0% found this document useful (0 votes)
16 views

Sys Admin Notes

The document provides an overview of topics that will be covered in a training program including Linux, UNIX, Windows, DevOps, and AWS. It then details the contents of the first day including orientation information and class links. Various IT terminology is defined such as URLs, web browsers, usernames and passwords. Computer hardware and software components are also explained.

Uploaded by

jclevrai1
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Sys Admin Notes

The document provides an overview of topics that will be covered in a training program including Linux, UNIX, Windows, DevOps, and AWS. It then details the contents of the first day including orientation information and class links. Various IT terminology is defined such as URLs, web browsers, usernames and passwords. Computer hardware and software components are also explained.

Uploaded by

jclevrai1
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 102

1

Week- OnE Day- One

Program Start Date: January 16, 2021

The Things You Will Learn In This Program

LINUX
UNIX
WINDOWS
DEVOPS
AWS
PEN TESTING

FIRST CLASS STARTS HERE – 1/16/2021


2

First Day: Orientation

Instructor: Prof. Emmanuel Warah

School Started: 2006

Session: 29

Trinitech has 2000


graduated more
than Students

Trinitech will
help you get a
job
3

Class link • http://class29.trinitechglobal.com

URL • Uniform Resource Locator

IT Interview • Scenario based questions are always asked.

• Web application or program used to browse or surf the internet.

Web Browser • Eg. Google chrome(better that others), mozilla firefox, safari, microsoft edge.
• You type the url in the address bar of the browser

•Authentication Information Or Login Credentials


Username + Password

Sample of a Job advert


4

Recipe for Success

Attendance

TeamViewer Home
Mentorship
Meetings work

Multi-Platform Sys-Admin

Hybrid Cloud Network


Windows
Security System AWS Cloud
Pen Testing

Linux Switch Router


Networking System

Internet
Unix System Automation
Devops

Summary of your skill set: I can build Linux (red hat), Unix (Solaris) and
Windows(windows10) systems from scratch, configure them to talk together by
5

networking them and automating(devops) them to function by themselves and


connecting the networked systems to the Cloud (AWS) and hardening the system from
vulnerability using Pen Testing.

IT Terminology: In IT, IT terminology is particularly important.


etc.: called itsy - one of the most important configuration folders.

Computer Specs:

• Operating System -Windows 10


• Memory (RAM) – 8GB
• Storage – 250GB

Software: It is the virtual or intangible part of a computer. Ex.: Web browser


Hardware: It is the tangible or physical part of a computer. Ex.: Keyboard, Monitor
Operating System (OS): It is the main program that runs on a computer. When you
press the power button on your computer, the first program that loads is the OS.
Examples:

• Windows 10 (Microsoft)
• MacOS (MacIntosh operating system),
• IOS (internet operating system runs on apple devices, iPad and iPhone),
• Android OS (runs on Samsung mobile devices)
Platform: This is a computer with a program running on it
Other Names for Computer: System | Machine | Unit | Box
➢ Server: is referred to as a supercomputer

Week- OnE Day- TWO


6

Hard Drive Application Memory (RAM) CPU

• It is a container • It is a program •Random Access • Central


of designed to Memory: it is Processing
softwares;OS, perform a used to load Unit: it is the
Applications, specific task softwares. brain of the
Software is loaded
Files and • Examples: Ms computer, It
in RAM cache
Folders Word, Google receives and
•Memory is used
Chrome: processes
to temporarily
designed to cache Softwares. signals from
surf the Ram is flushable, system
internet when you boot hardware and
your system, software
everything in ram
is lost.

SERVER
• It is a supercomputer that comes with extra processing power
such as; multiple RAM, multiple CPU, multiple power supply
units, more storage capacity. A server computer comes with a
hardware and software(server OS:Unix,Linux,Windows,Vmware)
• Servers are used to create processes and manage information.
Information can be used to :
• Make money
• Govern
• for learning. Admin is responsible for building and configuring
the server(Unix,Linux,Windows)
• Vmware: is used to build virtual systems
7

MONITOR
RAM
WIN.10
MS OFFICE OS
CPU
CHROME
CHROME

OS + OTHER SOFTWARES

HARD DRIVE MOUSE

How Data Is Processed: When the power button is pressed, the first POWER BUTTON

thing you see is the O.S. When you click on google chrome app. with
the mouse on the desktop, a signal is sent to the CPU (the brain of
the computer), the CPU then sends a signal to the hard drive where
OS, Apps are stored permanently to load it to the RAM which is then
displayed on the monitor.

RAM To Hard Drive: The flow of data from RAM to the hard drive is
called – Write

Hard Drive TO RAM: The flow of data from the hard drive to RAM is
called – Read
8

Devops: This is a group of applications that are used for automation. Examples are:
Ansible, Docker, Jenkins, Git, Kubernetes, Splunk.
✓ Applications must be installed on an OS
✓ AWS – Cloud: No UNIX in the cloud
✓ Pen Testing: is used for security
✓ VMware: is used to build virtual systems

UNIX: It is a group of Operating Systems with a similar Kernel


Kernel: It is the core or heart of the UNIX OS. The UNIX kernel was built by:
Ken Thompson and Dennis Ritchie in 1969. They worked for the Bell Labs
1. Ken Thompson - Application Developer
2. Dennis Ritchie - C Language Programmer
The UNIX kernel is:
➢ Open Source: the source code is open to the public
➢ Freeware: free to the public
➢ Open Source, freeware applications: are licensed under the GNU license
Flavors or Distributions of UNIX:
▪ Solaris – Owned by ORACLE
▪ HP-UX – Owned by HP (Hewlett Packard)
▪ AIX – Owned by IBM (International Business Machine)
▪ MacOS – Owned by APPLE

SOLARIS AIX

UNIX-KERNEL

MacOS HP-UX
9

Week- TWO Day- ONE

NETWORK
Network: This is a group of systems or computers connected together and sharing
information(data).

A SIMPLE NETWORK

Smart
Phone

Laptop
Server

Wireless
Access Point

PC1 switch Router Internet

Network
Printer

NETWORK COMPONENTS & TERMINOLOGY


10

SWITCH It is a network device used to connect


components of a LAN (Local Area Network)
together
ROUTER This is a network device used to connect
LANs together
This is a local area network. It is a network
located in a small geographical area. E.g.,
LOCAL AREA NETWORK Home LAN
(LAN)
Wi-Fi (WIRELESS FIDELITY) This is usually called WLAN.

ACCESS POINT This is a device that converts ethernet or


LAN traffic into wireless radio waves signals.

RADIO WAVES It transmits Wi-Fi traffic (data flow)

HOME LAN

Layer 3 Switch: Provided by ISP

Radio Waves ISP: Internet Service Providers

Laptop Router/Switch
Internet

Smart Phone Desktop


Wifi =
11

Types Of Networks AND TERMINOLOGY


1. LAN: This is a Local Area Network. It is a network located in a small
geographical area. E.g., Home LAN
2. WAN: Wide Area Network. It is a group of LANs connected together sharing
information spanning a wide geographical area.
3. MAN: Metropolitan Area Network. It is a group of LANs connected together
sharing information spanning a metropolitan area.

➢ URL (Uniform Resource Locator): It is a link to a web resource or address;


it is used to locate a resource from the internet or www (world wide web)

➢ HTTP (Hypertext Transmission Protocol): It is a protocol used to transmit


web pages. It transmits data in clear text (visible to humans)
➢ HTTPS (Hypertext Transmission Protocol Secure): It is used to transmit
web pages. It transmits encrypted [(not visible(readable) by humans] data.

➢ INTERNET: It is a group of LANs connected together sharing resources,


spanning the globe (meaning the world). Resources are public.

➢ WWW: This is a group of internet resources spanning the globe

➢ HTML (Hypertext Markup Language): It is a web protocol used to convert


private LAN resource to a public internet resource.

➢ INTRANET: A collection of local resources that can be access by users


inside the network. Resources are private.

➢ IT: It is the use of technology to create and manage data.


➢ DATA: Also called information: It is a collection of files and folders
(container of files and subfolders). Sub folder is a folder inside another
folder. In windows, it is called a Folder but in Linux and Unix, it is called a
Directory.
➢ File: It is a container of text. Text can be human readable or non-human
readable.
12

TRINITECH WAN

Internet

Switch Router Router Switch

Beltsville, MD. LAN Germantown, MD. LAN

LAN LAN

Example of MAN

DC

LAN

VA
LAN
LAN

MD
13

WWW OF INTERNET RESOURCES

PUBLIC RESOURCES RESOURCES RESOURCES RESOURCES RESOURCES

HTML
LAN LAN LAN LAN
LANs

USA AFRICA ASIA AUSTRALIA

INTERNET

INFRASTRUCTURE SUPPORT - IT BRANCH JOB LABELS

PC TECHS:
➢ Desktop Support: They fix issues related to the hardware and software of a PC.
➢ Certification: CompTIA A+ Certification.
➢ Salary: $30k-60k/Yr.

