How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)



Similar documents
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Introduction. Assessment Test

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Managing Name Resolution

MCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

Understand Wide Area Networks (WANs)

SLIP and PPP. Gursharan Singh Tatla

Chapter 12 Supporting Network Address Translation (NAT)

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

Chapter 17 Determining Windows 2000 Network Security Strategies

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Lesson Plans Managing a Windows 2003 Network Infrastructure

Updating Systems Engineer Skills from Microsoft Windows 2000 to Windows Server 2003

Fundamentals of a Windows Server Infrastructure MOC 10967

Associate in Science Degree in Computer Network Systems Engineering

Implementing a Microsoft Windows 2000 Network Infrastructure

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES


Top-Down Network Design

MCSA CORE-Courses 1 & 2

Local Area Networks (LANs) Blueprint (May 2012 Release)

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Course Outline. Course 6421B : Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Customer Tips. Basic Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.

Multi-Homing Security Gateway

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

6421B - Windows Server 2008 R2 Network Infrastructure

Guideline for setting up a functional VPN

Configuring & Troubleshooting Windows 2008 Server 2008 Network Infrastructure

Module 10: Supporting Remote Users

Case Study for Layer 3 Authentication and Encryption

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

VPN. Date: 4/15/2004 By: Heena Patel

Chapter 6. About This Chapter. Before You Begin. Windows 2000 Naming Schemes. [Previous] [Next]

Microsoft Configure and Troubleshoot Windows Server 2008 Network Infrastructure

Network Station - Thin Client Computing - Overview

L2F Case Study Overview

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Initial Access and Basic IPv4 Internet Configuration

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Experiment # 6 Remote Access Services

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Cisco Which VPN Solution is Right for You?

How To Set Up A Network On Windows 2008 With A Simple Network On A Cheap Computer (For Free) (For A Free Download) (Windows) (Permanent) (Free Download) For A Free Install) (Unlimited) (Power

This chapter describes how to set up and manage VPN service in Mac OS X Server.

FAQ: BroadLink Multi-homing Load Balancers

Network Configuration Settings

Optimize Application Delivery Across Your Globally Distributed Data Centers

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Small Business Server Part 2

Advanced Certificate in Networking (Microsoft) G5J9 17. Group Award Requirements

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Prestige 324 Quick Start Guide. Prestige 324. Intelligent Broadband Sharing Gateway. Version V3.61(JF.0) May 2004 Quick Start Guide

Course Outline. ttttttt

IBM enetwork Software White Paper enetwork VPNs--IBM s Virtual Private Network Solutions

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

8 NETWORK SERVERS AND SERVICES FUNDAMENTALS

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Network Security Administrator

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

Chapter 4 Customizing Your Network Settings

R4: Configuring Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure

Chapter 4 Customizing Your Network Settings

Data Link Protocols. TCP/IP Suite and OSI Reference Model

How To Learn Cisco Cisco Ios And Cisco Vlan

Security Design.

Building a Highly Available and Scalable Web Farm

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

"Charting the Course...

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

CCT vs. CCENT Skill Set Comparison

Configuring Windows Server 2008 Network Infrastructure

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

5 Configuring a DNS Infrastructure

This is a distance learning course.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Windows Server Migration Checklist ManageRED Resemble

SSVP SIP School VoIP Professional Certification

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ REVIEW DATE. Report Amended October 2011

Unit title: Network Infrastructure 2: Planning and Maintenance

Implementing and Supporting Microsoft Windows XP Professional

Interconnecting Cisco Networking Devices Part 2

7.1. Remote Access Connection

CORPORATE NETWORKING

Wireless Broadband Router. Manual

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

Transcription:

COMPUTER NETWORKS LECTURES DR.PETER G. GYARMATI Research professor Lectures of P. G. Gyarmati 1. page 1999.-2006.

1999.-2006. This page is intentionally left blank Lectures of P. G. Gyarmati 2. page 1999.-2006.

Table of contents Anatomy of a Network 11 The basic idea 11 The TCP/IP stack 11 How It Works 12 Application Layer 13 Transport Layer 13 Internet Protocol Layer 13 So What Does Winsock Offer? 13 Introduction 16 Network Protocols 16 Remote Access Service (RAS) 18 Mobile Computing Features 19 Network Monitor Agent 19 Recommended Features for Network Clients 19 Application Profiling 23 Overview 23 In Focus 24 Enterprise 24 What Exactly Is the Problem? 24 The Round Trip 24 To Speed Things Up 25 A More Detailed Itinerary 25 What About the App? 26 Information Delivery and Application Design 27 What To Do 28 The Transmission Control Protocol/Internet Protocol (TCP/IP) 30 Benefits of Using TCP/IP 30 Core Technology and Third-Party Add-Ons 31 Supported Standards 32 Internetworking 34 Using TCP/IP for Scalability 34 Using TCP/IP in Heterogeneous Networks 35 Using TCP/IP with Third-Party Software 35 The TCP/IP Architecture 35 The TCP/IP Protocol Suite 36 Transmission Control Protocol 36 User Datagram Protocol 36 Lectures of P. G. Gyarmati 3. page 1999.-2006.

