Networking Operating Systems (CO32010)

Size: px
Start display at page:

Download "Networking Operating Systems (CO32010)"

Transcription

1 Networking Operating Systems (CO32010) 1. Operating Systems Objectives: 2. Processes To To outline outline the the usage usage of of the the three three main main NOS s: NOS s: NT/2000, UNIX UNIX and and Netware. and To To define define the the usage usage of of object object scheduling properties each each of of the the NOS s. NOS s. To To define define how how distributed files files systems are are created created in in the the three three main main NOS s NOS s (UNIX (UNIX NFS, NFS, Active Active Directories NT/2000 and and NDS NDS NetWare) 7. Encryption 3. Distributed processing 8.1 Introduction 8.2 Microsoft Windows 8.3 UNIX 8.4 Novell NetWare 8.5 NDS 6. Routers 5. Routing protocols 8. NT, UNIX and NetWare 4. Distributed file systems

2 Local audit policy Success Failure User login/logout File and object access? Use of user rights?? User and group management? Security policy changes? Restart/shutdown Process tracking \\freds_pc \\bills_pc Domain Domain (my_d) (my_d) \\server1 Domain audit policy Success Failure User login/logout File and object access? etc

3 UNIX file attributes file owner name group s name date/time last modified filename - rwxr - xr -x 1 bill_b staff 28 May gopc directory attribute d rwx rwx rwx User USER GROUP WORLD Group World

4 UNIX TCP/IP for its communications. NFS for mounting files over a network. ICMP (for ping, traceroute, and so on). RIP (for routing). ARP (for determination of MAC addresses). DNS (for determining domain names). BOOTP (for IP address allocation). FTP (for file transfer). TELNET (for remote login). NIS (for creating domains). RPC (for remote processing execution). SMTP (for ). SNMP (for network management)

5 Application Application Presentation Presentation Application Application program program Session Session Transport Transport Network Network NetWare NetWare (SPX/IPX) (SPX/IPX) UNIX/ UNIX/ Internet Internet (TCP/IP) (TCP/IP) Windows Windows (NetBEUI) (NetBEUI) Transport Driver Interface (TDI) Network Device Interface Specification (NDIS) Data Data link link Physical Physical Media Media Access Access Control Control Ethernet/ Ethernet/ ATM/ ATM/ ISDN/ ISDN/ etc. etc. NDIS Wrapper NDIS NIC Driver NIC

6 Application programs NetWare shell (NETx) software NCP (network core protocol) SPX/IPX hardware ODI (open data-link interface) NIC (network interface card) NetWare client: Windows NT, Windows 3.1, Unix, OS/2, Mac or DOS server

7 Application Application program Presentation NetWare shell Session NCP redirector/ NETBIOS emulator Transport SPX Network Data link Physical IPX Ethernet, Token Ring, etc. Open-device interface (ODI)

8 Problems with Novell NetWare 3 It uses SPX/IPX which is incompatible with TCP/IP traffic. It is difficult to synchronize servers with user information. The file structure is local to individual servers. Server architecture is flat and cannot be organized into a hierarchical structure (Bindery services).

9 NDS Hierarchical server structure. Network-wide users and groups. Global objects. NDS integrates users, groups, printers, servers, volumes and other physical resources into a hierarchical tree structure. System-wide login with a single password. This allows users to access resources which are connected to remote servers. NDS processes logins between NetWare 3.1 and NetWare 4/5 servers, if the login names and passwords are the same. Supports distributed file system.

10 NDS (cont.) Synchronization services. NDS allows for directory synchronization, which allows directories to be mirrored on different partitions or different servers. This provides increased reliability in that if a server develops a fault then the files on that server can be replicated by another server. Standardized organizational structure for applications, printers, servers and services. This provides a common structure across different organizations. It integrates most of the administrative tasks in Windows-based NWADMIN.EXE program. It is a truly distributed system where the directory information can be distributed around the tree. Support for NFS server for UNIX resources. Multiple login scripts, as opposed to system and user login scripts in NetWare 3.1. Windows NT support.

