NAD710 Introduction to Networks Using Linux
Linux Network Administrator's Guide, 2nd Edition   <ul><li>By  Olaf Kirch ,  Terry  Dawson 2nd Edition June 2000  1-56592-...
Introduction  (Chapter 1) <ul><li>Gain an understanding of how Linux fits into today’s networked world </li></ul><ul><li>D...
Governing  Agencies <ul><li>ICANN  The Internet Corporation for Assigned Names and Numbers </li></ul><ul><li>IANA  Interne...
IAB <ul><li>IAB  The Internet Activities Board </li></ul><ul><li>The origin of today's IAB lies in the Internet Configurat...
TCP/IP Networking  (Chapter 2) <ul><li>Network Interfaces </li></ul><ul><li>IP Addresses  192.168.1.25 - 10.0.0.15 - 198.2...
Linux Network Commands <ul><li>ifconfig  </li></ul><ul><li>netstat  </li></ul><ul><li>ping  </li></ul><ul><li>traceroute  ...
Configuring Network Hardware  (Chapter 3) <ul><li>Kernel Configuration </li></ul><ul><li>Linux network devices </li></ul><...
Configuring TCP/IP Networking  (Chapter 5) <ul><li>Setting the Hostname </li></ul><ul><li>Assigning IP addresses staticall...
TCP/IP -  The need for standards <ul><li>Why is it so important to the Internet? </li></ul><ul><li>Gain an understanding o...
ARP and RARP <ul><li>The address resolution protocol </li></ul><ul><li>How does a machine communicate within the subnet? <...
DNS  (Chapter 6) <ul><li>Setting up name services (BINDx) </li></ul><ul><li>How does it resolve names to addresses and vic...
NFS  Network File System (Chapter 14) <ul><li>Preparing NFS </li></ul><ul><li>Mounting an NFS volume </li></ul><ul><li>The...
SAMBA <ul><li>Samba is an  Open Source / Free Software  suite that provides seamless file and print services to SMB/CIFS c...
Bridges, Routers and Switches <ul><li>Which device should be used to address a specific design goal? </li></ul><ul><li>Wha...
Routing Protocols <ul><li>How information is passed between routers </li></ul><ul><li>How they can protect networks or if ...
Bridging Protocols <ul><li>Operates at Layer 2 of the OSI model </li></ul><ul><li>Smart bridges, allow some form of intell...
Network monitoring and Discovery tools <ul><li>Ethereal - view the packets in real time </li></ul><ul><li>Nmap - port scan...
Upcoming SlideShare
Loading in …5
×

Introduction To Networks Using Linux

481 views

Published on

Introduction to Networks using Linux

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
481
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Never has there been such dramatic changes to the business world as we have seen in the 1990’s with e-business and the internet. The role played by internet has forced companies to get connected to stay relevant so they may compete in today&apos;s fast moving markets. In the 60’s and 70’s there were many different networks, protocols and implementations. Sharing of information among these dissimilar networks soon became a problem. A common protocol needed to be developed. The Defense Advanced Research Projects Agency funded the exploration of this common protocol. The TCP/IP protocol suite evolved from the ARPANET protocol suite where the fundamental concept of layering was introduced.
  • Introduction To Networks Using Linux

