62
CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Embed Size (px)

DESCRIPTION

Textbook Required Textbook: Comer, Douglas E., Computer Networks and Internets, 6 th Edition, Prentice Hall, ISBN-10: (ISBN-13: )

Citation preview

Page 1: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

CSCI 6345

Computer NetworksDr. John P. Abraham, Professor

Page 2: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

My Teaching Assistant

Mr. Long Lu [email protected]

Page 3: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Textbook

Required Textbook: Comer, Douglas E., Computer Networks and Internets, 6th Edition, Prentice Hall, 2015.

ISBN-10: 0133587932 (ISBN-13: 978-0133587937)

Page 4: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Website used

All assignments and study questions will be posted at

http://faculty.utpa.edu/jabraham/schcurrent.htm

My TA may choose to use Blackboard

Page 5: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Multiple choice questions

Many of the multiple choice questions will be taken from

Behrouz A. Forouzan, TCP/IP Protocol Suite, 4th Ed., McGraw Hill, 2010. ISBN 978-0-07-337604-2

I will post the multiple choice questions.

Page 6: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Attendance Attendance and class participation is required to

pass the course. If you must miss an exam, make prior arrangements. No make-up exams will be given unless you contact me in advance!

Late homework will be levied heavy penalties. Penalty: One day late 10%, 1 week late 20%, 2 weeks late 50%. Not accepted afterwards.

Page 7: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Grading

Midterm and Final Exams 60% Group Project 15%Labs, programming & student Ass 25%

Page 8: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Practical portion (lab) Virtual Machine Peer to Peer RDP Domain Netadmin Join the domain Create Security groups Grant local Admin rights Packet analyzer WSUS Backup Catchup

Page 9: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Group Project

Individually each person should complete the task assigned. We do not have enough time to present for such a large class. Therefore, you will be placed in a group for presentation purposes.

Meet as a group to discuss what each person will present.

Page 10: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Group Project 1

Internetworking with Linux and Windows Install Linux and Windows Server in two

different computers. Authentication should be through the use of Windows Active Directory. Share files between the two. Samba provides integration between Windows and Linux.

Page 11: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Group Project 2

Router setup using CISCO IOS and creating Virtual Local Area Networks.

Set up a CISCO router using IOS. There are home-Cisco router that do not come with IOS; please do not use those. Make sure you can browse the internet and share files.

Page 12: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Group Project 3

Cyber Security and Forensics Using Backtrack show how forensic analysis

is conducted. Using readily available programs in the internet show how a malware can be planted and show how an attacker then can take control of the system

Page 13: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Group Project 4 Microsoft System monitoring and management Demonstrate Task Manager and show what you can do with each of

the tabs (Applications, Processes, Services, Performance, Networking and Users)

Demonstrate the use of Regedit and show how you can search and delete items that cause problems.

Demonstrate the use of MSconfig and show you can modify each of those.

Demonstrate the use of computer management and explain the use of System tools (task scheduler, event viewer – please spend considerable time here, local users and groups and device manager), disk management and services and application management. There may be some overlap with item #1 here.

Page 14: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Group Project 5 WINDOWS SERVER GROUP POLICY Demonstrate how to administer group

policies. Group policy administrative tools include Group Policy Editor for Active Directory and Sysvol, server side snap-ins, Group Policy Management Console, Resultant Set of Policy. Explain these and show examples of using each. Write some group policies for internet search sites, new program installation, etc. and demo them.

Page 15: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Group Project 6

VPN Communication Servers Check the syllabus for more information

Page 16: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Programming portion

Please refer to syllabus

Page 17: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Dr. John P. Abraham

Introduction to Computer Networks

INTRODUCTION TO COMPUTER NETWORKS

Page 18: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

What is covered in the course Lecture Portion

Network Applications & Network programming Data communications (low level details) Packet switching and network technologies Internetworking with TCP/IP Other concepts such as interoperability standards,

protocol suites and layering models Practical portion

Virtual Machine networking

Page 19: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Lecture material

Your textbook is a very basic book Since network is constantly evolving I will

provide lots of notes from outside the textbook. You should take good notes. Exam questions will come from both. I will point you to a set of multiple choice questions and answers. I will take majority of questions from that site.

