0% found this document useful (0 votes)
95 views

Chapter 4 Network Management

The document provides information about network management and TCP/IP protocols. It discusses TCP/IP layers, networking interfaces, IP addresses, network addressing, servers, DNS, DHCP, and web servers. It also covers TCP/IP troubleshooting tools like ping and traceroute, and file transfer protocols like FTP and vsFTP.

Uploaded by

Bab Kebede
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views

Chapter 4 Network Management

The document provides information about network management and TCP/IP protocols. It discusses TCP/IP layers, networking interfaces, IP addresses, network addressing, servers, DNS, DHCP, and web servers. It also covers TCP/IP troubleshooting tools like ping and traceroute, and file transfer protocols like FTP and vsFTP.

Uploaded by

Bab Kebede
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

Lecture 4

Network Management
TCP/IP Basics: Protocol Layers
• TCP/IP stands for Transmission Control Protocol/Internet
Protocol and is a suite of communication protocols used to
interconnect network devices on the internet.
• The entire IP suite a set of rules and procedures is
commonly referred to as TCP/IP.
• TCP/IP specifies how data is exchanged over the internet by
providing end-to-end communications that identify how it
should be broken into packets, addressed, transmitted,
routed and received at the destination.
• The 4/5 layers of the TCP/IP model. Application, Transport,
Internet, Network access layer.
Networking Interfaces

• TCP/IP defines an abstract interface through which the


hardware is accessed.
• This interface offers a set of operations that is the same for
all types of hardware and basically deals with sending and
receiving packets.
• For each peripheral networking device, a corresponding
interface has to be present in the kernel.
• For example, Ethernet interfaces in Linux are called by such
names as eth0 and eth1; PPP interfaces are named ppp0
and ppp1; and FDDI interfaces are given names like fddi0
and fddi1.
Networking Interfaces
• These interface names are used for configuration purposes
when you want to specify a particular physical device in a
configuration command, and they have no meaning beyond
this use.
• Before being used by TCP/IP networking, an interface must
be assigned an IP address that serves as its identification
when communicating with the rest of the world.
IP Addresses
• An IP networking protocol understands addresses as 32−bit
numbers.
• Each machine must be assigned a number unique to the
networking environment.
• If you are running a local network that does not have TCP/IP
traffic with other networks, you may assign these numbers
according to your personal preferences.
• There are some IP address ranges that have been reserved for
such private networks.
IP Addressing
 An IP address is a numeric identifier assigned to each
machine on an IP network.

 An IP address has 32 bits divided into four octets.

 You can represent an IP address using one of three methods:

Dotted-decimal, as in 172.16.30.56

Binary, as in 10101100.00010000.00011110.00111000

Hexadecimal, as in AC.10.1E.38
 To make the address easier to read, people use decimal
numbers to represent the binary digits

◦ Example: 192.168.1.1

 Dotted decimal notation

◦ When binary IP addresses are written in decimal format


 The 32-bit IP address is a structured or hierarchical
address, as opposed to a flat .
Cont.
 IP addressing was designed to allow hosts on one network to

communicate with a host on a different network.

IP Terminology

• Bit A bit is one digit, either a 1 or a 0.


• Byte A byte is 8 bits.
• Octet An octet, made up of 8 bits, is just an ordinary
8-bit binary number.
Cont.
Network address This is used in routing to send packets to a
remote network.

Broadcast address The address used by applications and


hosts to send information to all nodes on a network.
Network Addressing
 The network address uniquely identifies each network.
 Every machine on the same network shares that
network address as part of its IP address.
 The designers of the Internet decided to
create classes of networks based on network size.
Summary of IP classes of networks
Servers
• A server commonly refers to a computer
program that receives and responds to requests
made over a network.
• Is PC running software that is responsible for
coordinating some form of communication
between nodes on a network.
DNS
• DNS is a fundamental part of every large computer network.
• The domain name system or DNS is a service on a tcp/ip
network that enables clients to translate names into ip
addresses.
• Whenever you visit a web site, here will be one or (many)
more queries to dns services.
• You will notice that even the largest of organizations benefit
greatly from having one dns infrastructure.
DNS
The question a client asks a dns server is called a query. When
a client queries for an ip address, this is called a forward
lookup query.