11 Organization Organization Root objects Electrical Electrical Mechanical Mechanical Production Production Administration Administration Container objects BINS/VOL1 BINS/VOL1 Q_LASER Q_LASER CD_DISK CD_DISK Containe objects SYS/VOL2 SYS/VOL2

12 [ROOT]. This is the top level of the inverted tree and contains all the objects within the organizational structure. Organization. This object class defines the organizational name (such as FRED_AND_CO). It is normally the next level after [ROOT] (or below the C=Country object). User. This object defines an individual user. The first user created in a NetWare 4 system is the ADMIN user, which is typically the only user with rights to add and delete objects on the whole of the NDS structure. NCP (NetWare Control Protocol) Server. This appears for all NetWare 4 servers. Volume. This identifies the mounted volume for file services. A network file system data links to the Directory tree through Volume objects. The most commonly used objects are: Bindery. These allow compatibility with existing Bindery-based NetWare 3, NetWare 3 clients and NetWare 4 servers which do not completely implement NDS. They display any object that isn t a user, group, queue, profile or print server, which was created using the bindery services. Organizational unit. This object represents the OU part of the NDS tree. These divide the NDS tree into subdivisions, which can represent different geographical sites, different divisions or workgroups. Different divisions might be PRODUCTION, ACCOUNT, RESEARCH, and so on. Each Organizational Unit has its own login script. Organization role. This object represents a defined role within an organization object. It is thus easy to identify users who have an administrative role within the organization. Group. This object represents a grouping of users. All users within a group inherit the same access rights.

13 Directory map. This object points to a file system directory on a mounted volume. It is typically used to create a global file system which has physically separate parts. Alias. This identifies an object with another name. For example, a print queue which is called NET_PRINT1 might have an alias name of HP _LASER_JET_6. Printer. This can either be connected to the printer port of a PC, or connected to a NetWare server. Print queue. This object represents the queue of print jobs. Profile. This object defines a special scripting file. This can be a global login script, a location login script or a special login script. Print server. This object allows print jobs to be queued, waiting to be serviced by the associated printer.

14 [ROOT]. This is the top level of the tree. The top of the NDS tree is the [ROOT] object. C=Country. This object can be used, or not, to represent different countries, typically where an organization is distributed over two or more countries. If it is used then it must be placed below the [ROOT] object. NDS normally does not use the Country object and uses the Organization Unit to define the geographically located sites, such as SALES_UK.[ROOT], SALES_USA.[ROOT], and so on. L=Locality. This object defines locations within other objects, and identifies network portions. The Country and Locality objects are included in the X.500 specification, but they are not normally used, because many NetWare 4 utilities do not recognize it. When used, it must be placed below the [Root] object, Country object, Organization object, or Organizational Unit object.

15 Leaf Objects (CN - Common Name) Apart from the container objects (C, O, OU, and so on) there are leaf objects. These are assigned a CN (for Common Name). They include: CN=AFP Server CN=Bindery CN=Bindery Queue CN=Computer CN=Directory Map CN=Group CN=Organizational Role CN=Print Queue CN=Print Server CN=Printer CN=Profile CN=Server CN=User CN=Volume

16 [ROOT] O=Organization (such as: O=FRED_ANDCO) OU=Organizational Unit (such as: OU=TEST) OU=Organizational Unit (such as: OU=SALES) User1 User2 Printer Printer Server Groups Print Queues Volumes

17 LP=Licensed Product. This object is automatically created when a license certificate is installed. When used, it must be placed below the [Root] object, Country object, Organization object, or Organizational Unit object. O=Organization. This object represents the name of the organization, a company division or a department. Each NDS Directory tree has at least one Organization object, and it must be placed below the [Root] object (unless the tree uses the Country or Locality object). OU=Organization Unit. This object normally represents the name of the organizational unit within the organization, such as Production, Accounts, and so on. At this level, User objects can be added and a system level login script is created. It is normally placed below the Organizational object.

18 Primary server Secondary server NIC MSL adapter Duplexed traffic MSL adapter NIC Network connections

19 Remote access to network PPP/SLIP Remote access connection Remote access server

20 PPTP PPTP Virtual flow PPTP encapsulates the required protocol (TCP/IP, IPX, AppleTalk, NETBEUI) Remote access server Virtual Private Network

21 IP IPX IP IPX IP IPX IP IPX IP IPX IP IPX Network layer PPP IPCP IPXCP ACP NCP NCP Authentication Authentication and and LCP LCP IPCP IPXCP ACP NCP NCP Authentication Authentication and and LCP LCP Data link layer Asynchronous/synchronous media media Asynchronous/synchronous media media PPP trailer IP PPP header

