SlideShare a Scribd company logo
Chapter 8
Simple Network Operations

Networking Concepts – Eric Vanderburg ©2005
NOS
 DOS,

Windows 3x – LAN Manager
 OS Features
Bridges Hardware & Software (another layer to
minimize complexity)
 Memory management
 Multitasking – many processes at the same time


Preemptive – OS controls process access to CPU (uses
time slices) Win95 & higher
 Cooperative – OS cannot stop processes once they start
using the CPU


Networking Concepts – Eric
Vanderburg ©2005
NOS Functions
 Share

computer resources & peripherals
 Control remote machines
 Implement security for resources
 Authentication
 Permissions
 Rights

 Maintain

directory of resources
 Provide network services to applications
Networking Concepts – Eric
Vanderburg ©2005
Components
 Naming


Services

UNC (Universal Naming Convention)
ComputerNameShareName
 UNC Aware – allows R or W to network storage via UNC
path (non-UNC aware require mapped drives)


DNS
 NetBIOS


Only 8 character name allowed in DOS (8.3 rule)
 Certain illegal characters
 Hidden names (ComputerNameSecretShare$)


Networking Concepts – Eric
Vanderburg ©2005
Directory Services





Search for the resource you need
Restricts views based on ACL
Microsoft AD (Active Directory)
Novell eDirectory or NDS









NAL (NetWare Application Launcher) – does a network
inventory and stores it in eDirectory
Formerly used a flat file database called the Bindery (NW3x)
NW4x systems can run Bindery emulation to work with 3x

Linux NIS (Network Information System)
Sun Directory Server
X.500
LDAP (Lightweight Directory Access Protocol)
Networking Concepts – Eric
Vanderburg ©2005
Client Software
 Logon
 Requests

resources
 Redirector
 Designator – substitutes UNC name for
a mapped drive letter

Networking Concepts – Eric
Vanderburg ©2005
Access Control
 Who

can access what resources
 What they can do with those resources
 How many can access resources
simultaneously
 When can they access those resources

Networking Concepts – Eric
Vanderburg ©2005
Server Responsibilities
 Manage

users and groups
 Authenticate users
 Advertise resources, resolve names &
maintain a directory
 Management, logging, & auditing
 Provide redundancy

Networking Concepts – Eric
Vanderburg ©2005
Installation
 Before

you begin:

Consider server role
 Determine file system
 Available hardware
 Choose a name & naming conventions
 Understand network size, topology, and network
OS types
 Redundancy options


Clustering
 Mirroring
 Duplexing




Placement within forest & domain
Networking Concepts – Eric
Vanderburg ©2005
Naming Conventions
 Names

should be based on a system
 Users & resources
Eric Vanderburg, username:evanderburg
 Proper hierarchy


 Computer


names & DNS names

First Cleveland Domain Controller, name: CleDC01

 Educate

users to save files with proper file
name structures in the proper folders
 Titles of email messages
Networking Concepts – Eric
Vanderburg ©2005
Storage
 Partition

– logical section of disk space
 Multiple boot – select from many OS’s upon
computer startup
 Single partition, single drive, single OS
 Multiple partitions, single drive, single OS
Separation is good
 One drive so activity is high


 Multiple


partitions, multiple drives, single OS

Distributes drive activity

 Fault

tolerant storage
Networking Concepts – Eric
Vanderburg ©2005
File System









FAT (File Allocation Table)
FAT32
NTFS
CDFS
EFS (Extent File System)
GPFS (General Parallel File System)
Different file systems support different sized disks,
security options, file size, naming, and cluster sizes
Some file systems cannot be used in some OS’s

Networking Concepts – Eric
Vanderburg ©2005
Network Services
 Installing

Services
 Starting & stopping services
 Services in Linux
 Edit

config files
 Install new package
 Package manager may be available

Networking Concepts – Eric
Vanderburg ©2005
Sharing in Linux
 Use

NFS for Linux only share
 Use Samba for Linux to Windows shares

Networking Concepts – Eric
Vanderburg ©2005
Network Applications








Multiple concurrent use
Email
Messaging
Scheduling
Groupware
Databases
Architectures