NETWORK TECHS:
➢ They can perform the job of desktop and network support.
➢ Certification: CompTIA Network+
➢ Salary: $50k-80k/Yr.

NETWORK ADMINISTRATOR:
➢ They can perform the task of a pc tech, network tech and expert in a server OS.
➢ Certification:
✓ Windows: MCSE (Microsoft Certified System Engineer)
✓ Linux: CompTIA Linux+, RHCA (Red Hat Certified Associates)
✓ UNIX: OCA (Oracle Certified Associate) – Solaris 11
➢ Salary: $80k-120k/Yr.

NETWORK SYSTEMS ADMIN:


14

➢ They can perform the task of a:


• PC Tech
• Network Tech
• Network Admin
• Expert in 2 or more server OSs.
➢ Salary: $95k-165k/Yr.
➢ Certification: same as that of net. admin

SYSTEMS ENGINEER:
➢ They can perform the task of:
o PC Tech
o Network Tech
o Network Admin
o Sys Admin
o Design and build network from ground up.
➢ Salary: $150k-Infinity.
They usually end up as consultants. Example: Trinitech Consulting Inc.

Week- TWO Day- TWO

HARD DRIVE | MEMORY(RAM) | SWITCH | LAYER 3 SWITCH

HARD DRIVE

MEMORY(RAM)

SWITCH

LAYER 3 SWITCH
15

LAYER 3 SWITCH

ISP INTERNET
LAN WAN

PC1 PC2

BANDWIDTH: It is the maximum amount of data that can flow through a medium every
second.
How to test your bandwidth:
▪ Open your browser from your system.
▪ Type speedtest.net in the address bar.

Note: using cable to connect your system gives you better speed than connecting via Wi-Fi

DOWNLOAD SPEED 66.19Mbps

LAYER 3 SWITCH INTERNET


ISP

UPLOAD SPEED 5.44Mbps


PC
16

DATA FLOW MEASURING UNITS


8bits 1byte
1000bytes 1kilobyte (KB)
1000KB 1Mega (MB)
1000MB 1Giga (GB)
1000GB 1Terabyte (TB)

BYTE:

is used to measure the size of static data. it is also used to measure the flow of
data within(between) storage devices. Any information in your hard drive is
measured in byte and not in bit.

BIT:

is used to measure the flow of data through a wire or radio waves.

Bits Units Byte Units


bits byte
Kb KB
Mb MB
Gb GB
Tb TB

LINUX OPERATING SYSTEM – SUB FLAVOR OF UNIX

Linux Kernel Unix kernel Padding

➢ Founding father of Linux OS: Linus Tovalds


➢ License: GNU License

Flavors or Distributions of Linux:


17

➢ RHEL - Red Hat Enterprise Linux: Owned by Red Hat Enterprise


➢ CentOS - Community Enterprise OS: Sponsored by Red Hat
➢ Ubuntu - Community Sponsored
➢ iOS - internet OS – owned by Apple.
➢ Android - Owned by Google

Windows:
We will learn the following.
✓ Windows Desktop Support – Windows 10 OS
✓ Windows Domain Administration – Windows Server 2008+Windows Server 2019
✓ Active Directory Administration - Windows Server 2008+Windows Server 2019

DevOps: is used for the automation of processes. These are some of DevOps tools we
will use in this program: Git, Ansible, Docker, Kubernetes, Jenkins, Splunk, Nagios.

Cloud Terminology

VMware: it is a software used to create virtual systems.


Hypervisor: it is a type of VMware software used to create virtual systems

Types of Hypervisor:
1. Hosted Hypervisor: it is an application version of hypervisor that must be hosted or
installed on an OS. Hosted hypervisor is usually used for testing. Example is Oracle
Virtual Box
2. Bare Metal Hypervisor: it is an OS version of a hypervisor that must be installed on
a physical system or bare metal system (hardware without OS on it). Bare metal
hypervisor is used by organization for production. Example is a VMware Exsi.

➢ Production System: It is a system connected to the network and it is used for actual
work.
➢ Non-Production Systems: It is a system that is not used for actual work.
18
Physical System
Physical System
Solaris Solaris
OS. Win 10
RHEL 7 RHEL 7
RHEL 8 VMware Application RHEL 8 VMware OS
Win 10 Win 10

Hosted Hypervisor Bare Metal Hypervisor

Week- THREE Day- ONE

Blade Server: It is a modular, rectangular, slim, and


portable type of server with extra processing
power.

Tower Server: It is a type of server that is different


from the blade server especially in shape

Rack Server: It is a container of blade servers

Server: This is a type of system(computer) with extra processing power. Because of


their extra processing powers, they generate a lot of heat and noise (from the fans).
Some of the different types of servers are shown above

➢ Pixels: Picture quality (resolution, brightness) is measured in pixels


➢ Pictures are made up of numerous pixels
➢ Monitor: This is a display device used to display images from a system(computer)
19
▪ Networked System: It is a system connected to a network and sharing information
with other systems in the network.
▪ Standalone System: It is a system that is either not connected to a network (LAN)
or connected to a network but not sharing info with other systems in the network
▪ VMware Host: It is a system that has a hypervisor installed(hosted) on it. It is used
to create virtual machines or virtual systems.
▪ Guest System: It is a virtual machine or system configured or hosted on a
hypervisor software.
▪ Clean your system every 3months

Physical System
Physical System
Solaris Solaris
OS. Win 10
RHEL 7 RHEL 7
RHEL 8 Hosted Hypervisor RHEL 8 Bare Metal Hypervisor
Win 10 Win 10

VMware Host VMware Host

COMPUTERS

Computer: It is an electronic device that receives input, processes the information, and
releases an output.
➢ Input Devices: Examples are: mouse, keyboard, microphone, flash drive
➢ Output Devices: Examples are: monitor, speaker, printer, flash drive
Types Of Computers
Desktop Computer: It is a type of computer designed for a desk that comes
with separate components

Laptop Computer: It is a type of computer designed for the lap that comes
with component attached to each other.

Server Computers: are computers with extra processing power. Example:


blade and tower servers. Mainframes are archaic types of servers
20

Mobile Computer: Examples are: smart phones, tablets. Smart watches, smart
TVs

The Windows Startup (Bootup) Process


o Boot - power up or startup
o Power on - press the power button
o Reboot - restart
o Recycle - reboot or restart

THE WINDOWS BOOTUP PROCESS


1. Power on the system
2. The POST program is loaded from ROM into RAM and executes(runs)
POST (Power On Self-Test): It runs a diagnostic test on all system hardware
devices at bootup or it runs a health check on all system hardware at boot up.
The POST program sits on the ROM chip. At boot up, the ROM program loads
into RAM, the RAM then sends signals to the various hardware devices for health
check.

Pre POST: Before Bootup


Post POST: After Bootup
3. After the OS is loaded into RAM:
➢ Login Credentials are then requested
➢ The user is placed in a user profile after login and presented with the OS
desktop platform
OS Desktop: It is a platform or a component of the OS that allows users to interface with
the OS.

MONITOR

POST POST
MOUSE

ROM RAM
KEYBOARD
NIC M
21

✓ The Windows Desktop is a GUI based desktop


✓ Windows OS is GUI based
✓ GUI: Graphical User Interface
✓ CLI: Command Line Interface
✓ TUI: Text User Interface

Types of Accounts in windows

Standard User Account: It has restricted access to the system. Example, it cannot
install applications, it cannot make changes to the configuration of the OS
• User Profile: it is the environmental setup of a user account
• A user account must be associated with one user profile
• A user account cannot have more than one profile.
• A user profile for a newly created account is only created when the user logs in
for the very first time
• User profile can be replaced
• User profiles are stored in the user’s folder in the C: Drive (hard drive)

ADMINISTRATOR USER ACCOUNT: It has an unrestricted access to the system.

Week- THREE Day- TWO

When you log into the system, you are place in your profile. The Admin Account has unrestricted
access to the system. That is why as an admin, a background check will most likely be run on you
when you apply for a job.

Types Of Background Checks

Regular Background (Criminal) Check: If you have anything on your record, just do not give
up, speak, and explain to the recruiter. Start now working on cleaning up your social
media account.
22

Public Trust Background Check: There are several jobs that do not require background
checks.