22 Flag Flag ( ) ( ) Address Address ( ) ( ) Control Control ( ) ( ) Protocol Protocol Data Data FCS FCS Flag Flag ( ) ( ) 1 byte 1 byte 1 byte 2 bytes variable 2 or 4 Network protocols: bytes 0021h IP 0029h Appletalk 002bh Novell IPX Network Control Protocols: 8021h IP Control Protocol 8029h Appletalk Control Protocol 802bh Novell IPX Control Protocol 1 byte Link Control Protocols: C021h Link Control Protocol C023h PAP C025h Link Quality Report C223h CHAP

23 2 bytes 2 or 4 bytes Flag Flag ( ) ( ) Address Address ( ) ( ) Control Control ( ) ( ) Protocol Protocol (C021h (C021h - - LCP LCP ) ) FCS FCS Flag Flag ( ) ( ) 1 byte 1 byte 1 byte 1 byte Code Code Identifier Identifier Length Length Data Data 1 Configure-Request 2 Configure-Ack 3 Configure-Nak 4 Configure-Reject 5 Terminate-Request 6 Terminate-Ack 7 Code-Reject 8 Protocol-Reject 9 Echo-Request 10 Echo-Reply 11 Discard-Request

24 Client Network connection Server LCP AND NCP packets Link establishment phase Link quality phase Network-layer protocol phase Link termination phase

25 Network Hostname; remotenode Password; pass 1 Remotenode pass 1 Accept/reject Password sent with clear text

26 Client Server Hostname; remotenode Password; pass 1 Challenge Response Accept/reject

27 RCR sta Tut Closed Closed Open Closing Closing str Close Opened Opened sca RCN,TO + RCR+ RCR- RCA RCN,TO + scr scn Req-sent Req-sent RCA TO+ Ack-Rcvd Ack-Rcvd scn sca Ack-Sent Ack-Sent RCR+ RCR-

28 LCP configuration packets Link Link Dead Dead Phase Phase Up Link Link Establishment Establishment Phase Phase Opened Authentication Authentication Phase Phase Fail Fail Success/ none Down Link Link Terminatation Terminatation Phase Phase Closing Network- Network- Layer Layer Protocol Protocol Phase Phase NCP packets

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

NetWare Protocols. Background. Technology Basics CHAPTER

NetWare Protocols. Background. Technology Basics CHAPTER CHAPTER 19 NetWare Protocols Background NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc. and introduced to the market in the early 1980s. Then,

More information

Network Review TEJ4M. SBrace

Network Review TEJ4M. SBrace Network Review TEJ4M SBrace Example of how the OSI Layers work using an e-mail sent from the computer on the left. Email sent from John: Meet me at Carl s 1:30 John Identify sender and intended receiver;

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

NetWare Protocols. Background CHAPTER

NetWare Protocols. Background CHAPTER CHAPTER 31 NetWare Protocols Background NetWare is a network operating system (NOS) that provides transparent remote file access and numerous other distributed network services, including printer sharing

More information

AXIS 1440 Network Print Server for EPSON Printers. Technical Specifications. Supported Protocols. Supported Printers. Mechanical.

AXIS 1440 Network Print Server for EPSON Printers. Technical Specifications. Supported Protocols. Supported Printers. Mechanical. printer connector Supported Protocols NetWare: IPX, SAP, RIP, SPX, NCP (extended with NDS) and LIP. Windows/OS/2 : NetBIOS/NetBEUI, TCP/IP, WINS/ NBT. Ethernet 10BaseT connector test button network indicator

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

Fundamentals of edirectory

Fundamentals of edirectory Warren E. Wyrostek, M.Ed., M.Div., MCNI, MCNE, CDE Fundamentals of edirectory Author: Novell NetWare 6.5 CNA Exam Cram2 http://www.3wscertification.com wyrostekw@msn.com Basics Fundamentals of edirectory

More information

Point-to-Point Protocol (PPP)

Point-to-Point Protocol (PPP) Point-to-Point Protocol (PPP) www.ine.com PPP» Point-to-Point Protocol» Open standard» Operates in the LLC sub-layer of data link layer in OSI» Originally designed for dial-up connections (modems, ISDN,

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Basic Configuration D. Contents

Basic Configuration D. Contents 451-0084D Contents Overview...5 IP/PPP Protocols...7 IP/PPP (IPCP) Features...7 IPX /IPXCP Protocols...10 CCL Scripts... 27 Protocols and Features... 28 Automatic Protocol Detection (APD)... 30 APD Notes...30

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Print Server Administration User s Guide