Centralized – fully stored on server
File-system sharing – client app with shared storage area or
database
True client/server – some components are on the client and
some on the server. Effectively uses client processing
Networking Concepts – Eric
Vanderburg ©2005
Email








X.400
IMAP (Internet Message Access Protocol) –
downloads and displays messages, can be sent to a
client or run from a web based app, fault tolerant with
advanced controls for group collaboration.
MHS (Message Handling System) – Novell’s
messaging service
POP3 (Post Office Protocol version 3) – downloads
messages to the client, messages managed locally
SMTP – standard for sending mail messages
X.500 – improved directory and has a global address
database
Networking Concepts – Eric
Vanderburg ©2005
Messaging










Oscar – AIM protocol, now used for ICQ also, direct
connections do not go through AIM servers
File sharing services often have chat (Napster, Direct
Connect, eDonkey, ect..)
IRC – primarily for group chats, oldest (1989)
Jabber – Uses TCP & XML, email-like names used.
Can use other services also:
username@aim.jabber.org
Novell GroupWise Manager – uses SSL
Lotus Sametime
XMPP (Extensible Messaging & Presence Protocol)
SIMPLE (*SIP for Instant Messaging & Presence
Leveraging Extensions)

Networking
*SIP - Session Initiation Protocol Concepts – Eric
Vanderburg ©2005
Scheduling & Groupware
 Scheduling
 Calendars
 Integrated

into other programs

 Groupware
 Many

users collaborate on a single file
 Novell GroupWise
 Lotus Notes
 Microsoft SharePoint
Networking Concepts – Eric
Vanderburg ©2005

More Related Content

What's hot

Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
Mohit Mehra
 
Wireless
WirelessWireless
Wireless
Sid_007007
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
Jennifer Christy
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
clcewing
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
City Vision University
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
Online
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
Alok Pandey (AP)
 
Networking
NetworkingNetworking
Networking
Saeed Abdillahi
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
Katende Willy
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Abdelkhalik Mosa
 
Wifi
WifiWifi
Wi fi
Wi fiWi fi
Wi fi
kendre1234
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
Chiranjit Adhikary
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
Diljit Singh Khalsa
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
Gourav Kr. Sourav
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Zul Fikri
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
GOPAL BASAK
 
Wi fi
Wi fiWi fi

What's hot (20)

Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
Wireless
WirelessWireless
Wireless
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Networking
NetworkingNetworking
Networking
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Wifi
WifiWifi
Wifi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
 
Wi fi
Wi fiWi fi
Wi fi
 

Viewers also liked

TylerResume.docx (1)
TylerResume.docx (1)TylerResume.docx (1)
TylerResume.docx (1)
Tyler Nickel
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopology
Manoj Kumar
 
Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0
Hossein Zahed
 
network essential ppt
network essential pptnetwork essential ppt
network essential ppt
Vikas Tiwari
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric Vanderburg
Eric Vanderburg
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
Ayush0734
 
Network Essentials
Network EssentialsNetwork Essentials
Network Essentials
Iffu Slides
 
Networking basics Tutorial 1
Networking basics Tutorial 1Networking basics Tutorial 1
Networking basics Tutorial 1
Technocrats E Services
 
Network design - Topology
Network design  - TopologyNetwork design  - Topology
Network design - Topology
Keilandra Scruggs
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
Manoj Kumar
 
Network topology
Network topologyNetwork topology
Network topology
preeti.sharma
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
Kunal Bhansali
 
Networking
NetworkingNetworking
Networking
Sean Chia
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Network Design
Network DesignNetwork Design
Network Design
cornimar
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
Peter R. Egli
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Network design
Network designNetwork design
Network design
Amir Jafari
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Shino Ramanatt
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 

Viewers also liked (20)

TylerResume.docx (1)
TylerResume.docx (1)TylerResume.docx (1)
TylerResume.docx (1)
 
Computer Network - NetworkTopology
Computer Network - NetworkTopologyComputer Network - NetworkTopology
Computer Network - NetworkTopology
 