C:\Users: This is the Path to the user profile directory. The Path to a file shows how
to get to the file.
Example: This path is interpreted as follows: C:\users\Trinitech\download: the
download folder is in the Trinitech folder, the Trinitech folder is in the Users folder and
finally, the Users folder is in the C:\ Drive (hard drive)

COMPONENTS OF A DESKTOP

▪ ICON: This is a pictorial representation of an application or an operating system


component. It presents an easier way to access the application or component
▪ FOLDER: It is a container of files and subfolders
▪ FILE: It is a container of text
▪ TASKBAR: It is a horizontal bar located at the bottom of the desktop. It is used as
a staging ground for running applications, it is also used to store and pin icons

How To Attach An Icon To The Taskbar: Right click on the icon and select pin to taskbar
Control Panel: It contains tools used to modify the configuration of the OS

TYPES OF APPLICATIONS(PROGRAMS) IN WINDOWS OS

➢ Default Or Proprietary Applications: These are applications that came with the
OS or installed by the vendor. Any application that came with your system is
called default or proprietary application
➢ 3rd Party Application or Custom Application: It is an application that was not
installed by the vendor or did not come with the system

Firewall: It is a software or hardware that is used to prevent unauthorized access to


the system or the network.
Note: Solaris has no firewall, but Linux does; that is one of the reasons why Linux is more secure that
Unix. It is difficult for hackers to penetrate the firewall on the router.
• WINDOWS DEFENDER FIREWALL

23 SOLARIS • CISCO PIX FIREWALL ROUTER

WIN 10 SWITCH ROUTER INTERNET

CENTOS

• IPTABLES
• FIREWALLD

MALWARE
A Malware is a malicious software that is designed to destroy software or spy on a user.
It can also generate false advertisement. Payload(malware) is called a hack in
cybersecurity. Phishing attacks are the most popular attacks.
Uses of Malware:
- Destroy: It is used to destroy software
- Spy: It is used to spy on a user
- Deceive: It is used to deceive users so as to trick them into getting vital
information from them. Note: in IT, ware refers to hardware or software
Types of Malware:
1. Virus/Trojan/Ransomware:
• Ransomware: It can deceive you to think its legit in order to take over your
system; that is why it is called a ransomware
• Virus: It is designed to destroy software
2. Spyware: It is designed to steal your personal information.
3. Adware: It is designed to generate false advertisement in order to penetrate
your system and slow down your system
Never download free flashlight app from the app store.

Anti-Malware Security Suites

SUITE: It is a combination of applications working together. E.g., MS Office: MS Word,


Excel, Power Point. In windows, it is called suite but in Linux and Unix, it is called cluster
24

PUTTY
This is a tool called a terminal emulator; It enables an admin to login to a remote Unix or
Linux system
Local System: This is a system that is in a user’s environment
Remote System: This is a system that is not in a user’s environment

IP ADDRESS
Internet Protocol (IP) Address: It is a unique number assigned to a networked system
used to communicate with other systems in the LAN. A system without an IP becomes a
standalone system. The IP is assigned to a networked system by the DHCP server
Broadcast: This is the signal sent to every system in the LAN
DHCP (Dynamic Host Configuration Protocol): It is a server or system that gives out
dynamic IP addresses to the networked systems in the LAN
How to display the IP address of a windows system
- Open up the command prompt and type, ipconfig or ipconfig /all
Note ipconfig is (internet protocol configuration)

NIC (NETWORK INTERFACE CARD)

The NIC also called ethernet; connects the system to the LAN. IP addresses are
assigned to NICs. Your laptop has a Wi-Fi NIC.
✓ : This is a temporary IP address assigned to a networked
system by a DHCP server
✓ : This is a permanent IP address assigned to a networked
system by an admin

Week- four Day- ONE


As an admin, you will always be called upon to create users account during the
provisioning process.

SOP (STANDARD OPERATING PROCEDURES)


25

For example: write an SOP for creating an Admin account in windows. When writing an
SOP at work, you will have to be as explicit as possible.

ISO IMAGE: This is a compressed content of a CD or a DVD ROM

NAT (Network Address Translation): It translates network traffic from one system to
another system.

Differences between Windows 10Pro and Windows 10 Home


Win 10Pro Win 10 Home
It can be remoted into It cannot be remoted into
It has networking utilities and tools It has no networking utilities and tools
It can be used for business purposes It can be used for home purposes

NIC (Network interface card): IP are assigned to the NIC of a system. Systems from two
different LANs cannot talk to each other directly.

Bridging: This allows virtual systems to communicate with the LAN directly.

NIC bridging
Laptop NIC
192.168.2.10

NOS LAYER 3 SWITCH INTERNET


DHCP

192.168.2.12

192.168.2.11
PC1
26

Class Task
Putty into remote school server located in Germantown, MD from your local system
using the following specs:
Host Name: This is the label assigned to a computer by an admin
➢ Remote server host name: schoolserver.trinitechglobal.com
➢ Username: class29
➢ Password: school1

Putty: This is a tool used to connect to a remote system

Linux Commands
✓ Display your current location in the Linux filesystem
$ pwd (present working directory)
✓ Display the content of your pwd
$ ls (list)
✓ Create a file called your name in your pwd
$ touch Israel
$ ls to verify
✓ Clear the CLI
$ clear
✓ Display the date and time of the server
$ date
✓ Display the calendar of the month
$ cal
$ cal 01 1990 displays the calendar of Jan 1990

TeamViewer: This is used to host virtual online meetings. It can also be used to
connect to a remote system. Can host only 5 members meeting

WinSCP (Window Secure Copy): It is used to transfer data from a windows


system to a Unix or Linux system or vice versa

Windows WinSCP Linux/Unix


27

- WinSCP: transmits encrypted data


- WinSCP: uses port 22 on the firewall.
- WinSCP: uses the ssh protocol to transmit data
- SSH (Secure Shell Protocol): SSH uses Port 22
Default Settings: These are settings configured by the vendor. i.e., settings that
came with the system
Firewall can be used to filter traffic by opening specific port(portal)
Port: Port has a number. When you open a specific port, traffic can be transmitted to
and from your system using this open port. Putty is by default to look for Port 22 in
order to be able to transmit traffic.
Port Forwarding

WIN 10 NOS PORT 22


Traffic from PC3 to Linux PC

SWITCH ROUTER INTERNET

PORT Forwarding

LINUX PORT 22 Firewall

PUTTY
Firewall PC3

COMPUTER HARDWARE AND COMPONENTS

You should be able to talk hardware at work

The OS in your system is constantly communicating with different hardware


connected to your system.
Port: It is like a connector on your hardware; they connect external devices to your
system.
28

You; the user(admin) is always talking to the OS. You talk to the OS and the OS talk
to the hardware. You do not talk to the hardware directly.
Hardware Device Driver: It is a software that allows the OS to communicate with a
system’s hardware devices.
Each hardware has their respective driver. E.g., mouse driver, hard drive driver, NIC
driver, etc.
Hackers use malware to wipe out hardware device drivers. You can reinstall drivers
getting it from the vendor’s website.

HOW TO DISPLAY A LIST OF ALL THE SYSTEM HARDWARE COMMUNICATING


WITH THE OS IN WINDOWS
Device Manager – It displays a list of hardware devices communicating with the
windows OS
To access the device manager:

✓ Right click on the windows start button and select device manager
AMD CPU: better for editing videos

YELLOW? Means your hardware device driver is corrupt. It is recommended you


update your hardware device driver. The more updated your driver is, the better your
system functions.
❖ Video drivers control your monitor

Week- four Day- TWO


29

Anti-Malware Suite: This provides better protection than just singular anti malware
software
Recommended Anti-Malware: MALWAREBYTES
Sonic Wall is a type of firewall device.
Updating your hardware device drivers: If your system’s driver is corrupt, you can go
to the vendor’ website to update or install the most updated driver.

HOW TO UPDATE/INSTALL YOUR CLIENT’S DRIVER IF HE/SHE HAS NO INTERNET


CONNECTIONS
➢ You should have your laptop and USB thumb drive
➢ Connect your system to your clients’ layer3 switch via Wi-Fi
➢ If no Wi-Fi Password, use your ETHERNET CABLE to connect to the layer 3
switch
➢ Attach the USB thumb drive to your system
➢ Go to the client system’s website and download the driver
➢ Lastly install it on your client system from the USB thumb drive. Problem solved!

EFFICIENT SYS-ADMIN TOOLS


✓ External USB Hard Drive
✓ Network Ethernet cable (RJ-45)
✓ Laptop
✓ Ethernet Adapter

MOTHER-BOARD
The MOTHERBOARD is the main hardware platform in a computer that is used to connect
every other hardware devices together. It enables those devices to talk to each other

Other Names of The Motherboard:


▪ Circuit Board
▪ Logic Board
▪ MB
▪ MOBO
Note: Motherboard is popularly called MOBO at workplaces today!
30

POPULAR MAKERS OF MOTHERBOARD


INTEL | AMD | ASUS
remember that motherboard also comes with drivers, ensures it is always updated

How to update the driver of your system


o Go to the website of your system’ vendor, e.g., www.intel.com
o Click on support
o Click auto-update your drivers
o Click download now
o Click install

note: this procedure will not work on a mac system.


31

MOTHER BOARD PERIPHERAL PORTS


32

PORTS
Ports can also be called either of the following: connectors, controllers, adapters. It is
used to connect external devices to the system.
THE USB PORTS
USB (Universal Serial Bus) Port:
▪ It is used to connect external devices to the system. Example: external storage
devices and external input devices.
▪ It is used to transfer data into and out of the system.
▪ It is used to power small electronic devices.

