Networking Operating Systems (CO32010)
|
|
- Domenic Noel Greene
- 6 years ago
- Views:
Transcription
1 Networking Operating Systems (CO32010) 1. Operating Systems Objectives: 2. Processes To To outline outline the the usage usage of of the the three three main main NOS s: NOS s: NT/2000, UNIX UNIX and and Netware. and To To define define the the usage usage of of object object scheduling properties each each of of the the NOS s. NOS s. To To define define how how distributed files files systems are are created created in in the the three three main main NOS s NOS s (UNIX (UNIX NFS, NFS, Active Active Directories NT/2000 and and NDS NDS NetWare) 7. Encryption 3. Distributed processing 8.1 Introduction 8.2 Microsoft Windows 8.3 UNIX 8.4 Novell NetWare 8.5 NDS 6. Routers 5. Routing protocols 8. NT, UNIX and NetWare 4. Distributed file systems
2 Local audit policy Success Failure User login/logout File and object access? Use of user rights?? User and group management? Security policy changes? Restart/shutdown Process tracking \\freds_pc \\bills_pc Domain Domain (my_d) (my_d) \\server1 Domain audit policy Success Failure User login/logout File and object access? etc
3 UNIX file attributes file owner name group s name date/time last modified filename - rwxr - xr -x 1 bill_b staff 28 May gopc directory attribute d rwx rwx rwx User USER GROUP WORLD Group World
4 UNIX TCP/IP for its communications. NFS for mounting files over a network. ICMP (for ping, traceroute, and so on). RIP (for routing). ARP (for determination of MAC addresses). DNS (for determining domain names). BOOTP (for IP address allocation). FTP (for file transfer). TELNET (for remote login). NIS (for creating domains). RPC (for remote processing execution). SMTP (for ). SNMP (for network management)
5 Application Application Presentation Presentation Application Application program program Session Session Transport Transport Network Network NetWare NetWare (SPX/IPX) (SPX/IPX) UNIX/ UNIX/ Internet Internet (TCP/IP) (TCP/IP) Windows Windows (NetBEUI) (NetBEUI) Transport Driver Interface (TDI) Network Device Interface Specification (NDIS) Data Data link link Physical Physical Media Media Access Access Control Control Ethernet/ Ethernet/ ATM/ ATM/ ISDN/ ISDN/ etc. etc. NDIS Wrapper NDIS NIC Driver NIC
6 Application programs NetWare shell (NETx) software NCP (network core protocol) SPX/IPX hardware ODI (open data-link interface) NIC (network interface card) NetWare client: Windows NT, Windows 3.1, Unix, OS/2, Mac or DOS server
7 Application Application program Presentation NetWare shell Session NCP redirector/ NETBIOS emulator Transport SPX Network Data link Physical IPX Ethernet, Token Ring, etc. Open-device interface (ODI)
8 Problems with Novell NetWare 3 It uses SPX/IPX which is incompatible with TCP/IP traffic. It is difficult to synchronize servers with user information. The file structure is local to individual servers. Server architecture is flat and cannot be organized into a hierarchical structure (Bindery services).
9 NDS Hierarchical server structure. Network-wide users and groups. Global objects. NDS integrates users, groups, printers, servers, volumes and other physical resources into a hierarchical tree structure. System-wide login with a single password. This allows users to access resources which are connected to remote servers. NDS processes logins between NetWare 3.1 and NetWare 4/5 servers, if the login names and passwords are the same. Supports distributed file system.
10 NDS (cont.) Synchronization services. NDS allows for directory synchronization, which allows directories to be mirrored on different partitions or different servers. This provides increased reliability in that if a server develops a fault then the files on that server can be replicated by another server. Standardized organizational structure for applications, printers, servers and services. This provides a common structure across different organizations. It integrates most of the administrative tasks in Windows-based NWADMIN.EXE program. It is a truly distributed system where the directory information can be distributed around the tree. Support for NFS server for UNIX resources. Multiple login scripts, as opposed to system and user login scripts in NetWare 3.1. Windows NT support.