Internet Protocol 36 Address Resolution Protocol 37 Internet Control Message Protocol 37 TCP/IP and the Windows NT Network Architecture 37 TCP/IP and the Windows NT Configuration Database 38 Port Reference for TCP/IP 39 Definition 39 Port Assignments for Well Known Ports 39 Port Assignments for Registered Ports 52 Networking Models 57 Overview 58 Workgroup Networks 58 Domain-Based Networks 59 Primary and Backup Domain Controllers 59 PDC and BDC Deployment 60 Configuring Replication 61 Choosing a Domain Model 62 Single Domain Model 63 Single Master Domain Model 64 Multiple Master Domain Model 65 Complete Trust Domain Model 66 Understanding Groups 66 Administrators 68 Account Operators 68 Backup Operators 68 Domain Admins 68 Guests 69 Domain Guests 69 Domain Users 69 Power Users 69 Print Operators 69 Replicator 69 Server Operators 69 Users 69 Integrating Workgroups into Domains 69 Understanding the Security ID 70 Upgrading a Member Server 70 Moving a Domain Controller to a New Domain 71 Creating a New Domain 71 Promotion and Demotion 71 Promoting a BDC to PDC Status 71 Domain Management Tools 73 Domain Monitor 73 NetWatch 73 Lectures of P. G. Gyarmati 4. page 1999.-2006.

QuickSlice 73 GroupCopy 73 Troubleshooting Techniques for Networks 73 BDC Fails to Authenticate a User's Password 73 IP Address Connection Works but Name Resolution Fails 73 TCP/IP Connection to Remote Host Hangs 74 Unable to Resolve a NetBIOS Name 74 Host on the Same Network Fails to Resolve 75 NET Commands 76 Networking Name Resolution and Registration 78 Overview 78 Understanding IP Addressing 79 IP Addresses 79 IP Addressing for RAS 82 Name Resolution Services 83 Background 83 NetBIOS over TCP/IP (NetBT) Name Resolution 85 Domain Name System Name Resolution 90 Name Resolution with Host Files 94 Chapter 33 - Using LMHOSTS Files 95 Using LMHOSTS File to Find Computers and Services 96 Locating Remote Computers 97 Specifying Domain Controllers 98 Using Centralized LMHOSTS Files 98 Creating the LMHOSTS File 99 Creating Entries in the LMHOSTS File 99 Adding Remote System Names by Using #PRE 103 Adding Domain Controllers by Using #DOM 103 Adding User-Defined Special Groups by Using #SG 104 Adding Multihomed Devices by Using #MH 105 Defining a Central LMHOST File by Using #INCLUDE 105 Configuring TCP/IP to Use LMHOSTS Name Resolution 106 Maintaining the LMHOSTS File 107 Troubleshooting LMHOSTS Files 108 On the Internet 109 Overview 109 Connecting to the Internet 110 Procedural Overview 111 TCP/IP Internet Configuration 112 Dial-Up Networking Internet Configuration 113 Modems and WAN Connections 115 Obtaining an Internet Account with a Service Provider 115 Internet Tools 115 Security for Internet Clients 117 Lectures of P. G. Gyarmati 5. page 1999.-2006.

Single Workstations 118 Networked Workstations 119 Peer Web Services 122 Directory Enabled Networks - The DEN Value Proposition 125 What Is DEN? 126 Motivation Behind DEN: Building Intelligent Network 127 Principal Goals of DEN 129 Modeling Network Elements and Services 130 Building Interoperable Network-Enabled Solutions 131 Network Model Extensibility 134 Managing the Network Using DEN 137 Realizing Intelligent Network with DEN 138 The Directory and DEN 139 Policy Controlled Networking Using DEN 139 Intelligent Network Device Configuration Using DEN 140 Characteristics of a DEN-Based Intelligent Network 141 Transition from a Passive to an Active Network Model 142 Personalization of Network Services 144 Customizing an Application for Different Users 144 Customizing an Application for Different Events 145 Coordination of Network Services 145 Support for Advanced Applications 146 Support for Dynamically Changing Network Services 146 Benefits of Intelligent Network 147 Enterprises 148 Service Providers 148 Developers and Independent Software Vendors 149 End Users 150 DEN, the DMTF, and the IETF 150 How DEN Was Created 150 DEN and the DMTF 151 DEN and the IETF 151 Summary 152 Recommended Further Study and References 152 The DNS Server 156 Introduction 156 DNS Overview 157 The Problem DNS Solves 157 The General Solution 157 A Simple Implementation: HOSTS 158 A Sophisticated Implementation: DNS 158 Beyond Theory: DNS Implementation Ideas and Terms 159 Windows NT DNS Deployment Steps 162 Specialized Deployment Examples 164 Lectures of P. G. Gyarmati 6. page 1999.-2006.