TYPES OF USB PORTS

Female ports Male ports


33

Usb Versions And Speed

USB VERSION MAX SPEED POWER COLOR/SYMBOL


V1 12mbps 5 Volts Black
V2 480mbps 5 Volts Black
V3.0 5Gbps 5 Volts Black/Blue ss
V3.1 Gen1 5Gbps 20 Volts ss+
ss+10
V3.1 Gen2 10Gbps 20 Volts
V3.2 Gen1 10Gbps 20 Volts ss+10

V3.2 Gen2 20Gbps 20 Volts 0 10

SS: Super Speed 0


34

ONE USB PORT CAN CONNECT UP TO 127 USB DEVICES

USB
USB HUB

Ports come in male and female:


▪ Male Port: It is the port found on the cable
▪ Female Port: It is the port found on the motherboard
Ethernet: It is the terminology that is used to describe LAN and MAN technology.
ethernet port can also be called, connector or adapter or controller

Female Port
Male Port

USB Ethernet Adapter is a substitute if you do not have the ethernet port on your system
35

ETHERNET TERMINOLOGY

Ethernet Technology: The components below are commonly used


➢ Ethernet Male Connector – RJ-45
➢ Female Connector. RJ means Registered Jack
➢ Cat Cable. Cat means Category

Phone Technology: The components below are commonly used


➢ RJ-11 Male Connector
➢ Cat 3 Cable

TYPES OF CABLES

SHIELDED TWISTED PAIR (STP) UNSHIELDED TWISTED PAIR (UTP)


36

The shield on the STP cables prevents electromagnetic cross talk, and it transmits data at a faster rate(speed). UTP cable
transmits data at a slower speed.

CABLE CATEGORY MAX DATA SPEED SHIELDING


Cat 5 100mbps UTP or STP
Cat 5e (extended) 1000mbps UTP or STP
Cat 6 1000mbps UTP or STP
Cat 6A (advanced) 10Gbps UTP or STP

Cat 7 10Gbps STP


Cat 8 25 - 40Gbps STP

Week- fIVE Day- ONE

There are a whole bunch of servers in the server room. At work, things are going to
be set this way as shown below. Admins always operate on multiple screens. You will
hardly go to the server room; you will usually work from your cozy office.

Note: you will be required to go to the server room when your system cannot access
the server.

Server Room
Office
Windows

RDP

Switch Linux
Win 10 NOS
PUTTY

PUTTY
Solaris
37

RDP (Remote Desktop Protocol)

RDP (Remote Desktop Protocol): It allows you to remote into a Windows 10Pro (NOS)

Firewall
Win 10 NOS
RDP PORT:3389 REMOTE SYSTEM

NIC 192.168.2.150

RDP

LAPTOP
NIC SWITCH ROUTER INTERNET
LOCAL SYSTEM
192.168.2.150

The NOS comes with a firewall, we have to configure the firewall to allow Remote
Desktop Access(RDP) access. RDP uses port 3389

Note: You have to be in the same network with the remote system to be able to RDP into the system

STEPS TO CONFIGURE YOUR NOS FOR RDP


➢ Open up the firewall Port
➢ Enable RDP
➢ Create an Admin Account
➢ Get The IP Address

Note: Windows are always updating; your settings might change from time to time.
38

RDP RELATED PROBLEMS


✓ NOS Not Bridged: Always ensure your NOS is bridged.
1. Connected to NAT: connecting to NAT can pose RDP related problems
2. Bridged to wrong NIC: Bridging to the wrong NIC can also cause RDP related
problem
✓ Firewall Related Problem: the following can cause RDP related problems
1. RDP ports were not opened
2. Connection is being blocked by a 3rd party firewall software. Example: Norton,
MacAfee. Note: Malwarebytes will not block your access
✓ Email Account: The account used to RDP into the NOS from your laptop must
be a Local account not an email account; therefore, you must use a local
account.
✓ Network Configuration Errors: The following configuration errors can
cause RDP related problems
a. Your NOS is not picking up IP address from your DHCP server
b. NIC Drivers Issues
Uninstall 3rd party anti-malware

Some Laptops have 2NICs:


➢ RJ-45 NIC
➢ Wi-Fi NIC: Your Wi-Fi NIC is bridged to the network(LAN)

How To Change Bridged NIC:


From your VirtualBox : Settings : Network : Bridged Adapter : Wireless Adapter

How To Delete Account In The NOS


Folder Explorer | This PC | Manage | Local Users And Groups | Right Click On Users |
Delete

Note: you cannot delete an account that you are currently using. Windows servers are setup already for
RDP by default
39

o Maximum Range Of Ethernet (100M): This can be defined as the MAXIMUM


distance data can travel effectively (100metres). After a 100m distance, data will
begin to drop.
o The Mode Of Ethernet Traffic Flow: This is the form in which data flows in an
ethernet setup. Data flows in form of electric signals.
o The Medium Of Ethernet: This is the medium through which data flows in an
ethernet setup. I.e., that which carries data: copper wires are commonly used as
ethernet medium. The NIC generates the electricity that is used to transmit data
from one point to another in the ethernet setting. The amount(quantity) of
electricity generated can only carry data up to 100m distance.

REPEATER | RANGE EXTENDER | SIGNAL BOOSTER: It is a device used to extend the


range of ethernet or Wi-Fi. It amplifies the signal and extends the range. It can enable
the signal to travel for another 100m distance effectively. It receives the signal from the
NIC and boosts it to continue transmitting data. Ensure you follow the repeater
manufacturer’s manual for installation.

Ethernet can also be called a NIC and the NIC connector is RJ-45, Cat cable is used to connect to the
NIC. If you do not have the RJ-45, then your system is using the wireless NIC(WLAN)

WLAN Port | Connector | Adapter


WLAN: Wireless LAN( Wi-Fi)

WLAN: This is used to Connect the System to a LAN using Radio Waves

FRU (FIELD REPLACEABLE UNIT)


The FRU is a computer hardware device that can be easily replaced in the field by a
tech. Example: ram stick, WLAN adapter, hard drive etc.
40

WLAN TECHNOLOGY

Technology Maximum Speed


802.11b 11Mbps
802.11a/g 54Mbps
802.11n 900Mbps
802.11ac 1.7Gbps

How to check your WLAN


device manager -> network adapters-> right click on Wi-Fi-> properties->advance
➢ Mode of WLAN Technology: Radio Waves
➢ Medium Of WLAN: Radio Waves
➢ Speed of Waves Is Measured in Frequencies
WLAN Frequencies:
❖ 2.4GHZ : This has larger wavelength
❖ 5.0GHZ : This has smaller wavelength
The 5.0GHZ wave will transmit data at a faster rate than 2.4GHZ wave

Wave Frequency Range


2.4GHZ 46m
5.0GHZ 15.4m
41

SSID (SERVICE SET IDENTIFIER)


The SSID allows a user to configure or associate a label to a wireless network

2.4GHZ Trinitech
SSID
5.0GHZ Consulting

Today, ISPs build both frequencies into the router. The router auto switch between both
frequencies(2.4GHz and 5.GHz) depending on your distance from the router.

How to access your router:


The router’s IP address is same as the default gateway
Enter the IP address in the web browser and supply your login credentials

YOUR LAYER-3 SWITCH HAS TWO IP ADDRESSES

LOCAL IP: This is a static IP, and it is manually set. It is also called the default gateway. It
connects your system to the LAN

PUBLIC IP: This is assigned by the ISP DHCP system(server). It connects your system(LAN) to
the internet
42

LAYER-3 SWITCH
LOCAL NIC

192.168.2.1
DHCP
ISP INTERNET
DEFAULT GATEWAY

STATIC IP

PUBLIC NIC
PC SWITCH LAPTOP 108.56.241.212
PUBLIC IP
DYNAMIC IP

WIFI SECURITY:
1. WEP (Wired Equivalent Privacy): This is vulnerable; so, it is not recommended
2. WPA (Wi-Fi Protected Access): This is an upgraded WEP
3. WPA2 (Wi-Fi PROTECTED ACCESS V2)
4. WPA3 (Wi-Fi PROTECTED ACCESS V3): This type is difficult to hack into
Building a computer from scratch: This simply means you are building an unexisting
system from the iso image to a full functioning system.
43

Week- fIVE Day- TWO

FIBER OPTICS
Fiber Optics: Fiber technology is usually used to connect LANs
together and also for backups. It is mostly used at work and not at
home.

PROPERTIES OF FIBER OPTICS TECHNOLOGY


Maximum Speed Of Fiber 100Tbps
Maximum Range Of Fiber 20KM
Medium Of Data Transmission Glass
Mode Of Data Transmission Light Pulses

Fiber Cable Fiber NIC


44

Companies will use the fiber technology for their backup infrastructure.
Companies use the faster route to back up data. Regular LAN for regular job
but the fiber network for backups. Fiber technology has its own repeaters

FAST BACK-UP NETWORK

FIBER SWITCH NAS


LINUX SAN

REGULAR LAN

SWITCH ROUTER INTERNET

SOLARIS 10

CPU – CENTRAL PROCESSING UNIT


CPU: This is called the processor and it is the brain of the system. It is responsible for
processing input and output requests from system hardware and software. The CPU is a
multi-tasking or multi-threading device.