    1. 1. NAD710 Introduction to Networks Using Linux
    2. 2. Linux Network Administrator's Guide, 2nd Edition <ul><li>By Olaf Kirch , Terry Dawson 2nd Edition June 2000 1-56592-400-2, </li></ul><ul><li>Approved by LPI (Linux Professional Institute) </li></ul><ul><li>It is also online </li></ul>
    3. 3. Introduction (Chapter 1) <ul><li>Gain an understanding of how Linux fits into today’s networked world </li></ul><ul><li>Discuss the strengths and weaknesses of Linux </li></ul><ul><li>Learn when a Linux solution the right decision </li></ul><ul><li>Install and administer the latest in Linux applications for resource sharing </li></ul>
    4. 4. Governing Agencies <ul><li>ICANN The Internet Corporation for Assigned Names and Numbers </li></ul><ul><li>IANA Internet Assigned Numbers authority </li></ul><ul><li>IEEE The Institute of Electrical and Electronics Engineers </li></ul>
    5. 5. IAB <ul><li>IAB The Internet Activities Board </li></ul><ul><li>The origin of today's IAB lies in the Internet Configuration Control Board (ICCB), which was created in 1981 by Vint Cerf, at that time program manager at DARPA , to advise him on technical issues. The ICCB was chaired by David Clark, MIT. </li></ul><ul><li>In September 1984, after the ICCB meeting held at RSRE in Malvern, UK, the ICCB was disbanded and replaced by the Internet Advisory Board (IAB). This change was initiated by Dave Clark and Barry Leiner, who had taken over management of the Internet research program at DARPA. The IAB consisted of the chairs of the newly-formed research task forces and Jon Postel (ISI), as RFC editor and &quot;protocol czar&quot;. The first set of chairs of the task forces were the members of the ICCB. The IAB was chaired by Dave Clark. </li></ul>
    6. 6. TCP/IP Networking (Chapter 2) <ul><li>Network Interfaces </li></ul><ul><li>IP Addresses 192.168.1.25 - 10.0.0.15 - 198.235.216.131 </li></ul><ul><li>Address Resolution 64.58.76.227 -> 00:04:ac:38:93:85 </li></ul><ul><li>IP Routing </li></ul><ul><li>ICMP messaging </li></ul><ul><li>Resolving Host Names www.yahoo.com -> 64.58.76.227 </li></ul>
    7. 7. Linux Network Commands <ul><li>ifconfig </li></ul><ul><li>netstat </li></ul><ul><li>ping </li></ul><ul><li>traceroute </li></ul><ul><li>nslookup </li></ul><ul><li>route </li></ul><ul><li>dig </li></ul>
    8. 8. Configuring Network Hardware (Chapter 3) <ul><li>Kernel Configuration </li></ul><ul><li>Linux network devices </li></ul><ul><li>Ethernet </li></ul><ul><li>loadable kernel modules </li></ul>
    9. 9. Configuring TCP/IP Networking (Chapter 5) <ul><li>Setting the Hostname </li></ul><ul><li>Assigning IP addresses statically </li></ul><ul><li>Automatically receiving an address (DHCP) </li></ul><ul><li>Subnet masks - what are they and what do they do? </li></ul><ul><li>Dividing networks using Subnets </li></ul>
    10. 10. TCP/IP - The need for standards <ul><li>Why is it so important to the Internet? </li></ul><ul><li>Gain an understanding of: </li></ul><ul><ul><li>the OSI and DOD Layer models </li></ul></ul><ul><ul><li>the 802.x standards </li></ul></ul><ul><li>Why standards play such an important role </li></ul><ul><li>Explain the RFC (Request for comments) as maintained by the IETF (Internet Engineering Task Force) system and how the system is used. </li></ul>
    11. 11. ARP and RARP <ul><li>The address resolution protocol </li></ul><ul><li>How does a machine communicate within the subnet? </li></ul><ul><li>When do we need to route using a Layer 3 Protocol? </li></ul>
    12. 12. DNS (Chapter 6) <ul><li>Setting up name services (BINDx) </li></ul><ul><li>How does it resolve names to addresses and vice-versa </li></ul><ul><li>You will setup your machine with the name service running </li></ul>
    13. 13. NFS Network File System (Chapter 14) <ul><li>Preparing NFS </li></ul><ul><li>Mounting an NFS volume </li></ul><ul><li>The NFS daemons </li></ul><ul><li>The exports file </li></ul>
    14. 14. SAMBA <ul><li>Samba is an Open Source / Free Software suite that provides seamless file and print services to SMB/CIFS clients </li></ul><ul><li>We will discuss and install samba on our machines </li></ul>
    15. 15. Bridges, Routers and Switches <ul><li>Which device should be used to address a specific design goal? </li></ul><ul><li>What the differences are with each of these devices? </li></ul><ul><li>Why the layered model approach helps speed up the process required to bring products to market. </li></ul>
    16. 16. Routing Protocols <ul><li>How information is passed between routers </li></ul><ul><li>How they can protect networks or if incorrectly installed expose them </li></ul><ul><li>Discuss RIP (routing information protocol) and OSPF (open shortest path first) </li></ul>
    17. 17. Bridging Protocols <ul><li>Operates at Layer 2 of the OSI model </li></ul><ul><li>Smart bridges, allow some form of intelligence at Layer 3 </li></ul><ul><li>Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network. </li></ul>
    18. 18. Network monitoring and Discovery tools <ul><li>Ethereal - view the packets in real time </li></ul><ul><li>Nmap - port scanner </li></ul><ul><li>Npulse - front end for nmap </li></ul><ul><li>You will install and run these applications on your machines </li></ul>

    ×