11 Organization Organization Root objects Electrical Electrical Mechanical Mechanical Production Production Administration Administration Container objects BINS/VOL1 BINS/VOL1 Q_LASER Q_LASER CD_DISK CD_DISK Containe objects SYS/VOL2 SYS/VOL2
12 [ROOT]. This is the top level of the inverted tree and contains all the objects within the organizational structure. Organization. This object class defines the organizational name (such as FRED_AND_CO). It is normally the next level after [ROOT] (or below the C=Country object). User. This object defines an individual user. The first user created in a NetWare 4 system is the ADMIN user, which is typically the only user with rights to add and delete objects on the whole of the NDS structure. NCP (NetWare Control Protocol) Server. This appears for all NetWare 4 servers. Volume. This identifies the mounted volume for file services. A network file system data links to the Directory tree through Volume objects. The most commonly used objects are: Bindery. These allow compatibility with existing Bindery-based NetWare 3, NetWare 3 clients and NetWare 4 servers which do not completely implement NDS. They display any object that isn t a user, group, queue, profile or print server, which was created using the bindery services. Organizational unit. This object represents the OU part of the NDS tree. These divide the NDS tree into subdivisions, which can represent different geographical sites, different divisions or workgroups. Different divisions might be PRODUCTION, ACCOUNT, RESEARCH, and so on. Each Organizational Unit has its own login script. Organization role. This object represents a defined role within an organization object. It is thus easy to identify users who have an administrative role within the organization. Group. This object represents a grouping of users. All users within a group inherit the same access rights.
13 Directory map. This object points to a file system directory on a mounted volume. It is typically used to create a global file system which has physically separate parts. Alias. This identifies an object with another name. For example, a print queue which is called NET_PRINT1 might have an alias name of HP _LASER_JET_6. Printer. This can either be connected to the printer port of a PC, or connected to a NetWare server. Print queue. This object represents the queue of print jobs. Profile. This object defines a special scripting file. This can be a global login script, a location login script or a special login script. Print server. This object allows print jobs to be queued, waiting to be serviced by the associated printer.
14 [ROOT]. This is the top level of the tree. The top of the NDS tree is the [ROOT] object. C=Country. This object can be used, or not, to represent different countries, typically where an organization is distributed over two or more countries. If it is used then it must be placed below the [ROOT] object. NDS normally does not use the Country object and uses the Organization Unit to define the geographically located sites, such as SALES_UK.[ROOT], SALES_USA.[ROOT], and so on. L=Locality. This object defines locations within other objects, and identifies network portions. The Country and Locality objects are included in the X.500 specification, but they are not normally used, because many NetWare 4 utilities do not recognize it. When used, it must be placed below the [Root] object, Country object, Organization object, or Organizational Unit object.
15 Leaf Objects (CN - Common Name) Apart from the container objects (C, O, OU, and so on) there are leaf objects. These are assigned a CN (for Common Name). They include: CN=AFP Server CN=Bindery CN=Bindery Queue CN=Computer CN=Directory Map CN=Group CN=Organizational Role CN=Print Queue CN=Print Server CN=Printer CN=Profile CN=Server CN=User CN=Volume
16 [ROOT] O=Organization (such as: O=FRED_ANDCO) OU=Organizational Unit (such as: OU=TEST) OU=Organizational Unit (such as: OU=SALES) User1 User2 Printer Printer Server Groups Print Queues Volumes
17 LP=Licensed Product. This object is automatically created when a license certificate is installed. When used, it must be placed below the [Root] object, Country object, Organization object, or Organizational Unit object. O=Organization. This object represents the name of the organization, a company division or a department. Each NDS Directory tree has at least one Organization object, and it must be placed below the [Root] object (unless the tree uses the Country or Locality object). OU=Organization Unit. This object normally represents the name of the organizational unit within the organization, such as Production, Accounts, and so on. At this level, User objects can be added and a system level login script is created. It is normally placed below the Organizational object.