Network Essentials v2.0
Network Essentials v2.0Network Essentials v2.0
Network Essentials v2.0
 
network essential ppt
network essential pptnetwork essential ppt
network essential ppt
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric Vanderburg
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Network Essentials
Network EssentialsNetwork Essentials
Network Essentials
 
Networking basics Tutorial 1
Networking basics Tutorial 1Networking basics Tutorial 1
Networking basics Tutorial 1
 
Network design - Topology
Network design  - TopologyNetwork design  - Topology
Network design - Topology
 
Computer Network - Telnet and Gopher
Computer Network -  Telnet and GopherComputer Network -  Telnet and Gopher
Computer Network - Telnet and Gopher
 
Network topology
Network topologyNetwork topology
Network topology
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Networking
NetworkingNetworking
Networking
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Network Design
Network DesignNetwork Design
Network Design
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Network design
Network designNetwork design
Network design
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 

Similar to Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg

Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
APSU
 
Unit09
Unit09Unit09
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
saritasingh19866
 
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
MrKarwega
 
Web server administration
Web server administrationWeb server administration
Web server administration
sawsan slii
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Eric Vanderburg
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
CatherineBotardo3
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
Duressa Teshome
 
Nfs
NfsNfs
Nas fundamentals
Nas fundamentalsNas fundamentals
Nas fundamentals
Rajeshbabu88
 
Cl115
Cl115Cl115
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
rahmanitayulia
 
Nas101
Nas101Nas101
Nas101
richswain
 
Operating System and Basic Networks
Operating System and Basic NetworksOperating System and Basic Networks
Operating System and Basic Networks
Jherome Tenorio
 
Ch06
Ch06Ch06
NAS Concepts
NAS ConceptsNAS Concepts
NAS Concepts
Ramkaliyaperumal
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
achutachut
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
nurulaisyah5324
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1
Abu Sayed Adhar
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
Serious_SamSoul
 

Similar to Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg (20)

Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Unit09
Unit09Unit09
Unit09
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
 
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...Web Server Admin Web Server Admin Web Server Admin Web Server Admin  Web Serv...
Web Server Admin Web Server Admin Web Server Admin Web Server Admin Web Serv...
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
 
Windows Network concepts
Windows Network conceptsWindows Network concepts
Windows Network concepts
 
Nfs
NfsNfs
Nfs
 
Nas fundamentals
Nas fundamentalsNas fundamentals
Nas fundamentals
 
Cl115
Cl115Cl115
Cl115
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
 
Nas101
Nas101Nas101
Nas101
 
Operating System and Basic Networks
Operating System and Basic NetworksOperating System and Basic Networks
Operating System and Basic Networks
 
Ch06
Ch06Ch06
Ch06
 
NAS Concepts
NAS ConceptsNAS Concepts
NAS Concepts
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
 
Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg

  • 1. Chapter 8 Simple Network Operations Networking Concepts – Eric Vanderburg ©2005
  • 2. NOS  DOS, Windows 3x – LAN Manager  OS Features Bridges Hardware & Software (another layer to minimize complexity)  Memory management  Multitasking – many processes at the same time  Preemptive – OS controls process access to CPU (uses time slices) Win95 & higher  Cooperative – OS cannot stop processes once they start using the CPU  Networking Concepts – Eric Vanderburg ©2005
  • 3. NOS Functions  Share computer resources & peripherals  Control remote machines  Implement security for resources  Authentication  Permissions  Rights  Maintain directory of resources  Provide network services to applications Networking Concepts – Eric Vanderburg ©2005
  • 4. Components  Naming  Services UNC (Universal Naming Convention) ComputerNameShareName  UNC Aware – allows R or W to network storage via UNC path (non-UNC aware require mapped drives)  DNS  NetBIOS  Only 8 character name allowed in DOS (8.3 rule)  Certain illegal characters  Hidden names (ComputerNameSecretShare$)  Networking Concepts – Eric Vanderburg ©2005
  • 5. Directory Services     Search for the resource you need Restricts views based on ACL Microsoft AD (Active Directory) Novell eDirectory or NDS        NAL (NetWare Application Launcher) – does a network inventory and stores it in eDirectory Formerly used a flat file database called the Bindery (NW3x) NW4x systems can run Bindery emulation to work with 3x Linux NIS (Network Information System) Sun Directory Server X.500 LDAP (Lightweight Directory Access Protocol) Networking Concepts – Eric Vanderburg ©2005
  • 6. Client Software  Logon  Requests resources  Redirector  Designator – substitutes UNC name for a mapped drive letter Networking Concepts – Eric Vanderburg ©2005
  • 7. Access Control  Who can access what resources  What they can do with those resources  How many can access resources simultaneously  When can they access those resources Networking Concepts – Eric Vanderburg ©2005
  • 8. Server Responsibilities  Manage users and groups  Authenticate users  Advertise resources, resolve names & maintain a directory  Management, logging, & auditing  Provide redundancy Networking Concepts – Eric Vanderburg ©2005
  • 9. Installation  Before you begin: Consider server role  Determine file system  Available hardware  Choose a name & naming conventions  Understand network size, topology, and network OS types  Redundancy options  Clustering  Mirroring  Duplexing   Placement within forest & domain Networking Concepts – Eric Vanderburg ©2005
  • 10. Naming Conventions  Names should be based on a system  Users & resources Eric Vanderburg, username:evanderburg  Proper hierarchy   Computer  names & DNS names First Cleveland Domain Controller, name: CleDC01  Educate users to save files with proper file name structures in the proper folders  Titles of email messages Networking Concepts – Eric Vanderburg ©2005
  • 11. Storage  Partition – logical section of disk space  Multiple boot – select from many OS’s upon computer startup  Single partition, single drive, single OS  Multiple partitions, single drive, single OS Separation is good  One drive so activity is high   Multiple  partitions, multiple drives, single OS Distributes drive activity  Fault tolerant storage Networking Concepts – Eric Vanderburg ©2005
  • 12. File System         FAT (File Allocation Table) FAT32 NTFS CDFS EFS (Extent File System) GPFS (General Parallel File System) Different file systems support different sized disks, security options, file size, naming, and cluster sizes Some file systems cannot be used in some OS’s Networking Concepts – Eric Vanderburg ©2005
  • 13. Network Services  Installing Services  Starting & stopping services  Services in Linux  Edit config files  Install new package  Package manager may be available Networking Concepts – Eric Vanderburg ©2005
  • 14. Sharing in Linux  Use NFS for Linux only share  Use Samba for Linux to Windows shares Networking Concepts – Eric Vanderburg ©2005
  • 15. Network Applications        Multiple concurrent use Email Messaging Scheduling Groupware Databases Architectures    Centralized – fully stored on server File-system sharing – client app with shared storage area or database True client/server – some components are on the client and some on the server. Effectively uses client processing Networking Concepts – Eric Vanderburg ©2005
  • 16. Email       X.400 IMAP (Internet Message Access Protocol) – downloads and displays messages, can be sent to a client or run from a web based app, fault tolerant with advanced controls for group collaboration. MHS (Message Handling System) – Novell’s messaging service POP3 (Post Office Protocol version 3) – downloads messages to the client, messages managed locally SMTP – standard for sending mail messages X.500 – improved directory and has a global address database Networking Concepts – Eric Vanderburg ©2005
  • 17. Messaging         Oscar – AIM protocol, now used for ICQ also, direct connections do not go through AIM servers File sharing services often have chat (Napster, Direct Connect, eDonkey, ect..) IRC – primarily for group chats, oldest (1989) Jabber – Uses TCP & XML, email-like names used. Can use other services also: username@aim.jabber.org Novell GroupWise Manager – uses SSL Lotus Sametime XMPP (Extensible Messaging & Presence Protocol) SIMPLE (*SIP for Instant Messaging & Presence Leveraging Extensions) Networking *SIP - Session Initiation Protocol Concepts – Eric Vanderburg ©2005
  • 18. Scheduling & Groupware  Scheduling  Calendars  Integrated into other programs  Groupware  Many users collaborate on a single file  Novell GroupWise  Lotus Notes  Microsoft SharePoint Networking Concepts – Eric Vanderburg ©2005