The heat from the CPU is absorbed by the cooling fins and blown away by the CPU fan
45

➢ CPU is an FRU for desktop systems


➢ CPU is a non FRU for laptops
Process: This is an executable instance of a software.

SYSTEM PROCESSES AND RESOURCE UTILIZATION ACTIVITY IN WINDOWS

Task Manager: The task manager depicts the health status of the system. To access
the task manager, right click on the windows start button and select “Task Manager”

POPULAR CPU VENDORS:

❖ INTEL | AMD

MEMORY
Types Of Memory
1. ROM (Read Only Memory): It is a non-volatile memory, and it is a chip hard wired
on the motherboard of the system.
➢ Other Names of ROM
✓ BIOS: Basic Input/Output System
✓ CMOS: Complimentary Metallic Oxide Semi-Conductor

The ROM Chip is used as a permanent storage for the:


▪ POST Program
▪ Hardware Configuration Settings: Example: CPU virtualization setting
▪ System Clock Setting
▪ System Boot Order Settings
46

The ROM is powered by the CMOS battery. If you forget your BIOS password,
you will not be able to get into the system anymore. Be careful.

Life Span of the CMOS battery: 10years

CMOS BATTERY PICTURE

2. RAM (Random Access Memory): This is a volatile(flushable) memory


Types of RAM Memory:
1. SRAM (Static RAM): This is used in household electronics. Example:
microwave ovens, coffee makers, refrigerators, aircraft electronics,
automobile electronics. SRAM is extremely fast and expensive.
Access Speed: 10Nano-Seconds. It is not compatible with applications
2. DRAM (Dynamic RAM): This is used in computers. It is the type of
RAM in our systems
▪ Type Of DRAM
a. SIMM (Single Inline Memory Module): It has memory
modules on one side of the memory stick.
b. DIMM (Dual Inline Memory Module): It has memory modules
on both sides of the memory stick
RAM STICKS PICTURES
47

How to determine the maximum amount of memory your system can have:
Check the website of your system’s vendor. The table shown below shows that the
system can take a maximum memory of 64GB
The type of memory in your system is found on your vendor’s website

Maximum Access Speed of DRAM is 60Nano-Seconds

DISPLAY ADAPETERS OR CONNECTORS OR CONTROLLERS

This Is Used To Connect A Monitor To The System.


Types of Display Adapters:
48

1. VGA ( Video Or Visual Graphical Array) Adapter:

The VGA port is 15pin analog port. The resolution is below 720pixels

2. DVI (Digital Visual Interface) Port:

TYPES OF DVI PORTS

TYPE SIGNAL
DVI-A (Analog) Analog Signals Only

DVI-I (Integrated) Analog and Digital Signals

DVI-D (Digital) Digital Signals Only


49

HDMI-HIGH DEFINITION MULTI-MEDIA INTERFACE

HDMI: This transmits audio and video signals all at the same time while VGA and
DVI transmit video signals ONLY.

THE DISPLAY PORT (DP PORT)

The Display Port displays digital signals. It transmits audio and video signals. It is
mostly used by gamers.

Week- SIX Day- ONE


Workstation: This is a system that work is being done on

STEPS IN MAPPING A DRIVE TO A SHARED FOLDER

➢ Create the share folder


➢ Enable file and print sharing
➢ Share the folder
➢ Map a drive to the shared folder
50

• Write Permission: This type of permission allows a user to either create,


modify, and/or delete a folder
• Read Permission: This type of permission allows a user to see(open)
what is inside a folder
• The Virtual System is profile specific
• Computer Life Span: 4-5years

HARD DRIVES | HARD DISKS

Note: The only program that is not stored on the hard drive(hard disk) is the POST
program

HARD DRIVES: They are used to store software.


The hard drive connectors are used to connect the hard drive to the
motherboard and they also help in determining the type of hard drives on the
system.
TYPES OF HARD DRIVES

SCSI (SMALL COMPUTER SYSTEMS INTERFACE ) HARD DRIVE

• Access Speed: 80MBps


51

IDE(INTEGRATED DISK ELECTRONICS) OR ATA(ADVANCE TECHNOLOGY ATTACHED) HARD DRIVES

ATA (Advance Technology Attached): This is also known as IDE(Integrated Disk


Electronics).

• Access Speed: 100MBps

SATA (SERIAL ATA) HARD DRIVE

This is the improved IDE drive


• Access Speed: 150MBps
Note: This is a popular hard drive
52

SAS(SERIAL ATTACHED SCSI) OR SSD(SOLID STATE DISK) HARD RIVE

• Access Speed: 3GBps

HARD DRIVES CATEGORIES


This has to deal with the kind of technology used in building the hard drive
• Solid State Disk (SSD): They store data on chips. Examples of SSD are:
SAS(Serial Attached SCSI). They are faster in transmitting data and are
exceptionally durable
• Hard Disk Drive (HDD): They store data on a spinning disk. Examples of
HHD are: SCSI, IDE, SATA etc. HDD is more fragile than SSD
53

TYPES OF SSD HARD DRIVES


➢ SSD - SATA (SAS)
➢ SSD - PCI

eSATA PORT (EXTERNAL SATA PORT)

This is used for high speed data transfer


• Maximum Speed: 6Gbps
Note: It has no power

eSATAP (Power eSATA)

It can generate 12volts of power

FIREWIRE PORT

This is used for high speed data transfer


Types of Firewire Ports:
▪ FIREWIRE 400
Maximum Speed: 400Mbps
It could be either 4pin port or 6pin port
54

▪ FIREWIRE 800
Maximum Speed: 800Mbps
It is usually a 9pin port
55

PS2 (PERIPHERAL SERIAL PORT VERSION TWO) PORT


The PS2 devices are not plug and play, the system has to be rebooted for them to be identified by
the OS. It is a motherboard peripheral port that is used to connect a mouse or a keyboard to the
system
➢ Purple Port: Connects the keyboard to the MOBO
➢ Green Port: Connects the mouse to the MOBO

SERIAL PORT

This is a 9pin port and it is used to connect peripheral devices to the systems. Examples:
modem(a modem is primitive router), keyboard, mouse, and gaming devices.

PARALLEL PORT

This is either a 36pin or 25pin port used to connect peripheral devices to the system. Example:
parallel printer.
56

THUNDERBOLT PORT

This is used for high speed data transfer


Maximum Speed: 20Gbps

Week- SIX Day- TWO

NETWORK
This is a group of systems connected together, sharing information(resources).

NETWORK CATEGORIES
➢ P2P (PEER TO PEER) NETWORK: This is a group of systems connected together
sharing data without a central server.

N:
Mapped Drive SWITCH

Resource
PC1 M:
Mapped Drive

Resource
PC2
57

➢ CLIENT-SERVER NETWORK: This is a group of systems connected together


sharing information(resources) from a central server.

N: Resource Server
Mapped Drive

PC1

SWITCH

N:
Mapped Drive

PC2

➢ WORKGROUP: This is a group of systems connected together sharing resources


in a P2P(peer to peer) network. It is a subset of a P2P network. Only the
members of same workgroup are allowed to share resources.
note: a system can only belong to one workgroup

P2P (PEER TO PEER) LAN

PC1 PC3

SWITCH ROUTER INTERNET

SWITCH
PC2 PC4

Workgroup-1 Workgroup-2
PC4
58

DOMAIN

Types of Domains:

1. Local Domain: This is a group of systems connected together sharing


information, controlled by a central server called a domain controller. Only
systems and users connected to the domain are allowed to share domain
resources.
Domain controllers are configured and managed by a domain admin.
Naming Convention of a Local Domain: This simply means how the domain is labelled

<name>.local
extension
Note: The name will usually be given to you by your boss.

2. Public Domain: This type of domain is configured by a domain naming


company(example: www.GoDaddy.com) and it is used to host websites and
web applications.
Public Domain Extensions:

.com | .gov | .net | .edu | .org | .info | .tv | .wedding

ipconfig: This command displays limited network configuration information.


Example: IP address, Default Gateway, etc.
ipconfig /all: This command displays detailed network configuration information. Exam
ple: IP address, default gateway, DNS settings, DHCP settings, DHCP lease duration,
etc.
IP Address: This is a unique number assigned to a networked system by the DHCP
server, if dynamic or by a systems’ admin, if static, used by the system to communicate
in the LAN.
Default Gateway: This is a network device that opens up the LAN to the world(internet)
• all routers are not default gateway
59

• The DHCP assigns more than just IP addresses, it assigns network


configuration information. Example: default gateway
• DHCP Broadcast Request: This is a DHCP request sent out by a
networked system in need of an IP address.
• Static IPs are assigned to switches, routers, and servers but dynamic IPs
are assigned to regular systems.

