NAD710 - Introduction to Networks Using Linux   Course Overview May 28, 2003 Professor Tom Mavroidis
Course Text TCP/IP Network Administration, 3rd Edition  By  Craig Hunt Third Edition April 2002  0-596-00297-1,  Order Number: 2971 746 pages,  $69.95 CA
Introduction Never has there been such dramatic changes to the business world as we have seen in the 1990’s with e-business and the Internet.
Architecture of the Internet Overview of the Internet. Slide from : Computer Networks, Fourth Edition  Andrew S. Tanenbaum
Ethernet Architecture of the original Ethernet. Slide from : Computer Networks, Fourth Edition  Andrew S. Tanenbaum
Search Engines The role played by Internet has forced companies to get connected to stay relevant so they may compete in today's fast moving markets.
Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues Slide from : Computer Networks, Fourth Edition  Andrew S. Tanenbaum
How was the Internet Built?   In the 60’s and 70’s there were many different networks, protocols and implementations.  Sharing of information among these dissimilar networks soon became a problem. A common protocol needed to be developed.
Historical Maps of ARPANET   Paul Baran in the 1960s envisioned a communications network that would survive a major enemy attacked. The sketch shows three different network topologies described in his RAND Memorandum, "On Distributed Communications: 1. Introduction to Distributed Communications Network" (August 1964). The distributed network structured offered the best survivability.
A rough sketch map of the possible topology of ARPANET by Larry Roberts Dr. Lawrence Roberts led the team that designed and developed ARPANET, the world's first major computer packet network. Dr. Roberts, as ARPA's chief scientist, began to architect ARPANET   in   1967 influenced by the theoretical packet switching work by Leonard Kleinrock. This research network evolved into the modern Internet.
DARPA The Defense Advanced Research Projects Agency funded the exploration of this common protocol. The TCP/IP protocol suite evolved from the ARPANET protocol suite where the fundamental concept of layering was introduced.
Backbone Protocol TCP/IP became the backbone protocol of multivendor networks such as ARPANET, NFSNET and other regional networks.
TCP/IP’s Objective On the battlefield a communications network that sustains damage should  be robust enough to automatically recover from any node or phone line failure
A Suite is Born The protocol suite became popular when it was integrated into the University of California at Berkeley’s UNIX operating system.                                                                                                                                                                      
TCP/IP-  Goodbye proprietary networks TCP/IP provides the ability to merge different physical networks using a common suite of functions and interoperability between equipment.
TCP/IP Layer Model When networks first came into being, computer could typically communicate only with computers from the same manufacturer. In the late 1970s, the OSI (Open System Interconnection) model was created by the International Organization for Standardization to break this barrier. The OSI model was meant to help the vendors to create the standard network devices. The OSI model is the Primary architectural model for networks. It describes how data and network information are communicated from application on one computer, through the network media, to an application on another computer. The OSI reference model breaks this approach into Layers. TCP/IP Layer Model 7 layer OSI model 4 layer DOD model Microsoft’s model
TCP/IP -  The need for standards Gain an understanding of: the OSI and DOD Layer models the 802.x standards Why standards play such an important role in the growth of the Internet
RFC’s What are they? The Requests for Comments (RFC) document series is a set of technical and organizational notes about the Internet (orginally the ARPANET), beginning in 1969. Memos in the RFC series discuss many aspects of computer networking, including protocols, procedures, programs, and concepts, as well as meeting notes, opinions, and sometimes humor
Planning for growth Selecting the right class for your network What is CIDR routing Planning for IPV6  Use private addresses to protect your network
Subject Goals Gain an understanding of how Linux fits into today’s networked world Discuss the strengths and weaknesses of Linux  Learn when a Linux solution is right  Install and administer the latest in Linux applications for resource sharing
Governing  Agencies ICANN  The Internet Corporation for Assigned Names and Numbers IANA  Internet Assigned Numbers authority IEEE  The Institute of Electrical and Electronics Engineers
IEEE   802 Specification The IEEE  is a non-profit, technical professional association of more than 377,000 individual members in 150 countries who produces 30 percent of the world's published literature in electrical engineering, computers and control technology.  They have defined the following specification 802.1 Internetworking 802.2 Logical Link Control 802.3 Ethernet CSMA/CD **** 802.4 Token bus 802.5 Token ring **** 802.6 MAN 802.7 Broadband 802.8 Fiber optic 802.9 Integrated Voice/Data 802.10 Security 802.11 Wireless 802.12 Demand Priority Access
Gain an understanding of : Network Interfaces IP Addresses Address Resolution IP Routing ICMP Resolving Host Names
You will learn the differences between: Mac address IP address Subnet masks Private Addresses  Public Addresses Unless you already know the difference in which case you will review it
Learn Common Linux Network Commands ifconfig  netstat  ping  traceroute  nslookup  route dig
Configuring Network Hardware  Kernel Configuration Linux network devices Setup Ethernet Install loadable kernel modules
Configuring TCP/IP Networking  Setting the Hostname Assigning IP addresses statically Automatically receiving an address (DHCP) Subnet masks - what are they and what do they do? Dividing networks using Subnets
ARP and RARP The address resolution protocol How does a machine communicate within the subnet? When do we need to route using a Layer 3 Protocol?