18 Primary server Secondary server NIC MSL adapter Duplexed traffic MSL adapter NIC Network connections
19 Remote access to network PPP/SLIP Remote access connection Remote access server
20 PPTP PPTP Virtual flow PPTP encapsulates the required protocol (TCP/IP, IPX, AppleTalk, NETBEUI) Remote access server Virtual Private Network
21 IP IPX IP IPX IP IPX IP IPX IP IPX IP IPX Network layer PPP IPCP IPXCP ACP NCP NCP Authentication Authentication and and LCP LCP IPCP IPXCP ACP NCP NCP Authentication Authentication and and LCP LCP Data link layer Asynchronous/synchronous media media Asynchronous/synchronous media media PPP trailer IP PPP header
22 Flag Flag ( ) ( ) Address Address ( ) ( ) Control Control ( ) ( ) Protocol Protocol Data Data FCS FCS Flag Flag ( ) ( ) 1 byte 1 byte 1 byte 2 bytes variable 2 or 4 Network protocols: bytes 0021h IP 0029h Appletalk 002bh Novell IPX Network Control Protocols: 8021h IP Control Protocol 8029h Appletalk Control Protocol 802bh Novell IPX Control Protocol 1 byte Link Control Protocols: C021h Link Control Protocol C023h PAP C025h Link Quality Report C223h CHAP
23 2 bytes 2 or 4 bytes Flag Flag ( ) ( ) Address Address ( ) ( ) Control Control ( ) ( ) Protocol Protocol (C021h (C021h - - LCP LCP ) ) FCS FCS Flag Flag ( ) ( ) 1 byte 1 byte 1 byte 1 byte Code Code Identifier Identifier Length Length Data Data 1 Configure-Request 2 Configure-Ack 3 Configure-Nak 4 Configure-Reject 5 Terminate-Request 6 Terminate-Ack 7 Code-Reject 8 Protocol-Reject 9 Echo-Request 10 Echo-Reply 11 Discard-Request
24 Client Network connection Server LCP AND NCP packets Link establishment phase Link quality phase Network-layer protocol phase Link termination phase
25 Network Hostname; remotenode Password; pass 1 Remotenode pass 1 Accept/reject Password sent with clear text
26 Client Server Hostname; remotenode Password; pass 1 Challenge Response Accept/reject
27 RCR sta Tut Closed Closed Open Closing Closing str Close Opened Opened sca RCN,TO + RCR+ RCR- RCA RCN,TO + scr scn Req-sent Req-sent RCA TO+ Ack-Rcvd Ack-Rcvd scn sca Ack-Sent Ack-Sent RCR+ RCR-
28 LCP configuration packets Link Link Dead Dead Phase Phase Up Link Link Establishment Establishment Phase Phase Opened Authentication Authentication Phase Phase Fail Fail Success/ none Down Link Link Terminatation Terminatation Phase Phase Closing Network- Network- Layer Layer Protocol Protocol Phase Phase NCP packets
Chapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationNetWare Protocols. Background. Technology Basics CHAPTER
CHAPTER 19 NetWare Protocols Background NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc. and introduced to the market in the early 1980s. Then,
More informationNetwork Review TEJ4M. SBrace
Network Review TEJ4M SBrace Example of how the OSI Layers work using an e-mail sent from the computer on the left. Email sent from John: Meet me at Carl s 1:30 John Identify sender and intended receiver;
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationNetWare Protocols. Background CHAPTER
CHAPTER 31 NetWare Protocols Background NetWare is a network operating system (NOS) that provides transparent remote file access and numerous other distributed network services, including printer sharing
More informationAXIS 1440 Network Print Server for EPSON Printers. Technical Specifications. Supported Protocols. Supported Printers. Mechanical.