IP: 192.168.2.10
DG: 192.168.2.1

PC1 DHCP Broadcast Request

Default Gateway

SWITCH ROUTER INTERNET

192.168.2.1

SWITCH
PC2 DHCP Server ROUTER

SWITCH
PC3 SWITCH

Layer3 Switch: The layer3 switch can function as a:


✓ DHCP Server
✓ Router
✓ Switch
✓ Default Gateway

Week- SEVEN Day- ONE

HOW TO HACK INTO A WINDOWS SYSTEM

Procedure:
60

Import The ISO Image

Start Your System And Interrupt The Bootup Process

Press Shift+F10 To Access The Command Prompt


61

Type:
copy d:\windows\system32\utilman.exe d:\

copy /y d:\windows\system32\cmd.exe d:\windows\system32\utilman.exe

Close The Command Prompt And Restart(Reset) Your System


62

Click On Ease Of Access Icon

Type The Following Commands To Reset The Password For The User Account And Restart The System
63

Now Login Using The New Password

System Successfully Hacked


64

Week- EIGHT Day- ONE

➢ Never have more than one anti-malware on your system


➢ Everything(program) you see on the task manager window has been loaded into
RAM.

THE JOURNEY SO FAR: THIS IS HOW FAR WE HAVE COME


IN THE PROGRAM
By default, you can RDP into the server

LAPTOP WIN 7PRO


N:Drive
Mapping RDP
RDP
WIN10 NOS SWITCH ROUTER INTERNET
RDP
Share

WIN SERVER 2008 WIN SERVER 2019


DOMAIN CONTROLLER
DNS SERVER | AD
PRIMARY DOMAIN CONTROLLER

END GOAL FOR WINDOWS

▪ Windows OS Desktop Support


▪ Windows Server Administration
▪ Domain and AD Administration
65

▪ As a System Admin, you should be able to build network from scratch


▪ Workstation: This is the system users usually use at work
▪ Server OS is technically also a NOS.
▪ NOS(Network OS): Windows 10Pro (workstation)
▪ Server : (windows server 2008/2019)

CLIENT SERVER
NOS/WORKSTATION/WIN10PRO SERVER2008/SERVER2019

IP ADDRESS

• Static IP Address: This is assigned by an Admin


• Dynamic IP Address: This is assigned by the DHCP server
ipconfig: This command displays limited network configuration information
ipconfig /all: This command displays detailed network configuration information
Default Gateway: This is the device that opens the LAN to the world or internet

DNS (Domain Name Server-Service-System)

DNS: This is a system that translate or resolve hostnames to IP addresses or vice-versa in a LAN.
Without DNS, you will not be able to browse the internet

HOST-NAME DNS RESOLUTION OR TRANSLATION IP ADDRESS


66

LAPTOP
SWITCH ROUTER
31.13.66.35
1.13.66.35 INTERNET
Default gateway
www.facebook.com
www.face 1.13.66.35
book.com 1.13.66.35 www.face
www.facebook.co book.com
m
DNS SERVER 19 31.13.66.35
Facebook

✓ If the DNS is down, you can ONLY access the internet using IP addresses and not
domain names.
✓ Your DNS is in the business of always doing translation(resolution)
✓ DNS maps host names to IP addresses

A-RECORD: This is the mapping of host name to IP address for IPv4


AAAA-RECORD: This is the mapping of host name to IP address for IPv6

FORWARD LOOKUP ZONE: A-Records are stored in the forward lookup zone in the DNS
database

TYPES OF DNS RECORDS:


➢ A-Record
➢ AAAA-Record
➢ PTR (Pointer) Record
➢ CName (Canonical Name) Record
➢ MX (Mail Exchange) Record
67

TYPES OF DNS RECORDS FUNCTION


It is used by IPv4 to perform Forward Name
Resolutions or Translations
A-Record
Hostname DNS Translation IP Address

AAAA-Record It is used by IPv6 to perform Forward Name


Resolutions or Translations

It is used for Reversed Name Translation


PTR (Pointer) Record: It is stored in the
Reversed Lookup Zone DNS Reversed Name Translation
Hostname
IP Address

It is used to create a host name alias for a


CName (Canonical Name) Record: It is stored system
in the Forward Lookup Zone
PC1 (A-Record) – 192.168.2.10
myPC (CNAME) – 192.168.2.10

It is used to identify mail or email servers in


MX(Mail Exchange) Record: It is stored in the the LAN. Example: Microsoft exchange mail
Forward Lookup Zone server

FQDN ( Fully Qualified Domain Name): This is the combination of Hostname + Domain name
FQDN = Hostname + Domain Name

Hostname

Example: winser2019.domain29.local
Domain name

Server in Production: This is a server that is currently being used


68

TCP/IP TROUBLESHOOTING TOOLS


These are tools used to troubleshoot and fix network related issues.

➢ ipconfig: It displays limited network configuration


information
➢ ipconfig /all: It displays detailed network configuration
information
➢ ping: It is a troubleshooting tool used to test for network
connectivity between two systems in a network e.g., ping
8.8.8.8
Note: If the DNS server is down, you will have to go to the server in the server room to
troubleshoot the problem

➢ nslookup (name server lookup): It is used to query the DNS


database for a host name if given an IP address or for an IP
address if given a host name.
Example: given an IP address: 8.8.8.8 find the FQDN or
host name or domain name
69

Positive Ping: It is a type of ping when the receiving system


responds to a ping request from the system.

SENDING RECEIVING
INTERNET
SYSTEM SYSTEM
1.13.66.35
Ping 8.8.8.8 www.face IP Address: 8.8.8.8
book.com
70

Negative Ping: It is when the receiving system does not respond


to a ping request from the sending system.
Negative Respond Message:
Request Time Out | Host Unreachable

Note: If you get ALTEAST ONE positive ping, it means the receiving system is “Alive”.

TTL (Time to Live): (life span) It is the maximum time in milliseconds allowed for the
receiving system to respond to a ping request before it is dropped by the sending
system.
71

Week- EIGHT Day- two

ICMP (Internet Connection Messaging Protocol): This is used to transmit ping traffic

ARP (Address Resolution Protocol): This is used to map IP addresses to MAC


(hardware) addresses.

MAC (Media Access Control) Address: A MAC Address is a unique alpha-numeric


address assigned to a networked device by the vendor at time of creation. It is used to
identify a specific networked device. A MAC address is burned into the device by the
manufacturer. The MAC address can also be called any of the following:

Hardware Address | Physical Address | Ethernet Address

Note: The IP Address to MAC address mapping is stored in the arp table of the system
ARP table display:
arp -a

Note:
✓ When systems talk, they register IP and MAC addresses of other systems they talk
to in the ARP table
✓ The ARP table registers information about systems ONLY in your LAN
72

TCP/IP ADDRESSING

▪ TCP (Transport Or Transmission Control Protocol): TCP is a data transporter


▪ IP (Internet Protocol): IP is a data Carrier

IP Packet

Data

TCP

▪ The world population: 7.8Billion


▪ Total Number of IPV4 addresses: 4.3Billion
▪ Total Number of IPv6 addresses: 340 undecillions
▪ The reason for IPV6 is because IPV4 addresses have been exhausted.
▪ IPsec: Internet Protocol Security
Differences between IPV4 and IPV6
IPV4 IPV6
It is made up of 32bits It is made up of 128bits
It is made up of 4Bytes It is made up of 16Bytes
It comes with no in-built security It comes with in-built security
It is faster at transmitting data It is slower at transmitting data

THE STRUCTURE OF AN IPV4 ADDRESS


X X X X Number
8bits 8bits 8bits 8bits 32bits
1octect 1octect 1octect 1octect 4octects
1Byte 1Byte 1Byte 1Byte 4Bytes

Example: 192.168.2.10

IP Address is divided into network address and host address


IP Address = Network Address + Host Address
73

Subnet Mask: It is used to separate the network address or LAN address portion from the
host address portion

IP Address 192 168 2 10


Subnet Mask 255 255 255 0
Network Address Host Address

✓ IP Address: 192.168.2.10
✓ Subnet Mask: 255.255.255.0

▪ The network portion of an IP address is static, while the host portion is dynamic.
▪ The network address portion defines a LAN and only systems within the same
network(LAN) address can communicate with each other.