Print Server Administration User s Guide Print Server Administration User s Guide ii About This Guide Table of Contents ABOUT THIS GUIDE... 1 What s Not Covered in This User s Guide... 1 Contents of the User s Guide... 2 INTRODUCTION... 3 Background

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

DHCP Client on WAN Interfaces

DHCP Client on WAN Interfaces DHCP Client on WAN Interfaces First Published: February 25, 2002 Last Updated: September 12, 2008 The DHCP Client on WAN Interfaces feature extends the Dynamic Host Configuration Protocol (DHCP) to allow

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Network Implementation

Network Implementation 3............................................. Network Implementation Domain 3.0: Network Implementation Objective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication,

More information

Print Server. Quick Configuration Guide. Network Connectivity for Printers

Print Server. Quick Configuration Guide. Network Connectivity for Printers Print Server Quick Configuration Guide Network Connectivity for Printers 1 Features The DPO NIC enables printers to communicate over an Ethernet network with many different network operating systems, including

More information

Networking Operating Systems (CO32010)

Networking Operating Systems (CO32010) Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling Objectives: To discuss the advantages of a distributed file system. To outline the different methods of mounting

More information

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges

More information

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices Preface p. xv Acknowledgments p. xvii Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices p. 6 Firewall

More information

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1 Fundamentals of Networking OSI & TCP/IP Model Kuldeep Sonar 1 Kuldeep Sonar 2 OSI Model Kuldeep Sonar 3 Application Layer Layer 7 provides an interface between a host s communication software and any necessary

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

Troubleshooting Novell IPX

Troubleshooting Novell IPX CHAPTER 8 NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc., and introduced to the market in the early 1980s. Then, networks were small and predominantly

More information

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p. Preface to the First Edition p. xv Preface to the Second Edition p. xvii Acknowledgments p. xix UNIX Operating System Environment p. 1 UNIX: Past and Present p. 2 History and Growth of UNIX p. 2 Flavors

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

CX1145 MFP. Network Administration Guide , Rev. 1.0

CX1145 MFP. Network Administration Guide , Rev. 1.0 CX1145 MFP Network Administration Guide 59315601, Rev. 1.0 TRADEMARKS AND COPYRIGHT Trademarks The official name of Windows 98 is Microsoft Windows 98 Operating System. The official name of Windows Me

More information

SLIP and PPP Configuration Commands

SLIP and PPP Configuration Commands CHAPTER 15 SLIP and PPP Configuration Commands SLIP and PPP define methods of sending Internet Protocol (IP) packets over standard EIA/TIA-232 asynchronous serial lines with minimum line speeds of 1200

More information

Addresses, Protocols, and Ports Reference

Addresses, Protocols, and Ports Reference APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types

More information

Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2

Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Describe the fundamental concepts of point-to-point serial

More information

Users Manual SX. Appendix. Hardware Specification. Operating Environment -Temperature: +5C to +35C -Humidity : 20-80% RH (no dewing)

Users Manual SX. Appendix. Hardware Specification. Operating Environment -Temperature: +5C to +35C -Humidity : 20-80% RH (no dewing) Appendix Hardware Specification Operating Environment -Temperature: +5C to +35C -Humidity : 20-80% RH (no dewing) Storage Environment -Temperature: -10C to +50C -Humidity : 20-90% RH (no dewing) EMI -VCCI

More information

Point-to-Point Protocol (PPP)

Point-to-Point Protocol (PPP) Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Describe the fundamental concepts of point-to-point serial

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model [Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of

More information

Brief Table of Contents

Brief Table of Contents Brief Table of Contents Introduction... xiii Chapter 1 What s New in Windows 2000 Professional... 1 Chapter 2 Installing and Deploying Windows 2000 Professional... 27 Chapter 3 Microsoft Management Console

More information

Server Message Block Protocol (SMB)

Server Message Block Protocol (SMB) http://ourworld.compuserve.com/homepages/timothydevans/smb.htm# Server Message Block Protocol () There are very many systems which can use the NetBIOS / NetBEUI interface or make use of the NetBIOS Frames

More information

Ethereal Exercise 2 (Part A): Link Control Protocol

Ethereal Exercise 2 (Part A): Link Control Protocol Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

Print Server. User s Manual

Print Server. User s Manual Print Server User s Manual 1. INTRODUCTION...5 1.1 Product Introduction... 6 1.2 Product Models... 7 1.3 Product Package... 9 1.4 Network Printing Architecture... 11 1.4.1 Print Server Network Functions...