printer connector Supported Protocols NetWare: IPX, SAP, RIP, SPX, NCP (extended with NDS) and LIP. Windows/OS/2 : NetBIOS/NetBEUI, TCP/IP, WINS/ NBT. Ethernet 10BaseT connector test button network indicator
More informationCompTIA Network+ Course
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
More informationFundamentals of edirectory
Warren E. Wyrostek, M.Ed., M.Div., MCNI, MCNE, CDE Fundamentals of edirectory Author: Novell NetWare 6.5 CNA Exam Cram2 http://www.3wscertification.com wyrostekw@msn.com Basics Fundamentals of edirectory
More informationPoint-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP) www.ine.com PPP» Point-to-Point Protocol» Open standard» Operates in the LLC sub-layer of data link layer in OSI» Originally designed for dial-up connections (modems, ISDN,
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationBasic Configuration D. Contents
451-0084D Contents Overview...5 IP/PPP Protocols...7 IP/PPP (IPCP) Features...7 IPX /IPXCP Protocols...10 CCL Scripts... 27 Protocols and Features... 28 Automatic Protocol Detection (APD)... 30 APD Notes...30
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationPrint Server Administration User s Guide
Print Server Administration User s Guide ii About This Guide Table of Contents ABOUT THIS GUIDE... 1 What s Not Covered in This User s Guide... 1 Contents of the User s Guide... 2 INTRODUCTION... 3 Background
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationDHCP Client on WAN Interfaces
DHCP Client on WAN Interfaces First Published: February 25, 2002 Last Updated: September 12, 2008 The DHCP Client on WAN Interfaces feature extends the Dynamic Host Configuration Protocol (DHCP) to allow
More informationNetworking Fundamentals
Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationOSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI
More informationNetwork Implementation
3............................................. Network Implementation Domain 3.0: Network Implementation Objective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication,
More informationPrint Server. Quick Configuration Guide. Network Connectivity for Printers
Print Server Quick Configuration Guide Network Connectivity for Printers 1 Features The DPO NIC enables printers to communicate over an Ethernet network with many different network operating systems, including
More informationNetworking Operating Systems (CO32010)
Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling Objectives: To discuss the advantages of a distributed file system. To outline the different methods of mounting
More informationComputer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University
Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges
More informationIntroduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices
Preface p. xv Acknowledgments p. xvii Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices p. 6 Firewall
More informationFundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1
Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary
More informationch02 True/False Indicate whether the statement is true or false.
ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be
More informationTroubleshooting Novell IPX
CHAPTER 8 NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc., and introduced to the market in the early 1980s. Then, networks were small and predominantly
More informationPreface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.
Preface to the First Edition p. xv Preface to the Second Edition p. xvii Acknowledgments p. xix UNIX Operating System Environment p. 1 UNIX: Past and Present p. 2 History and Growth of UNIX p. 2 Flavors
More informationCCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)
CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function
More informationCX1145 MFP. Network Administration Guide , Rev. 1.0
CX1145 MFP Network Administration Guide 59315601, Rev. 1.0 TRADEMARKS AND COPYRIGHT Trademarks The official name of Windows 98 is Microsoft Windows 98 Operating System. The official name of Windows Me
More informationSLIP and PPP Configuration Commands
CHAPTER 15 SLIP and PPP Configuration Commands SLIP and PPP define methods of sending Internet Protocol (IP) packets over standard EIA/TIA-232 asynchronous serial lines with minimum line speeds of 1200
More informationAddresses, Protocols, and Ports Reference
APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types
More informationPoint-to-Point Protocol (PPP) Accessing the WAN Chapter 2
Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Describe the fundamental concepts of point-to-point serial
More informationUsers Manual SX. Appendix. Hardware Specification. Operating Environment -Temperature: +5C to +35C -Humidity : 20-80% RH (no dewing)
Appendix Hardware Specification Operating Environment -Temperature: +5C to +35C -Humidity : 20-80% RH (no dewing) Storage Environment -Temperature: -10C to +50C -Humidity : 20-90% RH (no dewing) EMI -VCCI
More informationPoint-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Describe the fundamental concepts of point-to-point serial
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationDefine TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model
[Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of
More informationBrief Table of Contents
Brief Table of Contents Introduction... xiii Chapter 1 What s New in Windows 2000 Professional... 1 Chapter 2 Installing and Deploying Windows 2000 Professional... 27 Chapter 3 Microsoft Management Console
More informationServer Message Block Protocol (SMB)
http://ourworld.compuserve.com/homepages/timothydevans/smb.htm# Server Message Block Protocol () There are very many systems which can use the NetBIOS / NetBEUI interface or make use of the NetBIOS Frames
More informationEthereal Exercise 2 (Part A): Link Control Protocol
Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols
Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds
More informationHands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the
More informationPrint Server. User s Manual
Print Server User s Manual 1. INTRODUCTION...5 1.1 Product Introduction... 6 1.2 Product Models... 7 1.3 Product Package... 9 1.4 Network Printing Architecture... 11 1.4.1 Print Server Network Functions...