PC1 LAN IP: 192.168.2.0

IP: 192.168.2.4
SM: 255.255.255.0
ROUTER
SWITCH
IP: 192.168.2.1 INTERNET
SM: 255.255.255.0
PC2

IP: 192.168.2.5
SM: 255.255.255.0

THE IPV4 ADDRESS CLASSES

IP CLASS DEFAULT SUBNET MASK FIRST OCTECT RANGE FUNCTION


CLASS A 255.0.0.0 1 - 126 Used for networking
CLASS B 255.255.0.0 128 - 191 Used for networking
CLASS C 255.255.255.0 192 - 223 Used for networking
74

Used for
CLASS D N/A 224 - 239 broadcasting and
Multi-casting
CLASS E N/A 240 - 255 Used for Research
Note: Computers will mostly have either class A, B, or C address and not class D or E

DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)

• DHCP assigns dynamic network configuration information to systems in the


LAN
• DHCP assigns IP addresses, default gateway, subnet mask information
• DHCP will lease out dynamic IP addresses to networked system
• The lease duration for a windows DHCP is 8days.
• DHCP IP SCOPE: It is the range of IP addresses that can be assigned by a
DHCP server to networked systems
• The DHCP can reserve IP addresses using the systems MAC address
• If two systems have same IP address, it will result in IP conflict and they
will not be able to talk to other systems in the LAN. When assigning IP
addresses to system, you should leave some IP addresses for static IP
configuration.
• DHCP server IP scope. Example: Starting IP: 192.168.2.1 | Ending
IP:192.168.200

IPv4 Class Host Bits(n) Formular Computation Total Number of Hosts


CLASS C 8 2n - 2 28 - 2 254
CLASS B 16 2n - 2 216 - 2 65,534
CLASS A 24 2n - 2 224 - 2 16,777,214
75

CIDR classless interdomain routing


• CIDR: It is a network configuration setup where an IP address from one
class of IP is assigned a subnet mask from a different IP class. It is used to
conserve IP addresses. Example
Class A IP address: 10.0.0.195
Class C Subnet Mask: 255.255.255.0

IP RANGE OF EACH OCTECT OF AN IPV4 ADDRESS


OCTECT 1 OCTECT 2 OCTECT 3 OCTECT 4
1 0 0 1
. . . .
. . . .
126 . . .
. . . .
128 . . .
. . . .
223 255 255 254
76

Week- NINE Day- ONE

Public IP Address: This is assigned by the DHCP server of your ISP.


ipchicken.com: This is used to display the Public IP Address of
your network.
ipconfig: This is used to display the local IP Address(default gateway) of
your network.

LAYER-3 SWITCH
LOCAL NIC

192.168.2.1
ISP INTERNET
DEFAULT GATEWAY DHCP

STATIC IP

PUBLIC NIC
PC SWITCH LAPTOP 108.56.241.212
PUBLIC IP
DYNAMIC IP

Distinctions Between Windows Home Based OS and The NOS


➢ Only the NOS can join a domain
➢ Only the NOS can be configured for a remote access
77

➢ The NOS is built for business networking, but home based


OS is built for consumers

OSI-(OPEN SYSTEM INTERCONNECT) MODEL


OSI MODEL This is a set of rules constructed by the
ISO(International Organization of Standardization) to help
developers build systems that can communicate(talk) with each
other. The OSI model helps systems from different vendors to
interconnect(talk) to each other.
TCP/IP: This is the “brain-child” of the OSI model. Every system
comes with a TCP/IP Stack.

It was a nightmare for systems from different vendors to talk to each before the
advent of the OSI model. Systems used to use different protocols to talk to each
other. Today, all network systems use a common protocol for communication which is
the TCP/IP

The 7 Layers Of The OSI Model

LAYER 7 - APPLICATION LAYER


LAYER 6 - PRESENTATION LAYER
LAYER 5 - SESSION LAYER
78

LAYER 4 - TRANSPORT LAYER


LAYER 3 - NETWORK LAYER
LAYER 2 - DATA LINK LAYER
LAYER 1 - PHYSICAL LAYER
Key: All People Seem To Need Data Processing

data from the sender flows from the application layer down to the physical layer

OSI MODEL LAYER FUNCTION PROTOCOL


APPLICATION Provides services that directly FTP, HTTP
support user applications

PRESENTATION File format such as: JPEG , MP3,


compression, decompression,
encryption, decryption take MPEG
place at this layer

SESSION This layer allows applications SQL, RPC


on connecting systems to
communicate using a session.

TRANSPORT This layer accepts data from TCP, UDP


the session layer, break up the
data into smaller units called
segments if need be, and send
these manageable data
segments to the network layer

NETWORK This is the layer where IP IP, ARP, ICMP


packets are formed. Routers
function here
79

It receives IP packets and


DATA LINK converts it to frames. IEEE 802.3
Switches function here

PHYSICAL frames are converted to bits IEEE 802.3


here. Hub functions here

PDU(Protocol Data Unit): This is the form of data in the OSI model

OSI LAYER PDU


APPLICATION Data
PRESENTATION Data
SESSION Data
TRANSPORT Segments
NETWORK Packets
DATA LINK Frames
PHYSICAL Bits

COMPONENT OSI LAYER


ftp Application Layer
http Application Layer
udp Transport Layer
sql Session Layer
router Network Layer
80

mp3 Presentation Layer


encryption Presentation Layer
switch Data Link Layer
hub Physical Layer
tcp Transport Layer

Common protocols and their port numbers

PROTOCOL PORT NUMBER


http 80
ftp 21
https 443
ssh 22
sftp 22
smtp 25
telnet 23
rlogin 513
dns 53

DNS/DHCP:
When systems get their network configuration informant from the DHCP
server, they contact the DNS server to register their information in the DNS
A-Record in the Forward Lookup Zone. i.e., The DNS server has A-Record
for every system in the LAN.
Note: If the DNS server is down, the systems will not be able to talk to each
other using the host names and also, they will not be able to connect to the
internet.

Backup DNS Server: In other to switch from the main DNS server
when it is down to the backup DNS server, you will have to enter the
backup DNS IP Address in the DHCP server so that the LAN systems can
81

now obtain a new DNS IP Address from the DHCP server after which they
have been restarted.

ipconfig /flushdns: This command flushes away DNS settings stored in


RAM for a system after which the system will then go to the DHCP server to
request for a new DNS information.

(THE LOOPBACK ADDRESS)


➢ The loopback address is not assigned to any specific system
➢ Your Local NIC has a Virtual NIC
➢ Your standard IP is assigned to your Local NIC
➢ The loopback address (127.0.0.1) is assigned to your Virtual NIC
that is attached to your local NIC
➢ The loopback address is used to troubleshoot the IP Stack of the
system
IP STACK: This is the program that controls the IP addressing unit of the
network module of the OS
✓ A positive loopback ping means the IP stack is good, while negative
loopback ping means the IP stack is bad.

PC LAN

Virtual NIC : 127.0.0.1

Local NIC : 192.168.2.53


82

How to fix a bad IP stack


✓ Windows: Download and run the Winsock Fix Utility from the
Microsoft website
✓ Linux/UNIX: Type this command: sys-unconfig

ipconfig /release: This will drop the network settings of the NIC from RAM
ipconfig /renew: This will request for a new network setting from the DHCP
server
Question: how would you reset the IP address of the windows system
Answer: ipconfig /release and ipconfig /renew

Options of the command ipconfig


✓ ipconfig /all
✓ ipconfig /flushdns
✓ ipconfig /release
✓ ipconfig /renew

Tracert Command: This command is used to trace the route of traffic flow
from sending system to receiving system
▪ tracert: Windows
▪ trace: Linux/UNIX
▪ traceroute: Cisco
83

APIPA (Automatic Private IP Addressing)


o APIPA Address range: 169.254.1.0 – 169.254.254.255.
o The APIPA Address is assigned to the NIC of a system that cannot
reach out to the DHCP server.
o The system without IP will repeatedly try to reach DHCP server every
5minutes
o The Systems with APIPA address cannot talk to other systems in the
LAN

DESIGNING AND BUILDING A LAN FROM SCRATCH

Categories of Ethernet Cables


Straight Through Cable: It connects dissimilar devices together. Example:
PC -> Switch, Switch-> Router, PC ->Hub Hub-> Router
Crossover cable: It connects similar devices together. Example: Switch-
>Switch, PC->PC, Hub->Hub, Router->Router

Categories of Switches
1. Unmanaged Switch: it is designed for consumers and it comes with
no OS. Example: Linksys 5Port Switch
2. Managed Switch: It is designed for commercial use and it comes
with an OS. Example: Cisco Switches

Differences Between Switches and Hubs

SWITCHES HUBS
A switch is a smart hub A hub is a primitive switch
84

A switch routes traffic A hub broadcasts traffic.


Broadcasting traffic in a hub will
lead to traffic collision, which will
later cause a broadcast storm. A
broadcast storm will halt traffic flow
A switch transmits data at a faster A hub is slower at transmitting data
rate than a hub than a switch
The remedy to a broadcast storm in a hub is just to restart the hub which flushes the RAM of the
hub.

Week- NINE Day- TWO

NETWORKING CLASS PROJECT USING CISCO PACKET TRACER


85

UNIX/LINUX SERVER BUILD PROCEDURES

SOLARIS 10 SERVER INSTALLATION


Server Specs:
➢ Label: Schoolsol29
➢ RAM: 1.5GB(1500MB)
➢ Storage: 30GB
Note: Imaging means installation

DIFFERENCES BETWEEN TCP AND UDP


TCP UDP
TCP transmits critical data UDP broadcast noncritical data
TCP is reliable and will guarantee UDP is unreliable and will not
transmission of data from sending guarantee transmission of data to
to receiving system the receiving system
TCP is a connection oriented UDP is a connectionless oriented
protocol and will perform a 3-way protocol and will not perform a 3-
handshake with the receiving way handshake prior to transmitting
system prior to data transmission data
86

TCP 3-WAY HANDSHAKE

Sending System Receiving System

A 3-way handshake is a process that occurs prior to TCP sending out


information.
➢ The sending system sends out a SYN signal to the receiving system
➢ The Receiving system then responds with an ACK/SYN signal to the sending
system
➢ The sending system sends back an ACK signal prior to it sending data to the
receiving system

Week- ten Day- one


87

In troubleshooting network related issues, ensure that all the network systems’
configurations are ok before leaving, by doing so you might find potential
problems that need to be fixed.