Page 20: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Socket programming

All underlying network applications such as email, ftp, web, etc. use underlying technologies and programs

The goal of this course is not to teach you programming. Students should write three socket programs in a language of their choice

Page 21: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Data Communication

Technologies used to send data across communication lines Modulation Digital to analog Light Multiplexing Encryption

Page 22: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Packet Switching and networking technologies Evolved from telegraph and telephone

technologies Mechanical connections are replaced with

electronic switches Packet switching – eliminated the need for a

dedicated circuit Devices through out the network should have

information about how to reach the target destination Takes into account speed, cost, distance and size of

packets

Page 23: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Internetworking with TCP/IP

Tolerance of heterogeneity of underlying technologies.

The internet is formed by interconncecting multiple packet-switching networks, as well as public and private networks.

Page 24: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Computer Networks Computer network

connects two or more autonomous computers.

The computers can be geographically located anywhere.

Introduction to Computer Networks

Page 25: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

LAN, MAN & WAN

Introduction to Computer Networks

Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network)

Network in a City is call MAN (Metropolitan Area Network)

Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)

Page 26: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Computer network architectures the client server

all communication happens between the server and the client only. A client does not communicate directly with another client.

If a client wishes to share a file with another client, it must place the file in a commonly shared area at the server.

In case of an application, the client makes the request and the server processes the request and returns the result to the client.

the peer-to-peer any node can act as a server as well as a client. Only very limited security is available on a peer-to-peer network.

Page 27: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Components used in a Computer Network

Computers Communication ports Cables Hubs or switches Routers The network software.

Page 28: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Computers in a Client/Server architecture

Must be be robust must be able to run for months or years without being shut down.

Must be fast enough to handle many requests from all the requests from the clients.

Must have large fast hard drives to store information for all users. Must have enough memory to cache all the directory information as well as

most used pages. The computers must be reliable in case of power failures and hardware

failures: sufficient redundancy must exist.

Page 29: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Example of Types of Servers

Fileserver print server database server domain name server communication server DHCP server Name Server

Page 30: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Communication ports Network may be done through any

communication ports such as serial, parallel, network cards, etc.

Most common Network Cards used today are Ethernet and Token Ring.

Page 31: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network Interface Card

Plug and play (PNP). Open the computer, install the card, and insert the driver disk.

Legacy cards: the interrupt request line (IRQ), base memory address, and the

base I/O port must be manually set up on the card by setting the jumpers or DIP switches, or through the use of the manufacturer provided setup software.

Speed: 10 Megabits per second (Mbps), 100 Mbps (Fast Ethernet) or 1000 Mbps (Gigabit Ethernet) depending on the card.

Page 32: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Connectors on NIC

The connector on most Ethernet cards today is the RJ-45 having 8 pins.

Older Ethernet cards may have a Bayonet Nut Connector (BNC), an Attachment Unit Interface (AUI), and/or a RJ-45 connector. A jumper or switch will specify the type of connector used.

Page 33: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network Addresses

Every computer connected to a network should have two unique identifying numbers, a physical address and an Internet Protocol (IP) address. The physical address

a 6 Byte number, is encoded on a ROM chip on the Ethernet card at the time of manufacturing

the IP address A 4 byte address is used to send messages to the outside world. The physical

address. configured on each machine.

Page 34: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Hub/Switch

A Hub or switch connects cables from different nodes together. When purchasing them the number of ports required and the speed of transmission must be specified.

An active hub amplifies all signals received and sends the amplified signals on all its ports.

Passive hubs are signal splitters and are used only in wiring panels. Even though a little more expensive, a switch will provide faster

communication and great deal of diagnostic features. Switches provide link management through physical address identification.

Page 35: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Hubs/Switches

As the network grows, multiple switches or hubs can be connected with each other using an uplink port or a direct connect cable.

