0% found this document useful (0 votes)
19 views

Ch.6 Linux Network

Linux network

Uploaded by

mtv.maxamed
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Ch.6 Linux Network

Linux network

Uploaded by

mtv.maxamed
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 29

LINUX

Lecturer: Eng. Mahdi Obsiyeh

Alpha University
Faculty of IT and Cyber security
Borama, Somaliland
Chapter 6

Linux Communication Commands


And Network
• While working on a Linux operating system, you may need
to communicate with other devices. For this, there are
some basic utilities that you can make use of.

These utilities can help you communicate with:


• networks,
• other Linux systems
• and remote users
Communication Commands
• Ping
• FTP
• Telnet
• SSH
Ping
This utility is commonly used to check whether
your connection to the server is healthy or not. This
command is also used in -
•Analyzing network and host connections
•Network performance and managing it
•Testing hardware and software issues
The ping is the reaction time of your connection–how
fast you get a response after you've sent out a request.
A fast ping means a more responsive connection,
especially in applications where timing is everything (like
video games).

Ping is measured in milliseconds (ms).


Command Syntax:-
Here, A system has sent 64 bytes data packets to the IP Address
(172.16.170.1) or the Hostname(www.google.com).
FTP
FTP is file transfer protocol. It's the most preferred protocol
for data transfer amongst computers.

You can use FTP to –

•Logging in and establishing a connection with a remote host


•Upload and download files
•Navigating through directories
•Browsing contents of the directories
The syntax to establish an FTP connection to a
remote host is –

Once you enter this command, it will ask you


for authentication via username and password.
Once a connection is established, and you are logged in, you
may use the following commands to perform different actions.
Telnet
• What is Telnet?
• Telnet is the standard TCP/IP protocol for virtual terminal
service. It enables you to establish a connection to a remote
system in such a manner that it appears as a local system.
The full form of TELNET is Terminal Network.

• Telnet protocol is mostly used by network admin to access and


manage network devices remotely. It helps them access the
device by telnetting to the IP address or hostname of a remote
device. It allows users to access any application on a remote
computer. This helps them to establish a connection to a
remote system.
Telnet
• What is Telnet?
• Telnet is the standard TCP/IP protocol for virtual terminal
service. It enables you to establish a connection to a
remote system in such a manner that it appears as a local
system. The full form of TELNET is Terminal Network.
The syntax for this utility is:

For demonstration purpose, we will connect to your computer (localhost). The utility
will ask your username and password.
SSH
• SSH which stands for Secure Shell, It is used to connect to
a remote computer securely. Compare to Telnet, SSH is
secure where in the client /server connection is
authenticated using a digital certificate and passwords are
encrypted. Hence it's widely used by system
administrators to control remote Linux servers.
Cont..
• Why SSH is used?

SSH is typically used to log into a remote machine and execute commands,
but it also supports tunneling, forwarding TCP ports and X11 connections;
it can transfer files using the associated SSH file transfer (SFTP) or secur
copy (SCP) protocols.SSH uses the client-server model.

By using SSH you are able to move freely through your hosting account file
structure. You can also perform tasks such as live monitoring log files and
starting and stopping services (for VPS and Dedicated customers only).
You can even use it to install software to your account or manage your
MySQL databases.
The syntax to log into a remote Linux machine using SSH is
KEY DIFFERENCES:
• Telnet is the standard TCP/IP protocol for virtual terminal
service, while SSH or Secure Shell is a program to log into
another computer over a network to execute commands in a
remote machine.
• Telnet is vulnerable to security attacks while SSH helps you to
overcome many security issues of Telnet .
• Telnet uses port 23, which was designed specifically for local
area networks, whereas SSH runs on port 22 by default.
• Telnet transfers the data in plain text while in SSH data is sent
in encrypted format via a secure channel.
• Telnet is suitable for private networks. On the other hand,
SSH is suitable for public networks.
Important Telnet Commands

Here are some important Telnet commands:


•Open: This telnet command is used to open the host name port
number to establish a Telnet connection to a host
•Close: Helps you to close an existing Telnet connection
•Quit: To exit from Telnet
•Status: Use this command to determine whether the Telnet
client is connected or not.
•Timing Mark: Defines the timing marks
•Terminal Type/Speed: Set the terminal type and speed
Important SSH Commands:

Here are some important SSH commands:

•ls- Show directory contents (list the names of files).


•cd– This command helps you to change the directory
•mkdir– Helps you to create a new folder (directory).
•touch– Allows you to remove a file.
Advantages of Telnet

Here are pros/benefits of Telnet


•This protocol can be used to send and receive information
•Supports user authentication
•The collaboration of multiple users
•You can use to send and receive information
•This remote login saved your research hours
•There are no authentication policies & data encryption
techniques used in Telnet, causing a huge security threat.
Disadvantage of Telnet

• Telnet is not an Ideal Protocol to transmit cursor movements


or GUI information.
• Does not support the transport of encrypted data. Instead, it
only supports known port number
• Dynamic port not supported
• Telnet does not encrypt any data sent over the connection.
• Port numbers can be exploited.
• Display only text and numbers, no graphics and color
Advantages of SSH:

• It is available free for non-commercial use


• SSH may offer multiple services using the same connection
• It offers strong authentication and secure communications over
insecure channels.
• SSH allows users to log into another computer over an insecure
network securely.
• Provide privacy of your data via strong encryption.
• The integrity of communications performed in such a way that it
cannot been changed.
• Authenticate proof of identity of senders and receivers.
• Allows you to back or forward or to encrypt other TCP/IP- based
sessions.
Disadvantage of SSH:

•Telnet connection does not allow you to run GUI tools.


•It is not designed to transmit cursor movements or GUI
movement information.
•It is not a secure protocol.
•SSH protocol not able to fix all TCP’s problems since TCP runs
below SSH.
•SSH cannot protect users from attacks made through other
protocols.
•This protocol does not protect Trojan horses or viruses.
Summary:

• Communication between Linux/UNIX and other different


computers, networks and remote users is possible.
• The ping command checks whether the connection with a
hostname or IP-address is working or not. Run 'ping IP
address or Hostname' on the terminal
• FTP is preferred protocol for sending and receiving large files.
You can establish an FTP connection to a remote host and
then use commands for uploading, downloading files,
checking file and browsing them
• Telnet utility helps you to connect to a remote Linux computer
and work on it
END

You might also like