Local DNS Servers: These will resolve both local hostnames and public
hostnames
Public DNS Servers: These will resolve public hostnames only.
Free Google Public DNS Servers:
✓ 8.8.8.8
✓ 8.8.4.4

SOLARIS POST INSTALLATION PROCEDURES


1. Console Login: This means to login to a physical server. The following are
needed to login to the Solaris server
➢ Username: root
➢ Password: school1
2. Access Command Terminal
3. Create a User Account
4. Display Server IP Address
5. Terminal Login: This means to login remotely using a terminal emulator.
Example: putty

Server Room Remote Login Admin Office

putty

Console Login LAN Terminal Login


88

The root account:


➢ It is the sole administrator account in UNIX and Linux systems.
➢ It is also called the super user account.
➢ It has unrestricted access to the system
The Command Terminal: This is used to enter commands into a Linux or UNIX
systems

Command Terminal
# Command Prompt

Commands are entered at the


Command Prompt

UNIX Shell

The shell receives and interprets commands


from the command prompt

Kernel

The shell will then send the commands to the kernel


where it is executed
89

Kernel:
▪ It is the core of the UNIX OS
▪ It receives and executes commands from the shell
▪ It is that part of the OS that communicates with system’s hardware
and software
▪ It is the part of the OS that is first loaded into RAM at bootup

UNIX OS

User Interface ▪ CLI


▪ Commands ▪ GUI
Utilities
▪ GUI tools
▪ Shell Kernel

TYPES OF UNIX SHELLS


1. The Bourne Shell:
✓ It is the default shell for Solaris10
✓ Path to the Bourne shell executable: This is the location of the
program that runs the Bourne shell
/usr/bin/sh | /bin/sh | /sbin/sh
2. The BASH shell (Bourne Again Shell)
✓ It is the default shell in Linux
✓ It is a 3rd party shell in Solaris 10
90

✓ Path to the Bash shell executable: This is the location of the program that
runs the Bash shell
/usr/bin/bash | /bin/bash | /sbin/bash

3. The Korn Shell


✓ It is the default shell in earlier versions of Solaris. Ex. Solaris 9,8
✓ Path to the Korn shell executable: This is the location of the program
that runs the korn shell
/usr/bin/ksh | /bin/ksh | /sbin/ksh
4. The C Shell
✓ It is a multiplatform shell used by application developers to compile
applications
✓ Path to the C Shell executable: This is the location of the program that
runs the C shell
/usr/bin/csh | /bin/csh | /sbin/csh

Create a User Account In The Solaris Server

Create a user account with the following specs


Full Name: Trinitech Student
Username: student
Home Directory: /export/home/student
Password: school1

#useradd -c “Trinitech Student” -d /export/home/student -s


/bin/bash -m student

-c (comment) : specifies the full names of the user


-d : specifies the home directory of the user
-s : specifies the default shell for the user
91

-m : creates the home directory of the user at the path specified by


the -d option

Week- ten Day- two

Types Of Prompt In Linux/UNIX

➢ # : This is the super user prompt or the admin prompt


➢ $ : This is the standard user prompt. Admin task cannot be
performed at this prompt. Example: Creating a user account

root - #

su exit

student - $

su su
root student jbiden

exit exit
92

note: you cannot putty into the root account in Solaris, but it is different in
Linux

UNIX AND LINUX COMMAND FORMAT

<command> <option> <value>


Example:
➢ ls -a
➢ ls -a /tmp

filesystem block number

Primary group of
component’s owner

Date and time of last modification


Permission attributes

-rw-r- -r- - 1 student other 144 March 20 13:37 .profile


Component’s owner file or component

Component’s size

Component type
- : file
d : directory

T
93

Absolute Path: This is the path to a component(e.g., file,


directory, etc.) starting from the root(/)

Relative Path: This is the path to a component(e.g., file,


directory, etc.) starting from the pwd

THE UNIX FILESYSTEM STRUCTURE

Week- eleven Day- one

aws CLOUD

CLOUD SERVICES

LINUX WINDOWS 2019


S3 EBS EC2 S3 EBS EC2

EC2 Instance: It is simply a server in the cloud


94

Interview cloud question: How have you used S3


Bucket, EBS volume, EC2 instances in a production
environment

EC2 ( Elastic Compute Cloud) Instance: It is a server


in the cloud

We will be:
• Spinning EC2 Instances
• Accessing EC2 Instances

Week- eleven Day- two


UNIX-Linux Foundational Commands only

Week- TWELVE Day- ONE


UNIX-Linux Foundational Commands

LAN | Laptop Windows Server 2019

O: Hybrid-Cloud Network share


; ;

On-Premise AWS-Cloud
95

Question: What have you done in the AWS-Cloud?


Answer: I have configured a hybrid cloud network and also set up a file-server used to store data.

Patch: It is a small program used to fix, upgrade, or secure an existing software


Package: This simply means application in windows
Cluster: This is a combination of packages
Suite: This is a combination of applications. Example: MS Office suite
Software Group: This is a combination of clusters and packages. Example: OS

Week- TWELVE Day- TWO


THE VI EDITOR

Command Mode: This is the default mode of vi. In this mode, you can.

✓ scroll around inside the file


✓ delete content
✓ append to the next line or character
✓ append to the bottom of the file
✓ save and quit
✓ quit without saving

Insert Mode: In this mode, you can.

✓ add contents
✓ append to the next character or line
96

Vi Commands
vi Opens up a file in vi
i Switch from command mode to insert mode
esc Switch from insert mode to command mode
x Deletes text in command mode
dd Deletes an entire line in command mode
r Replaces highlighted text in command mode
a To append to the next character in command mode
o To append to the next line in command mode
G To append to the bottom of the file in command mode
:q! To quit without saving
:wq! To save and quit in command mode
To scroll around in command mode

Soft link Hard link


It is a short-cut or a virtual link to a component It is a clone link to a component
A soft link will not survive if the source component A hard link will survive if the source
is deleted component is deleted
A soft link can span filesystems A hard link cannot span filesystems

5GB 1KB 5GB 5GB


File File
file file
shortcut clone

Soft link Hard link


97

Week- thirteen Day- one


How to execute a command not in your path

Your Path

# echo $PATH - > /usr/bin:/usr/sbin


# command
# wget url: command not found error
# which wget: no wget in /usr/bin or /usr/sbin

Options to execute the wget command

1. Execute wget from its source path. (ignore your path)


# /usr/sfw/bin/wget url

2. Add wget in your path


Path to wget - > /usr/sfw/bin/wget
Our path:
#/usr/bin:/usr/sbin
#ln -s /usr/sfw/bin/wget /usr/sbin (to insert wget into our
/usr/sbin path directory)

Verify:
#which wget
98

Output:/usr/sbin/wget
3. Add the command’s path to your path
#PATH=$PATH:/usr/sfw/bin
OR
#PATH=/usr/sbin:/usr/bin:/usr/sfw/bin

note: PATH is a system variable


To display the value of the PATH variable
#echo $PATH (to verify)
Output: /usr/sbin:/usr/bin:/usr/sfw/bin

how to fix a corrupted soft link


1. Delete the link
#rm /usr/sbin/wget

2. Re-create the link using the correct path


#ln -s /usr/sfw/bin/wget /usr/sbin

the scp command


SCP ( Secure Copy): It is used to copy or transfer data from one
UNIX/Linux server to another.
➢ scp transmits encrypted data
➢ scp uses port 22 on the firewall
scp command format
99

#scp <file>
#scp -r <directory>

SERVER MANAGEMENT

Introduce the Solaris Server to the network

Solaris Server
- Hostname
- Default Gateway
RHEL 7
- DNS
-Static IP

Windows 2019 Switch Router


Internet

Solaris 10

Week- thirteen Day- TWO


100

Internet Address
Bring up the NIC

#ifconfig e1000g0 inet 192.168.2.249/24 up

The Subnetmask
Prefix
NIC Label

IP Address 192 168 2 249


Subnetmask 255 255 255 0
Subnetmask Prefix 8 8 8 0 /24

192.168.2.10/24 ->class C
128.4.5.6/16 ->class B
10.2.4.8/8 ->class A
10.0.0.4/24 ->CIDR: Classless Interdomain Routing
101

Scp (Secure Copy)


Example-1: Transfer the file test1 from your pwd to the
/export/home/student directory of your homesol server
Homesol Specs:
IP Address: 192.168.2.4
Destination: /export/home/student
Username: student
Password: school1
Solution:
#scp test1 [email protected]:/export/home/student

Example-2: Transfer the following file from the homesol server


into your pwd.
File Path: /export/home/student/class29
Solution:
#scp [email protected]:/export/home/student/class29 .

Note: . means here or pwd


102

You might also like