Most modern switches have the auto-sensing feature, which will allow any port to work as an uplink.

The best location for a switch or hub is a centrally located closet to which cables from all computers are brought.

Page 36: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network Cabling

Cabling is the most time consuming part of networking, particularly when cables need to be hidden inside the walls.

For that reason it is advisable to have the cables installed or conduits placed at the time of the building construction.

To hide wires inside existing buildings, a tape fish will be needed. It may be well worth the time to investigate the wireless technology,

particularly when a small area is being networked.

Page 37: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network cabling 2

Three types of cables are used today: coaxial, twisted pair, and fiber-optic. Twisted pair cables either can be unshielded or shielded with a foil. Unshielded twisted pair (UTP) cable can transmit 10 Megabits per second and

the shielded can transmit more than 100 Mbps, perhaps all the way up to 1000 Mbps.

Wires in each pair are twisted to reduce cross-talk and minimize the effect of external electromagnetic interference.

Twisted pair cables are categorized into five categories, from Cat 1 to Cat 5, based on the bandwidth capabilities.

The maximum length of a segment is 100 meters.

Page 38: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network Cabling 3

The UTP cable has 4 pairs of color-coded (orange, green, blue and brown) wires.

The color of one of the wires in a pair will be solid and the other will be striped with white.

Pins in the RJ-45 jack are numbered from 1 to 8. When two computers are connected directly without the use of a hub or

a switch some wires need to be crossed (Transmit to Receive). Such a cable is called a crossover cable. Crossover cables need to be used when two hubs or switches that lack uplink ports are connected together.

Page 39: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

T-568A Straight-Through Ethernet Cable

Page 40: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

T-568B Straight-Through Ethernet Cable

Page 41: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

RJ-45 Crossover Ethernet Cable

Page 42: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Crossover cable

Page 43: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network Protocols

7 layer OSI model 5 layer TCP/IP suite There exists three TCP/IP network environment today, Novell Networking,

Microsoft Windows Networking, and the UNIX/LINUX networking.

Page 44: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network Operating Systems The Novell Networking incorporates its original IPX/SPX protocol suite as

well as the TCP/IP protocol suite. Windows and Unix operating systems include TCP/IP networking as part of

their operating system. All versions of Windows provide the peer-to-peer networking capabilities,

while the NT, 2000 professional, and the XP professional provide for Client/Server architecture.

The UNIX/LINUX has consistently adhered to the Client/Server architecture.

Page 45: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Windows peer-to-peer networking

may use the TCP/IP protocol suite or some other simpler protocols such as the NetBIOS and the NetBEUI.

The NetBIOS, an application program interface (API) extends the BIOS to include the support for I/O calls over a network.

The NetBIOS Extnded User Interface (NetBEUI), developed by IBM and Microsoft, is the protocol used by Windows Workgroup networking.

Page 46: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Windows peer-to-peer networking

NetBios is non-routable, therefore could not reach beyond the local physical network.

It does not require an IP address, rather works with the name registration within a workgroup.

In the newer Windows operating systems, the NetBEUI is encapsulated inside the TCP/IP, referred to as NetBIOS over TCP/IP (NBT), and uses the IP address.

Page 47: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Configuring the windows network

From the control panel’s, local area network, add a NIC if it does not show up already. Insert the appropriate driver software.

Next Choose the protocols to be bound to the network card, NetBios, TCP/IP, IPX/SPX, Appletalk, etc.

Set up the properties for the protocol you chose. For example, for the TCP/IP, you will asked to either obtain the addresses automatically or type in the IP Address, mask, default gateway, and DNS. The default gateway is the address of the host through which internetworks can be reached (a router or a computer that shares Internet). DNS is the server that provides the IP address given a domain name.

Install the client services and give your computer a name and a group. Finally, you may want to share your resources.

