p. 2 History and Growth of UNIX p. 2 Flavors

More information

Networking Operating Systems (CO32010)

Networking Operating Systems (CO32010) Networking Operating Systems (CO32010) 3.1 Introduction 3.2 Interprocess communication 3.3 Flags and semaphores 3.4 RPC 3.5 Multi-processor systems 1. Operating Systems 3.6 Exercises 6. Routers 7. Encryption

More information

LINUX ADMINISTRATION TYBSC-IT SEM V

LINUX ADMINISTRATION TYBSC-IT SEM V 1 LINUX ADMINISTRATION TYBSC-IT SEM V 2 UNIT 4 CHAPTER 1 : INTERNET SERVICES WHAT IS AN INTERNET SERVICE? Internet Service can be defined as any service that can be accessed through TCP/IP based networks,

More information

Chapter 3: Client-Server Paradigm and Middleware

Chapter 3: Client-Server Paradigm and Middleware 1 Chapter 3: Client-Server Paradigm and Middleware In order to overcome the heterogeneity of hardware and software in distributed systems, we need a software layer on top of them, so that heterogeneity

More information

TELE 301 Lecture 8: Post

TELE 301 Lecture 8: Post Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the

More information

SRT210. The Pragmetic art of Administration. NIS Server. Raymond Chan

SRT210. The Pragmetic art of Administration. NIS Server. Raymond Chan 1 SRT210 The Pragmetic art of Administration NIS Server Raymond Chan Seneca College of Applied Technology School of Information & Communications Technology 2 What is NIS? A Name Service developed by Sun

More information

Networking Operating Systems (CO32010)

Networking Operating Systems (CO32010) Networking Operating Systems (CO32010) 1. Operating Systems Objectives: 2. Processes To To outline outline the the usage usage of of the the three three main main NOS s: NOS s: NT/2000, UNIX UNIX and and

More information

RFC RFC. Configuring FTP Server. FTP Clients

RFC RFC. Configuring FTP Server. FTP Clients RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,

More information

SMB. / / 80-. /,,,, /scalability/ mainframe. / . ",,!. # $ " fail sharing,,. % ,,. " 90-, 12, /.! database.! /DBMS/.

SMB. / / 80-. /,,,, /scalability/ mainframe. / . ,,!. # $  fail sharing,,. % ,,.  90-, 12, /.! database.! /DBMS/. / 1980 / 80- / /scalability/ mainframe /! "! # $ " fail sharing %! " 90-!! 12! /! database! /DBMS/ /!! RPC SQL "!/file sharing/!-!- "!! - / SMB SMB Server Message Block!! named pipes /& ! / mailslots /

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a

More information

RPC Paradigm. Lenuta Alboaie Andrei Panu

RPC Paradigm. Lenuta Alboaie Andrei Panu RPC Paradigm Lenuta Alboaie (adria@info.uaic.ro) Andrei Panu (andrei.panu@info.uaic.ro) 1 Content Remote Procedure Call (RPC) Preliminaries Characteristics XDR (External Data Representation) Functioning

More information

14. Configuring Telnet in Knoppix

14. Configuring Telnet in Knoppix 14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration Daemons init cron and atd inetd and xinetd Kernel daemons File service daemons Internet daemons Time synchronization daemons Booting and configuration daemons

More information

ITEM Y N N/A 1. ACCOUNT ADMINISTRATION 2. SYSTEM ADMINISTRATION

ITEM Y N N/A 1. ACCOUNT ADMINISTRATION 2. SYSTEM ADMINISTRATION 1. ACCOUNT ADMINISTRATION All users have strong, non-obvious passwords) Every user has a unique account No users have the same user ID Every default account s password has been changed All guest accounts

More information

Addresses, Protocols, and Ports Reference

Addresses, Protocols, and Ports Reference APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

HP HP-UX Networking and Security. Download Full Version :

HP HP-UX Networking and Security. Download Full Version : HP HP0-094 HP-UX Networking and Security Download Full Version : https://killexams.com/pass4sure/exam-detail/hp0-094 QUESTION: 168 In order to restrict the access to the /etc/passwd file through ftp, which

More information

Xinted. 1.1 Brief introduction. 1.2 Configuration of Xinetd

Xinted. 1.1 Brief introduction. 1.2 Configuration of Xinetd Xinted 1.1 Brief introduction Xinetd provides visiting control, improved log function and resource management. It is standard super guardian process of Internet in Asianux 2.0 system. Inetd is called super