More informationNetwork Implementation
03 078973110x CH03 3/26/04 9:48 AM Page 97 3............................................. Network Implementation Domain 3.0-Network Implementation Objective 3.1: Identify the Basic Capabilities (i.e.,
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationModel C830 Network Features
Model C830 Network Features TCP/IP Protocol Network Layer ARP IP ICMP IPv6 Session Layer TCP UDP Application Layer Oki LPR Port 9100 FTP HTTP, HTTPS IPP SNMPv1/v3, MIB II TELNET DHCP/BOOTP DNS, DDNS WINS
More informationSoftware Engineering 4C03 Answer Key
Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationAdvanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices
Advanced Network Administration 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices 2. Duration 5 Days 3. Purpose This five day course for L-2 Network
More informationCCNA 4 - Final Exam (B)
CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment
More informationIP and Network Technologies. IP over WAN. Agenda. Agenda
IP and Network Technologies IP over WAN Address Resolution, Encapsulation, Routing, NBMA PPP, Inverse ARP, Overview IP over ATM for transport of IP datagrams over a network encapsulation and address resolution
More informationNetwork Protocols. Terms you ll need to understand: Techniques you ll need to master:
3 Network Protocols Terms you ll need to understand: OSI Reference Model Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer IEEE 802 specifications
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationEthereal Exercise 2 (Part B): Link Control Protocol
Course: Semester: ELE437 Introduction Ethereal Exercise 2 (Part B): Link Control Protocol In this half of Exercise 2, you will look through a more complete capture of a dial-up connection being established.
More informationData-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols
Computer Networking Data-link layer Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr Data Link Layer Our goals: Understand principles behind link layer services: sharing a broadcast channel: multiple
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationSession 16 Windows 7 Professional DNS & Active Directory
Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationLevelOne FPS-9021/FPS User Manual. Mini Printer Server w/parallel (USB2.0) Port V
LevelOne FPS-9021/FPS-9022 Mini Printer Server w/parallel (USB2.0) Port User Manual V1.0.0-0601 CONTENTS 1. INTRODUCTION...1 1.1 Product Introduction... 2 1.2 Product Package... 3 1.3 Network Printing
More informationChapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols
More informationC920WT/ES9420WT. Network Guide
C920WT/ES9420WT Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the
More informationIP Technology. IP Technology. IP Datagram Service. Agenda
IP Technology IP Technology Introduction, IP Protocol Details IP Addressing and IP Forwarding ARP, ICMP, PPP, HSRP, VRRP packet switching technology packet switch is called router or gateway (IETF terminology)
More informationNetwork Administration
16-Bit Core - Loading... 3:28 32-Bit Core - Loading... 3:27 802.3... 1:36 802.4... 1:36 802.5... 1:36 A Account Database Synchronization... 11:29 Account Policy... 7:20 Account Policy - Managing... 7:22
More informationPOINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016
POINT TO POINT DATALINK PROTOCOLS ETI 2506 Telecommunication Systems Monday, 7 November 2016 TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember PPP Frame
More informationCCNA 4 - Final Exam (A)
CCNA 4 - Final Exam (A) 1. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More informationNetworking midterm. 5. As a data unit moves up from one protocol layer to another, control headers are:
Networking midterm 1. A protocol is a set of conventionally agreed rules that specify how data is to be exchanged between pairs of programs or devices. 2. The primary function of the Internet Protocol
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationES6410 / ES7411. Network Guide
ES6410 / ES7411 Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the
More informationProtocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical
More informationNetwork Setup 2.0
Network Setup 2.0 4343-7709-01 Foreword Welcome Thank you for using Network Setup. Network Setup is utility software which allows simple network setup of devices such as printers. It allows setup of devices
More informationConnections, addressing and common configuration rules.