Page 48: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Applications of Networks

Introduction to Computer Networks

Resource SharingHardware (computing resources, disks, printers)Software (application software)

Information SharingEasy accessibility from anywhere (files, databases)Search Capability (WWW)

CommunicationEmailMessage broadcast

See next slide

Page 49: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Application of network 2

Remote computingVirtualization (see future slides)

Supercomputing - used for highly calculation-intensive tasks in quantum physics, genetics, weather modeling, etc.Distributed processing – A program running on top of a network that distributes the job. GRID Computing – very similar to distributed. A middleware is used to manage all the computers in the system (see next slide).Cloud computing (see future slide)

Page 50: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Grid computing

Multiple independent computing clusters which act like a “grid” because they are composed of resource nodes not located within a single administrative domain.

Offering online computation or storage (like electricity sale).

The creation of a “virtual supercomputer” by using spare computing resources within an organization

Page 51: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Virtualizationthe act of decoupling one computing resource from others without impacting the usability across these resources.

User state virtualization

Application virtualization.

Client-Hosted Desktop virtualization

Server-based Desktop virtualization

Application Virtualization

Page 52: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

User state virtualization.

separates the user data and settings from any PC and enables IT to store them centrally (i.e., in the datacenter) while also making them accessible on any PC. It also simplifies the central backup of user data since data is already stored centrally on servers.

http://technet.microsoft.com/en-us/windows/ff629664

Page 53: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Application virtualization

Only need to install once. Can run it from any machine. Isolates applications from each other and solves application to application compatibility issues by allowing applications to run together even though they may require the same resources from the OS

Application virtualization allows IT to store the application centrally and stream the application to a desktop based on user access.

http://www.youtube.com/watch?v=kSa9VBYyyk4 http://www.installfree.com/beta-signup

Page 54: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Client-Hosted Desktop Virtualization. technology (such as Microsoft® Virtual PC or

Sun xVM Virtual Box ) that separatesthe operating system from the physical hardware and allows a single PC to run virtual machines side by side with the host OS.

http://www.microsoft.com/virtualization/assets/media/chv/local/index.htm

http://www.youtube.com/watch?v=0Y2eClEy7jU

Page 55: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Server-Based Desktop Virtualization: Allows the execution of an environment at one place and

presentation of that environment or user interface at a different location. These technologies usually use remote desktop protocols, such as RDP, to decouple the user interface location from the execution environment location. Remote execution enables organizations to use older PCs as “thin clients,” giving users the benefit of newer applications and versions of Windows while helping save the environment by avoiding the dumping of electronics into landfills.

http://www.cio.com/article/504348/Desktop_Virtualization_5_Most_Popular_Flavors_Explained

Page 56: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Cloud Computing is location independent computing shared servers provide resources, software, and data to

computers. computing is moved away from personal computers or an

individual application server to a “cloud” of computers. Users of the cloud only need to be concerned with the computing

service being asked for, as the underlying details of how it is achieved are hidden. This method of distributed computing is done through pooling all computer resources together and being managed by software rather than a human.

http://www.microsoft.com/en-us/server-cloud/new.aspx

Page 57: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Network TopologyThe network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions.

Introduction to Computer Networks

Page 58: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Bus TopologyCommonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.

Introduction to Computer Networks

Page 59: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Star & Tree Topology

Introduction to Computer Networks

The star topology is the most commonly used architecture in Ethernet LANs. When installed, the star topology resembles spokes in a bicycle wheel.Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host.

Page 60: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Ring Topology

Introduction to Computer Networks

A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. The frame then continues around the ring until it finds the destination node, which takes the data out of the frame.

Single ring – All the devices on the network share a single cable

Dual ring – The dual ring topology allows data to be sent in both directions.

Page 61: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

Mesh TopologyThe mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult.

Introduction to Computer Networks

Page 62: CSCI 6345 Computer Networks Dr. John P. Abraham, Professor

ApplicationsE-mailSearchable Data (Web Sites)E-CommerceNews GroupsInternet Telephony (VoIP)Video ConferencingChat GroupsInstant Messengers Internet Radio

Introduction to Computer Networks