DNS  Setting up name services (BINDx) How does it resolve names to addresses and vice-versa You will setup your machine with the name service running
Setting up a DNS Nameserver   When you need a nameserver Why you may prefer to use your ISP’s DNS Configuration files /etc/hosts /etc/resolv.conf
NFS  Network File System   Preparing NFS Mounting an NFS volume The NFS daemons The exports file  nfsd and mountd  exports file User vs. Kernel NFS
Connecting Windows to Linux   Samba is an  Open Source / Free Software  suite that provides seamless file and print services to SMB/CIFS clients We will discuss and install samba on our machines
Bridges, Routers and Switches Which device should be used to address a specific design goal? What the differences are with each of these devices? Why the layered model approach helps speed up the process required to bring products to market.
Routing and Switching How does it differ? What devices do we use to accomplish the task.
Routing Protocols How information is passed between routers How they can protect networks or if incorrectly installed expose them Discuss RIP (routing information protocol) and OSPF (open shortest path first)
Bridging Protocols Operates at Layer 2 of the OSI model Smart bridges, allow some form of intelligence at Layer 3 Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network.
Network monitoring and Discovery tools Ethereal - view the packets in real time Nmap - port scanner Npulse - front end for nmap You will install and run these applications on your machines
Installing Networking Hardware The Physical Install, PCI, ISA, USB Drivers Kernel Modules How is it probed?
Configuring a TCP/IP Network   Assigning IP addresses static (when is it necessary) dhcp (when is it perferable) Connecting the machines  Network configuration  Testing/Debugging the network
Wireless LANs - The Future of Networking (a) Wireless networking with a base station. (b) Ad hoc networking. Slide from : Computer Networks, Fourth Edition  Andrew S. Tanenbaum
Marking Midterm Test 30% Term Assignments/Labs 30% Final Exam 40%

Nad710 Introduction To Networks Using Linux

  • 1.
    NAD710 - Introductionto Networks Using Linux   Course Overview May 28, 2003 Professor Tom Mavroidis
  • 2.
    Course Text TCP/IPNetwork Administration, 3rd Edition By Craig Hunt Third Edition April 2002 0-596-00297-1, Order Number: 2971 746 pages, $69.95 CA
  • 3.
    Introduction Never hasthere been such dramatic changes to the business world as we have seen in the 1990’s with e-business and the Internet.
  • 4.
    Architecture of theInternet Overview of the Internet. Slide from : Computer Networks, Fourth Edition Andrew S. Tanenbaum
  • 5.
    Ethernet Architecture ofthe original Ethernet. Slide from : Computer Networks, Fourth Edition Andrew S. Tanenbaum
  • 6.
    Search Engines Therole played by Internet has forced companies to get connected to stay relevant so they may compete in today's fast moving markets.
  • 7.
    Uses of ComputerNetworks Business Applications Home Applications Mobile Users Social Issues Slide from : Computer Networks, Fourth Edition Andrew S. Tanenbaum
  • 8.
    How was theInternet Built? In the 60’s and 70’s there were many different networks, protocols and implementations. Sharing of information among these dissimilar networks soon became a problem. A common protocol needed to be developed.
  • 9.
    Historical Maps ofARPANET Paul Baran in the 1960s envisioned a communications network that would survive a major enemy attacked. The sketch shows three different network topologies described in his RAND Memorandum, "On Distributed Communications: 1. Introduction to Distributed Communications Network" (August 1964). The distributed network structured offered the best survivability.
  • 10.
    A rough sketchmap of the possible topology of ARPANET by Larry Roberts Dr. Lawrence Roberts led the team that designed and developed ARPANET, the world's first major computer packet network. Dr. Roberts, as ARPA's chief scientist, began to architect ARPANET in 1967 influenced by the theoretical packet switching work by Leonard Kleinrock. This research network evolved into the modern Internet.
  • 11.
    DARPA The DefenseAdvanced Research Projects Agency funded the exploration of this common protocol. The TCP/IP protocol suite evolved from the ARPANET protocol suite where the fundamental concept of layering was introduced.
  • 12.
    Backbone Protocol TCP/IPbecame the backbone protocol of multivendor networks such as ARPANET, NFSNET and other regional networks.
  • 13.
    TCP/IP’s Objective Onthe battlefield a communications network that sustains damage should be robust enough to automatically recover from any node or phone line failure
  • 14.
    A Suite isBorn The protocol suite became popular when it was integrated into the University of California at Berkeley’s UNIX operating system.                                                                                                                                                                      
  • 15.
    TCP/IP- Goodbyeproprietary networks TCP/IP provides the ability to merge different physical networks using a common suite of functions and interoperability between equipment.
  • 16.