More information

Cluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks

Cluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Network Designs Impact of Network Design Security from outside attack Usability

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate

Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate 221 7 (Inter)Networking Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate Internetwork: system of two or more networks (segments), connected via gateways, which enables

More information

Remote Procedure Call

Remote Procedure Call Remote Procedure Call Outline Concept of RPC SunRPC Spring 2009 CSE30264 1 RPC Timeline Server Request Blocked Blocked Reply Computing Blocked Spring 2009 CSE30264 2 RPC There exists a way for processes

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

1. Which OSI layers offers reliable, connection-oriented data communication services?

1. Which OSI layers offers reliable, connection-oriented data communication services? CCNA 1 Practice Final Exam Answers v4.0 100% 1. Which OSI layers offers reliable, connection-oriented data communication services? application presentation session transport network 2. Refer to the exhibit.

More information

The Internet: what it looks like, how it works, and how it is abused

The Internet: what it looks like, how it works, and how it is abused The Internet: what it looks like, how it works, and how it is abused Bill Cheswick ches@cheswick.com Visiting Scholar, University of Pennsylvania 1 What Does the Internet Look Like? 2 Science Seminar 3

More information

Unix Security Guidelines This document is a general overview of the security considerations for a Unix based server implementation.

Unix Security Guidelines This document is a general overview of the security considerations for a Unix based server implementation. Unix Security Guidelines This document is a general overview of the security considerations for a Unix based server implementation. Table of Contents Password Security...1 Account Security...1 Software

More information

Granular Protocol Inspection

Granular Protocol Inspection The feature adds flexibility to the Cisco IOS Firewall by allowing it to perform a higher degree of inspection of TCP and User Data Protocol (UDP) traffic for most RFC 1700 application types. Finding Feature

More information

Symbolics Network File System (NFS) User s Guide. Introduction to Symbolics Network File System (NFS)

Symbolics Network File System (NFS) User s Guide. Introduction to Symbolics Network File System (NFS) Symbolics Network File System (NFS) User s Guide Introduction to Symbolics Network File System (NFS) Symbolics NFS is a user-transparent remote file access protocol. Symbolics NFS is a fully symmetrical

More information

The Bro Cluster The Bro Cluster

The Bro Cluster The Bro Cluster The Bro Cluster The Bro Cluster Intrusion Detection at 10 Gig and A High-Performance beyond using the NIDS Bro Architecture IDS for the Lawrence Berkeley National Lab Robin International Computer Science

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

TCP, UDP Ports, and ICMP Message Types1

TCP, UDP Ports, and ICMP Message Types1 Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found

More information

Processes and Daemons

Processes and Daemons Processes and Daemons Fundamentally, kernels provide a few logical constructs that mediate access to either real or virtual resources. The two most important in Unix are processes and filesystems. You

More information

Linux Networking: network services

Linux Networking: network services Linux Networking: network services David Morgan Client and server: matched pairs Client process inter-process communication Server process 1 OK as long as there s a way to talk Client process Server process

More information

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year! EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : 3X0-103 Title : Linux Networking (Level 1) Version

More information

Wireless Access Points (Part 2)

Wireless Access Points (Part 2) Wireless Access Points (Part 2) Details The lab is a virtual simulation of the Cisco Aironet 1200 Wireless Access Point (WAP). Initially the screen should be as in Figure 1. Figure 1: Initial startup screen

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA Exam File with Answers. Note: Underlines options are correct answers. CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Centrify's Solution for NIS Migration

Centrify's Solution for NIS Migration WHITE PAPER CENTRIFY CORP. Centrify's Solution for NIS Migration APRIL 2008 Leveraging Centrify s DirectControl and Zone Technology to Simplify NIS Migration ABSTRACT Sun Microsystem s Network Information

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions

More information

Computer Networks - Xarxes de Computadors

Computer Networks - Xarxes de Computadors Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications

More information

VB Socket Visual Basic socket implementation

VB Socket Visual Basic socket implementation 10 VB Socket. 10.1 Visual Basic socket implementation Visual Basic support a WinSock control which allows the connection of hosts over a network. It supports both UDP and TCP. Figure 10. shows a sample

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Network security session 9-2 Router Security. Network II

Network security session 9-2 Router Security. Network II Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network