Deployment for an Intranet With Controlled Access 164 Adding to an Existing DNS System 164 Internet Service Provider 165 Conclusion 166 The Domain Name System (DNS) 167 Introduction 168 DNS Services: New Features and Enhancements 168 Benefits Of Windows 2000 DNS 169 Integration with Active Directory 169 Aging and Scavenging 170 Administrative Tools 170 Internet Standards Supported by Windows 2000 DNS 172 Summary 173 For More Information 173 Lightweight Directory Access Protocol (LDAP) 175 Introduction 175 The Directory Service, a definition. 176 The LDAP Directory Services protokol 176 History of LDAP 176 The Active Directory 176 Lightweight Directory Access Protocol (LDAP) Overview 177 The Data Model 177 The Organization Model 177 The Functional Model 177 The Security Model 178 The Topological Model 178 APIs to access LDAP Directory Services 178 The list of the LDAP API calls: 179 LDAP C-Binding API 179 Sample 180 C-Binding API 180 Active Directory Services API 182 References 183 The Windows Internet Naming Service (WINS) Overview 185 Introduction 185 WINS Functional Description 187 New features of Windows 2000 WINS 187 Persistent Connections 187 Manual Tombstoning 189 Improved Management Tools 189 Enhanced Filtering and Record Searching 191 Dynamic Record Deletion and Multi-Select 192 Record Verification and Version Number Validation 192 Consistency Checking 192 Lectures of P. G. Gyarmati 7. page 1999.-2006.

Autodiscovery of WINS Partners 192 Monitoring 192 Export Function 193 Increased Fault Tolerance 193 Dynamic Re-registration 193 Summary 193 For More Information 194 The Point-to-Point Protocol (PPP): An Overview 195 INTRODUCTION 195 The definition 195 History 195 DESIGN GOALS 196 Improvements over SLIP 196 Using LCP 196 Error checking 197 TECHNICAL OVERVIEW 197 The protocol type 197 The relation to HDLC 198 The packet level 200 Link Control Protocol (LPC) details 202 A PRACTICAL ILLUSTRATION 203 CONCLUSION 204 WORKS CITED 205 The PPTP protocol 207 Introduction 207 The PPTP and the Virtual Private Networking 208 Typical PPTP Scenario 208 PPTP Clients 210 Network Access Servers at an ISP 211 PPTP Servers on the Private LAN 211 The PPTP Architecture 212 PPTP Architecture Overview 212 PPP Protocol 212 PPTP Control Connection 213 PPTP Data Transmission 214 The PPTP Security 215 Authentication 215 Access Control 216 Data Encryption 216 PPTP Packet Filtering 216 Using PPTP with Firewalls and Routers 217 Unicast Routing Principles 218 Introduction 219 Internetwork Routing 219 Lectures of P. G. Gyarmati 8. page 1999.-2006.

Addressing in an Internetwork 220 Routing Concepts 220 Host Routing 221 Router Routing 223 Routing Tables 224 Static and Dynamic Routers 226 Routing Problems 226 Routers and Broadcast Traffic 228 Tunneling 229 Foundations of Routing Protocols 230 Distance Vector 230 Link State 231 Routing Infrastructure 232 Single-path vs. Multi-path 232 Flat vs. Hierarchical 232 Autonomous Systems 233 C2 Security Overview 235 The Characteristics of a Secure System C2 and Beyond 235 Discretionary Access Control 235 C2 Security--Requirements Defined 236 C2 Security in Windows NT Server 236 Windows NT Server C2 Implementation 237 Solving Real World Security Problems 238 Windows NT Server Built to be Secure 239 44 Summary 245 45 Glossary 245 45.1 A 245 45.2 B 248 45.3 C 251 45.4 D 254 45.5 E 260 45.6 F 262 45.7 G 265 45.8 H 266 45.9 I 268 45.10 J 271 45.11 K 271 45.12 L 272 45.13 M 274 45.14 N 277 45.15 O 280 45.16 P 281 45.17 Q 287 45.18 R 287 Lectures of P. G. Gyarmati 9. page 1999.-2006.

45.19 S 290 45.20 T 297 45.21 U 300 45.22 V 301 45.23 W 302 45.24 X 304 45.25 Z 305 Lectures of P. G. Gyarmati 10. page 1999.-2006.