    TCP/IP Layer ModelWhen networks first came into being, computer could typically communicate only with computers from the same manufacturer. In the late 1970s, the OSI (Open System Interconnection) model was created by the International Organization for Standardization to break this barrier. The OSI model was meant to help the vendors to create the standard network devices. The OSI model is the Primary architectural model for networks. It describes how data and network information are communicated from application on one computer, through the network media, to an application on another computer. The OSI reference model breaks this approach into Layers. TCP/IP Layer Model 7 layer OSI model 4 layer DOD model Microsoft’s model
  • 17.
    TCP/IP - The need for standards Gain an understanding of: the OSI and DOD Layer models the 802.x standards Why standards play such an important role in the growth of the Internet
  • 18.
    RFC’s What arethey? The Requests for Comments (RFC) document series is a set of technical and organizational notes about the Internet (orginally the ARPANET), beginning in 1969. Memos in the RFC series discuss many aspects of computer networking, including protocols, procedures, programs, and concepts, as well as meeting notes, opinions, and sometimes humor
  • 19.
    Planning for growthSelecting the right class for your network What is CIDR routing Planning for IPV6 Use private addresses to protect your network
  • 20.
    Subject Goals Gainan understanding of how Linux fits into today’s networked world Discuss the strengths and weaknesses of Linux Learn when a Linux solution is right Install and administer the latest in Linux applications for resource sharing
  • 21.
    Governing AgenciesICANN The Internet Corporation for Assigned Names and Numbers IANA Internet Assigned Numbers authority IEEE The Institute of Electrical and Electronics Engineers
  • 22.
    IEEE 802 Specification The IEEE is a non-profit, technical professional association of more than 377,000 individual members in 150 countries who produces 30 percent of the world's published literature in electrical engineering, computers and control technology. They have defined the following specification 802.1 Internetworking 802.2 Logical Link Control 802.3 Ethernet CSMA/CD **** 802.4 Token bus 802.5 Token ring **** 802.6 MAN 802.7 Broadband 802.8 Fiber optic 802.9 Integrated Voice/Data 802.10 Security 802.11 Wireless 802.12 Demand Priority Access
  • 23.
    Gain an understandingof : Network Interfaces IP Addresses Address Resolution IP Routing ICMP Resolving Host Names
  • 24.
    You will learnthe differences between: Mac address IP address Subnet masks Private Addresses Public Addresses Unless you already know the difference in which case you will review it
  • 25.
    Learn Common LinuxNetwork Commands ifconfig netstat ping traceroute nslookup route dig
  • 26.
    Configuring Network Hardware Kernel Configuration Linux network devices Setup Ethernet Install loadable kernel modules
  • 27.
    Configuring TCP/IP Networking Setting the Hostname Assigning IP addresses statically Automatically receiving an address (DHCP) Subnet masks - what are they and what do they do? Dividing networks using Subnets
  • 28.
    ARP and RARPThe address resolution protocol How does a machine communicate within the subnet? When do we need to route using a Layer 3 Protocol?
  • 29.
    DNS Settingup name services (BINDx) How does it resolve names to addresses and vice-versa You will setup your machine with the name service running
  • 30.
    Setting up aDNS Nameserver When you need a nameserver Why you may prefer to use your ISP’s DNS Configuration files /etc/hosts /etc/resolv.conf
  • 31.
    NFS NetworkFile System Preparing NFS Mounting an NFS volume The NFS daemons The exports file nfsd and mountd exports file User vs. Kernel NFS
  • 32.
    Connecting Windows toLinux Samba is an Open Source / Free Software suite that provides seamless file and print services to SMB/CIFS clients We will discuss and install samba on our machines
  • 33.
    Bridges, Routers andSwitches Which device should be used to address a specific design goal? What the differences are with each of these devices? Why the layered model approach helps speed up the process required to bring products to market.
  • 34.
    Routing and SwitchingHow does it differ? What devices do we use to accomplish the task.
  • 35.
    Routing Protocols Howinformation is passed between routers How they can protect networks or if incorrectly installed expose them Discuss RIP (routing information protocol) and OSPF (open shortest path first)
  • 36.
    Bridging Protocols Operatesat Layer 2 of the OSI model Smart bridges, allow some form of intelligence at Layer 3 Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network.
  • 37.
    Network monitoring andDiscovery tools Ethereal - view the packets in real time Nmap - port scanner Npulse - front end for nmap You will install and run these applications on your machines
  • 38.
    Installing Networking HardwareThe Physical Install, PCI, ISA, USB Drivers Kernel Modules How is it probed?
  • 39.
    Configuring a TCP/IPNetwork Assigning IP addresses static (when is it necessary) dhcp (when is it perferable) Connecting the machines Network configuration Testing/Debugging the network
  • 40.
    Wireless LANs -The Future of Networking (a) Wireless networking with a base station. (b) Ad hoc networking. Slide from : Computer Networks, Fourth Edition Andrew S. Tanenbaum
  • 41.
    Marking Midterm Test30% Term Assignments/Labs 30% Final Exam 40%