More information

Processes and Daemons

Processes and Daemons Processes and Daemons Fundamentally, kernels provide a few logical constructs that mediate access to either real or virtual resources. The two most important in Unix are processes and filesystems. You

More information

Network Element Configuration

Network Element Configuration The following describes how to configure Flexible NetFlow and NTP servers on your ISR. Configuring a Network Element, page 1 NTP Configuration, page 1 NetFlow Configuration, page 2 Configuring a Network

More information

Unit 17 Networking overview

Unit 17 Networking overview Unit 17 Networking overview Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.1 Unit objectives After completing this unit, you should be able to:

More information

Today: Distributed File Systems. File System Basics

Today: Distributed File Systems. File System Basics Today: Distributed File Systems Overview of stand-alone (UNIX) file systems Issues in distributed file systems Next two classes: case studies of distributed file systems NFS Coda xfs Log-structured file

More information

Protocol Filters APPENDIX

Protocol Filters APPENDIX APPENDIX B The tables in this appendix list some of the protocols that you can filter on the access point. The tables include: Table A-1, Ethertype s Table A-2, IP s Table A-3, IP Port s In each table,

More information

Basic File Transfer Services Commands

Basic File Transfer Services Commands Basic File Transfer Services Commands This chapter provides detailed descriptions of commands used to configure basic file transfer services on a Cisco routing device. For configuration information and

More information

Today: Distributed File Systems

Today: Distributed File Systems Today: Distributed File Systems Overview of stand-alone (UNIX) file systems Issues in distributed file systems Next two classes: case studies of distributed file systems NFS Coda xfs Log-structured file

More information

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal

More information

OPERATING SYSTEMS LINUX

OPERATING SYSTEMS LINUX OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code

More information

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University. Operating Systems Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring 2014 Paul Krzyzanowski Rutgers University Spring 2015 April 22, 2015 2015 Paul Krzyzanowski 1 Question 1 A weakness of using

More information

Performing Basic System Management

Performing Basic System Management This module describes the basic tasks that you can perform to manage the general system features of the Cisco IOS software--those features that are generally not specific to a particular protocol. Finding

More information

CS 416: Operating Systems Design April 22, 2015

CS 416: Operating Systems Design April 22, 2015 Question 1 A weakness of using NAND flash memory for use as a file system is: (a) Stored data wears out over time, requiring periodic refreshing. Operating Systems Week 13 Recitation: Exam 3 Preview Review

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Cisco IOS for S/390 Architecture

Cisco IOS for S/390 Architecture CHAPTER 1 Cisco IOS for S/390 Architecture This chapter describes the architecture of Cisco IOS for S/390. It includes the following sections: Overview An overview of the architecture of Cisco IOS for

More information

Network Protocols What is a stateless Network Protocol?

Network Protocols What is a stateless Network Protocol? What is a stateless Network Protocol? All information about a connection is passed from client to server to client in messages No connection information is saved at the Server What is a stateless Network

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports APPENDIXB This appendix provides a quick reference for IP addresses, protocols, and applications. This appendix includes the following sections: IPv4 Addresses and Subnet Masks, page B-1 IPv6 Addresses,

More information

Lecture 12 RPC RPC RPC. Writing an RPC Program. Sun RPC RPC. February 9+11, 2005

Lecture 12 RPC RPC RPC. Writing an RPC Program. Sun RPC RPC. February 9+11, 2005 RPC Lecture 12 RPC February 9+11, 2005 Remote Procedure Call Follows application-oriented approach (emphasizes problem over communication) Design program and then divide it. RPC RPC There exists a way

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Part Four - Storage Management. Chapter 10: File-System Interface

Part Four - Storage Management. Chapter 10: File-System Interface Part Four - Storage Management Chapter 10: File-System Interface Chapter 10: File-System Interface 10.1 File Concept 10.2 Access Methods 10.3 Directory and Disk Structure 10.4 File-System Mounting 10.5

More information

Services and Security

Services and Security Services and Security Find out what's listening to the net Find out what services are running Find out what they do Disable or remove any that you don't need References http://techrepublic.com.com/5100-6270-1053043.html

More information

Configuration Examples

Configuration Examples CHAPTER 4 Before using this chapter, be sure that you have planned your site s security policy, as described in Chapter 1, Introduction, and configured the PIX Firewall, as described in Chapter 2, Configuring

More information

Sun RPC ALG Support for Firewalls and NAT

Sun RPC ALG Support for Firewalls and NAT The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol

More information

Sun RPC ALG Support for Firewalls and NAT

Sun RPC ALG Support for Firewalls and NAT The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol

More information

Introduction to the Network File System (NFS)

Introduction to the Network File System (NFS) Introduction to the Network File System (NFS) What was life like before NFS? Introduction to the Network File System (NFS) NFS is built on top of: UDP - User Datagram Protocol (unreliable delivery) Introduction

More information

Cluster Computing Spring 2004 Paul A. Farrell

Cluster Computing Spring 2004 Paul A. Farrell Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Internet Protocol Stack and Parameters NIC/OS Driver Maximum Amount of Data

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

Introduction to the Network File System (NFS)

Introduction to the Network File System (NFS) Introduction to the Network File System (NFS) What was life like before NFS? Introduction to the Network File System (NFS) NFS is built on top of: UDP - User Datagram Protocol (unreliable delivery) XDR

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Novell. ZENworks. for Desktops 3.2 Preboot Services ADMINISTRATION

Novell. ZENworks. for Desktops 3.2 Preboot Services ADMINISTRATION 3.2 Novell ZENworks for Desktops 3.2 Preboot Services www.novell.com ADMINISTRATION Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

System Administration

System Administration User and Group Management All processes on the system run under by a user. Users can be collected into groups which can be given common attributes Users and groups are represented by the system using unique

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports This chapter provides a quick reference for IP addresses, protocols, and applications. IPv4 Addresses and Subnet Masks, page 1 IPv6 Addresses, page 5 Protocols and Applications, page 11 and Ports, page

More information

Configuring Basic File Transfer Services

Configuring Basic File Transfer Services Using basic file transfer services, you can configure a router as a Trivial File Transfer Protocol (TFTP) or Reverse Address Resolution Protocol (RARP) server, configure the router to forward extended

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

Mailman. Fetchmail and NT (ems3) Mailman. Fetchmail script. handles mailing lists web based and based

Mailman. Fetchmail and NT (ems3) Mailman. Fetchmail script. handles mailing lists web based and  based Fetchmail and NT (ems3) slide 1 Mailman slide 2 University mail server isems3 auser joe has an account jbloggs on corporate also maintains a film mailing list requires three accounts film@glam.ac.uk: post

More information

Context Based Access Control (CBAC): Introduction and Configuration

Context Based Access Control (CBAC): Introduction and Configuration Context Based Access Control (CBAC): Introduction and Configuration Document ID: 13814 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information What Traffic Do

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment 5. This chapter explains how to configure PRICOM in UNIX/Linux environment and how to print using LPD and FTP. For further information not covered in this manual, refer to the manual of workstation you

More information

1 of 5 5/19/05 9:48 AM

1 of 5 5/19/05 9:48 AM 1 of 5 5/19/05 9:48 AM "Well Known" TCP and UDP Ports Used By Apple Software Products This document lists TCP and UDP ports used by Apple software products, such as Mac OS 9, Mac OS X, Mac OS X Server,

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

INSE 6130 Operating System Security

INSE 6130 Operating System Security INSE 6130 Operating System Security Secure Booting Prof. Lingyu Wang 1 Overview AEGIS: Secure Bootstrap Architecture TPM: Trusted Platform Module 2 1 The Problem All security controls are initiated by...

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 2 This chapter covers the tasks required for maintaining a Content Engine. Upgrading the System Software, page 2-1 Recovering the System Software, page 2-2 Maintaining the Hard Disk Storage, page

More information

Network File System (NFS)

Network File System (NFS) Network File System (NFS) slide 1 References: Douglas Comer, Internetworking with TCP/IP, p430-432 Simson Garfinkel and Gene Spafford, Practical UNIX and Internet Security, p605-631 NFS is used by GNU/Linux

More information

Configuring Port to Application Mapping

Configuring Port to Application Mapping Configuring Port to Application Mapping Last Updated: January 19, 2012 This chapter describes the Cisco IOS Firewall Port to Application Mapping (PAM) feature. PAM enables CBAC-supported applications to

More information

Network Review TEJ4M. SBrace

Network Review TEJ4M. SBrace Network Review TEJ4M SBrace Example of how the OSI Layers work using an e-mail sent from the computer on the left. Email sent from John: Meet me at Carl s 1:30 John Identify sender and intended receiver;

More information

Foundations of Python

Foundations of Python Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the

More information