The reverse, a query for the name of a host, is called a reverse


lookup query.
DNS namespace
The dns namespace is hierarchical tree structure, with the root
servers at the top. The root servers are usually represented by a
dot.

There are thirteen root servers on the internet, they are named A
to M. Journalists often refer to these servers as the master servers
of the internet.
Domains
• One level below the top level domains are the domains.
Domains can have subdomains (also called child domains).
Top level domains
• Below the root level are the top level domains or tld's.
• The first top level domains
Assignment
What does and how they works?
– dns records
– caching only servers
– caching only server with and without forwarder
– authoritative dns servers
– primary and secondary
– zone transfers
– SOA record
– DNS delegation
Introduction to DHCP
• Dynamic Host Configuration Protocol is a standard tcp/ip
protocol that distributes ip configurations to clients.
• The alternative to dhcp is manually entering the ip configuration
on each client computer.
• DHCP works with layer 2 broadcasts.
• A DHCP client that starts, will send a dhcp discover on the
network.
• All dhcp servers (that have a lease available) will respond with a
dhcp offer.
• The client will choose one of those offers and will send a dhcp
request containing the chosen offer.
• The dhcp server usually responds with a dhcp acknowledgement.
When this procedure is finished, then the client is allowed to use that
ip-configuration until the end of its lease time.
Web Server
• A web server is a program that generates and transmits
responses to client requests for web resources.
• Handling client request consists of several key steps:
• Parsing the request message
• Checking that request is authorized

• Associating the URL in the request with a file name

• Constructing the response message

• Transmitting the response message to the requesting client.


Web Server

• The server can generate the response message in a variety


of ways:
– The server simply retrieves the file associated with the
URL and returns the contents to the client.
– The server may invoke a script that communicates with
other servers or back-end database to construct the
response message.
Web Site Vs Web Server

• Web site consists of a collection of web pages associated


with a particular hostname.
• A Web Server is a program to satisfy client requests for
web recourses.
Steps in Handling a Client Request
• A Web Server proceeds through the following steps:

– Read and parse the HTTP request message

– Translate the URL to a file name

– Determine whether the request is authorized.


– Generate and transmit the response that includes header to
show the status information.
– If the requested web page is not found, web server will the
send an HTTP response:Error 404 Not found.
Access Control
• A Web Server may limit which user can access certain
resources.
• Access control requires a combination of authentication
and authorization.
– Authentication identifies the user who originated the
request.
– Authorization determines which users have access to a
particular resources.
TCP/IP Troubleshooting
• Ping - allows a user to test and verify if a particular
destination IP address
• Traceroute - tool for tracing the path an IP packet takes across
one or many networks.
• Netstat- how your computer is communicating with other
computers or network devices.
• Ipconfig-It gives you information about your current network
configuration and it has the ability to renew your Ip addresses
and DNS cache.
• Ifconfig- It is used to view and change the configuration of
the network interfaces on your system.
Remote Administration with SSH and SCP

• Configuration, Telnet Replacement, Secure


Copy and Rsync
• RSA and DSA Authentication (Password-less
Logins)
• Remote Command Execution and Port
Forwarding
Installation of openssh
• Sudo apt-get install openssh-server
• Sudo ufw status ---- to see the status of the Firewall
• If this displays “inactive”, We don’t worry about port 22 .
That means it is not blocked.
• To disable:
• Sudo ufw disable
Putty
• Now download and install Putty which is an
ssh client on Windows and you can remote
login to your server.
FTP (File Transfer Protocol)
vsftp(very secured ftp)
• Vsftp is used to upload and download files to
and from the Ubuntu server.
installation
• Sudo apt-get install vsftpd
configuration
• The configuration of vsftpd is in text file in
/etc/vsftpd.conf
• So we need to change some of these settings.
• Examples
• Local_enable=yes – for users to login
• Write_enable=yes – for people to upload files
inaddition to downloading files
– If this is commented, people can only download but
not upload
Now Restart vsftpd
• Sudo service vsftpd restart
• Check firewall for ftp port as well
Ftp client
• Filezilla
• Download and install filezilla which is an ftp
client on Windows and you can use vsftp.

You might also like