More information

Network Implementation

Network Implementation 03 078973110x CH03 3/26/04 9:48 AM Page 97 3............................................. Network Implementation Domain 3.0-Network Implementation Objective 3.1: Identify the Basic Capabilities (i.e.,

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Model C830 Network Features

Model C830 Network Features Model C830 Network Features TCP/IP Protocol Network Layer ARP IP ICMP IPv6 Session Layer TCP UDP Application Layer Oki LPR Port 9100 FTP HTTP, HTTPS IPP SNMPv1/v3, MIB II TELNET DHCP/BOOTP DNS, DDNS WINS

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled

More information

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices Advanced Network Administration 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices 2. Duration 5 Days 3. Purpose This five day course for L-2 Network

More information

CCNA 4 - Final Exam (B)

CCNA 4 - Final Exam (B) CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment

More information

IP and Network Technologies. IP over WAN. Agenda. Agenda

IP and Network Technologies. IP over WAN. Agenda. Agenda IP and Network Technologies IP over WAN Address Resolution, Encapsulation, Routing, NBMA PPP, Inverse ARP, Overview IP over ATM for transport of IP datagrams over a network encapsulation and address resolution

More information

Network Protocols. Terms you ll need to understand: Techniques you ll need to master:

Network Protocols. Terms you ll need to understand: Techniques you ll need to master: 3 Network Protocols Terms you ll need to understand: OSI Reference Model Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer IEEE 802 specifications

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Ethereal Exercise 2 (Part B): Link Control Protocol

Ethereal Exercise 2 (Part B): Link Control Protocol Course: Semester: ELE437 Introduction Ethereal Exercise 2 (Part B): Link Control Protocol In this half of Exercise 2, you will look through a more complete capture of a dial-up connection being established.

More information

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols Computer Networking Data-link layer Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr Data Link Layer Our goals: Understand principles behind link layer services: sharing a broadcast channel: multiple

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Session 16 Windows 7 Professional DNS & Active Directory

Session 16 Windows 7 Professional DNS & Active Directory Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

LevelOne FPS-9021/FPS User Manual. Mini Printer Server w/parallel (USB2.0) Port V

LevelOne FPS-9021/FPS User Manual. Mini Printer Server w/parallel (USB2.0) Port V LevelOne FPS-9021/FPS-9022 Mini Printer Server w/parallel (USB2.0) Port User Manual V1.0.0-0601 CONTENTS 1. INTRODUCTION...1 1.1 Product Introduction... 2 1.2 Product Package... 3 1.3 Network Printing

More information

Chapter 10 Security Protocols of the Data Link Layer

Chapter 10 Security Protocols of the Data Link Layer Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols

More information

C920WT/ES9420WT. Network Guide

C920WT/ES9420WT. Network Guide C920WT/ES9420WT Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the

More information

IP Technology. IP Technology. IP Datagram Service. Agenda

IP Technology. IP Technology. IP Datagram Service. Agenda IP Technology IP Technology Introduction, IP Protocol Details IP Addressing and IP Forwarding ARP, ICMP, PPP, HSRP, VRRP packet switching technology packet switch is called router or gateway (IETF terminology)

More information

Network Administration

Network Administration 16-Bit Core - Loading... 3:28 32-Bit Core - Loading... 3:27 802.3... 1:36 802.4... 1:36 802.5... 1:36 A Account Database Synchronization... 11:29 Account Policy... 7:20 Account Policy - Managing... 7:22

More information

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016 POINT TO POINT DATALINK PROTOCOLS ETI 2506 Telecommunication Systems Monday, 7 November 2016 TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember PPP Frame

More information

CCNA 4 - Final Exam (A)

CCNA 4 - Final Exam (A) CCNA 4 - Final Exam (A) 1. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare

More information

Networking midterm. 5. As a data unit moves up from one protocol layer to another, control headers are:

Networking midterm. 5. As a data unit moves up from one protocol layer to another, control headers are: Networking midterm 1. A protocol is a set of conventionally agreed rules that specify how data is to be exchanged between pairs of programs or devices. 2. The primary function of the Internet Protocol

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

ES6410 / ES7411. Network Guide

ES6410 / ES7411. Network Guide ES6410 / ES7411 Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

Network Setup 2.0

Network Setup 2.0 Network Setup 2.0 4343-7709-01 Foreword Welcome Thank you for using Network Setup. Network Setup is utility software which allows simple network setup of devices such as printers. It allows setup of devices

More information

Connections, addressing and common configuration rules.