Lab #1 r9-1 s2 e1 3/11 VLAN_21 BGP AS 100 s1 3/1 e0 s0 e0 3/2 s1 VLAN_22 BGP AS 200 r1 r2 Ring 4 r4 s0/1 r3 to0/0 s0/0 s0 s1 OSPF Area 33 to0 e0/0 e0 OSPF Area 4 3/4 b0/0 3/3 VLAN_14 VLAN_13 403 304 c15
More informationLecture 1.1: Point to Point Protocol (PPP) An introduction
Lecture 1.1: Point to Point Protocol (PPP) An introduction "the watchword for a point-to-point protocol should be simplicity" (RFC 1547, PPP requirements). disattended by 50+ RFCs Recommended reading:
More informationTechnical MCSE. Content:
www.whanet.co.uk Technical MCSE Content: Foreword...1 Module Outline...2 Exchange Server 4.0 Series...2 Exchange Server 5.0 Series (Exam 70-076)...3 Exchange Server 5.5 Series...5 IIS 4 Series...7 Networking
More informationLecture (03) Internet Protocol tcp/ip> OSI>
Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing
More informationEXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.
HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This
More informationTECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...
S n i f f e m 1. 0 1 Whiitepaper TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...2 Hardware...2 Software...2
More information01/17/08 TDC /17/08 TDC363-03
Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationThis document is a tutorial related to the Router Emulator which is available at:
Introduction This document is a tutorial related to the Router Emulator which is available at: http://www.dcs.napier.ac.uk/~bill/router.html A demo is also available at: http://www.dcs.napier.ac.uk/~bill/router_demo.htm
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationTime : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.
COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate
More informationNetworking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.
Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local
More informationAdded Features. 1. PPTP (Point-to-Point Tunneling Protocol)
Added Features 1. PPTP (Point-to-Point Tunneling Protocol) APOS PPTP (Point-to-Point Tunneling Protocol) conforms to the RFC2637 standard. If you can access the PPTP server through the LAN interface, you
More informationNetwork Quick Install Cards Overview
Network Quick Install Cards Overview Page 1 1. Configure the Document Centre for Token Ring or Dynamic TCP/IP addressing (If applicable) For 100MBps Ethernet or Token Ring Networks Dynamic TCP/IP addressing
More informationDocuPrint C55/C55mp Quick Network Install Guide
DocuPrint C55/C55mp Quick Network Install Guide Windows for Workgroups / Windows 95 Peer-to-Peer Network Windows NT 3.5X Network Windows NT 4.X Network Macintosh EtherTalk/TokenTalk Network Novell NetWare
More informationConfiguring Commonly Used IP ACLs
Configuring Commonly Used IP ACLs Document ID: 26448 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Examples Allow a Select Host to Access the Network Deny a
More informationChapter 5 TCP/IP SUITE
Chapter 5 TCP/IP SUITE Objectives:- TCP/ IP Model Concept. Defining/functioning of different Layers of TCP / IP suite. 5.1 Introduction Addressing mechanism in the Internet An IP address is an address
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationKYOCERA COMMAND CENTER. Operation Guide
KYOCERA COMMAND CENTER Operation Guide Legal and General Information Notice Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for
More informationNetwork Guide. IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG
Network Guide IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG Network Guide How This Manual Is Organized Chapter 1 Before You Start Chapter 2
More informationLecture (02) Network Protocols and Standards
Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components
More informationNovell. NetWare 6. FILTER CONFIGURATION
Novell NetWare 6 www.novell.com FILTER CONFIGURATION Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims
More informationLecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I
Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationCCNA MCQS with Answers Set-1
CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.
More information