Connections, addressing and common configuration rules. Lab #1 r9-1 s2 e1 3/11 VLAN_21 BGP AS 100 s1 3/1 e0 s0 e0 3/2 s1 VLAN_22 BGP AS 200 r1 r2 Ring 4 r4 s0/1 r3 to0/0 s0/0 s0 s1 OSPF Area 33 to0 e0/0 e0 OSPF Area 4 3/4 b0/0 3/3 VLAN_14 VLAN_13 403 304 c15

More information

Lecture 1.1: Point to Point Protocol (PPP) An introduction

Lecture 1.1: Point to Point Protocol (PPP) An introduction Lecture 1.1: Point to Point Protocol (PPP) An introduction "the watchword for a point-to-point protocol should be simplicity" (RFC 1547, PPP requirements). disattended by 50+ RFCs Recommended reading:

More information

Technical MCSE. Content:

Technical MCSE.   Content: www.whanet.co.uk Technical MCSE Content: Foreword...1 Module Outline...2 Exchange Server 4.0 Series...2 Exchange Server 5.0 Series (Exam 70-076)...3 Exchange Server 5.5 Series...5 IIS 4 Series...7 Networking

More information

Lecture (03) Internet Protocol tcp/ip> OSI>

Lecture (03) Internet Protocol tcp/ip> OSI> Lecture (03) Internet Protocol Dr. Ahmed M. ElShafee ١ Agenda Introduction Network Layer Interaction with the Data Link Layer Network Layer (Layer 3) Addressing

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...

TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS... S n i f f e m 1. 0 1 Whiitepaper TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...2 Hardware...2 Software...2

More information

01/17/08 TDC /17/08 TDC363-03

01/17/08 TDC /17/08 TDC363-03 Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

This document is a tutorial related to the Router Emulator which is available at:

This document is a tutorial related to the Router Emulator which is available at: Introduction This document is a tutorial related to the Router Emulator which is available at: http://www.dcs.napier.ac.uk/~bill/router.html A demo is also available at: http://www.dcs.napier.ac.uk/~bill/router_demo.htm

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

Added Features. 1. PPTP (Point-to-Point Tunneling Protocol)

Added Features. 1. PPTP (Point-to-Point Tunneling Protocol) Added Features 1. PPTP (Point-to-Point Tunneling Protocol) APOS PPTP (Point-to-Point Tunneling Protocol) conforms to the RFC2637 standard. If you can access the PPTP server through the LAN interface, you

More information

Network Quick Install Cards Overview

Network Quick Install Cards Overview Network Quick Install Cards Overview Page 1 1. Configure the Document Centre for Token Ring or Dynamic TCP/IP addressing (If applicable) For 100MBps Ethernet or Token Ring Networks Dynamic TCP/IP addressing

More information

DocuPrint C55/C55mp Quick Network Install Guide

DocuPrint C55/C55mp Quick Network Install Guide DocuPrint C55/C55mp Quick Network Install Guide Windows for Workgroups / Windows 95 Peer-to-Peer Network Windows NT 3.5X Network Windows NT 4.X Network Macintosh EtherTalk/TokenTalk Network Novell NetWare

More information

Configuring Commonly Used IP ACLs

Configuring Commonly Used IP ACLs Configuring Commonly Used IP ACLs Document ID: 26448 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Examples Allow a Select Host to Access the Network Deny a

More information

Chapter 5 TCP/IP SUITE

Chapter 5 TCP/IP SUITE Chapter 5 TCP/IP SUITE Objectives:- TCP/ IP Model Concept. Defining/functioning of different Layers of TCP / IP suite. 5.1 Introduction Addressing mechanism in the Internet An IP address is an address

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

KYOCERA COMMAND CENTER. Operation Guide

KYOCERA COMMAND CENTER. Operation Guide KYOCERA COMMAND CENTER Operation Guide Legal and General Information Notice Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for

More information

Network Guide. IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG

Network Guide. IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG Network Guide IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG Network Guide How This Manual Is Organized Chapter 1 Before You Start Chapter 2

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

Novell. NetWare 6. FILTER CONFIGURATION

Novell. NetWare 6.   FILTER CONFIGURATION Novell NetWare 6 www.novell.com FILTER CONFIGURATION Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims

More information

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I By: Dr. Ahmed ElShafee ١ Agenda OSI Layer 2 of WANs Internetwork layer Introduction Network Layer Interaction with the

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information