1 / 46

W-220

W-220. Networking. Why create a network. Share limited resources Files Printers Scanner Communication Internet / Intranet Email WWW FTP. Types of networks. Peer to Peer (P2P) No centralized control High level of management for security Client / Server Centralized control

jean
Download Presentation

W-220

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. W-220 Networking

  2. Why create a network • Share limited resources • Files • Printers • Scanner • Communication • Internet / Intranet • Email • WWW • FTP Riad S. Twal

  3. Types of networks • Peer to Peer (P2P) • No centralized control • High level of management for security • Client / Server • Centralized control • Security easily managed Riad S. Twal

  4. Practical concerns • Cable routing • Server location • Network switch location • Future expansion Riad S. Twal

  5. Client Microsoft Netware Service File and Printer Sharing for Microsoft Networking QoS Packet Scheduler SAP Agent Protocol TCP/IP AppleTalk NetBEUI NWLink IPX/SPX How PC’s are organized… Riad S. Twal

  6. How PC’s are organized… • Client log on • Directly to the machine • Common with WinNT, Win2000, WinXP • Usually for administrative access to the ‘box’ • Can be used for multiple users on one ‘box’ • Account on the ‘box’ (local machine) • Network log on • Network account, log on to the network • Common with WinNT, Win2000, WinXP • Used for ‘user’ access to the ‘box’ and the network • Account on the network (on the main server) Riad S. Twal

  7. Protocols • TCP/IP - TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet") http://www.yale.edu/pclt/COMM/TCPIP.HTM • AppleTalk – protocol suite to implement file transfer, printer sharing, and mail service among Apple systems using the LocalTalk interface built into Apple hardware http://www.protocols.com/pbook/appletalk.htm • IPX/SPX - Internetwork Packet Exchange / Sequenced Packet Exchange, created for use with the Novell NetWare network operating system http://www.protocols.com/pbook/novel.htm Riad S. Twal

  8. Resources… • Protocol Directory - http://www.protocols.com/protoc.shtml • Computer Networking http://compnetworking.about.com/cs/basicnetworking/ Riad S. Twal

  9. Network Security

  10. Computer Security: • Process of preventing and detecting unauthorized use of your computer • Prevention measures help stop unauthorized users (aka "intruders") from accessing your computer system • Detection measures helps determine whether or not: • attempted to break into your system • if they were successful • what they may have done. Riad S. Twal

  11. Why should I care? • Banking / investing • e-Mail • Class Rosters • Class Gradebook • Faculty memo’s Riad S. Twal

  12. Why my computer? • Random intruders • Hackers looking for a system from which to launch an attack on another system • Direct Intruders • Someone looking for private information that you have • Credit card info • Banking info • Gradebooks • Faculty / staff / school district memo’s (not intended for student viewing) • Lesson plan files / course delivery material Riad S. Twal

  13. How easy is it to break into my computer? • “Holes” in any security system are unavoidable (at least when humans are at the controls) • OS and Applications both have ‘Holes’ in security • “Patches” for OS and Applications are constantly being developed • They are available via the Windows Update website, or from the software manufacturers website (ie. Adobe, Macromedia,…) • ‘Patches’ do no good if they are not installed and updated. Riad S. Twal

  14. Internet Technology • Broadband • Cable Modem • DSL • Narowband • Analog dialup modem Riad S. Twal

  15. What does broadband mean? • "Broadband" is the general term used to refer to high-speed network connections. • DSL (Digital Subscriber Line) • Cable Modem • Ethernet connection • Generally anything over 1Mbps Riad S. Twal

  16. What is DSL? • Digital Subscriber Line (DSL) • Dedicated bandwidth between your location and the Internet Service Provider (ISP) • No guarantee of bandwidth from provider to the rest of the Internet Riad S. Twal

  17. What is cable modem? • A cable modem allows a single computer (or network of computers) to connect to the Internet via the cable TV network. • The cable modem usually has an Ethernet LAN connection to the computer, and is capable of speeds in excess of 5 Mbps • Typical speeds tend to be lower than the maximum • entire neighborhoods are turned into LANs which share the same bandwidth • shared-medium topology means that cable modem users may experience somewhat slower network access during periods of peak demand Riad S. Twal

  18. Broadband vs. dial-up service • Dial-up Internet services • "dial-on-demand" service • your computer only connects to the Internet when it has something to send, such as email or a request to load a web page. Once there is no more data to be sent, or after a certain amount of idle time, the computer disconnects the call • modem IP addresses are dynamically assigned, your computer is usually assigned a different IP address on each call. • Broadband services • "always-on" services • There is no call setup when your computer has something to send. The computer is always on the network, ready to send or receive data through its network interface card (NIC). Since the connection is always up, your computer’s IP address will change less frequently (if at all), thus making it more of a fixed target for attack Riad S. Twal

  19. How do I secure my computer? • When not in use, TURN IT OFF!!! • Someone walking by would have to turn it on before anything could be done • Secure the location • Best physical security is behind a dead-bolt • Secure the Network Connection • If you are not utilizing network resources, don’t be on the network Riad S. Twal

  20. How do I secure my computer? • Secure the Network Connection • If you are utilizing network resources, don’t share unnecessary files • Sharing the “My Documents” folder automatically shares all sub-folders as well… • Use a Firewall to ‘hide’ your computer • Software • Hardware Riad S. Twal

  21. Practical implications… • We are living in the information age. Information has power (like money use to have), and others will want to have access to that power. While cooperation and sharing is necessary, it is not necessary to share all information with everyone. Riad S. Twal

  22. Resources… • NETg@IU Tutorials – • Networking Tech. Network Security • http://www.indiana.edu/~netg/ • CERT/CC – Carnegie Mellon University • http://www.cert.org/tech_tips/home_networks.html • Internet Security Alliance • http://www.isalliance.org/ Riad S. Twal

  23. Network Control Panel

  24. Controls to look for… • Machine identification • Network identification • NIC configuration • TCP/IP properties • DNS properties • File Sharing access Riad S. Twal

  25. Windows 98 Start, Settings, Control Panel, Network Control Panel Or Right click on Network Neighborhood, Properties Windows 2000 Start, Settings, Network and Dial-up Connections, New Connections Or Right click on My Network Places, Properties Right click on My Computer, Properties for Network ID Where are the control panels … Riad S. Twal

  26. Windows 98… • Clients, Adapters, and Protocols have their own icons • Primary Network Logon: • Client for Network • Machine • Sharing Riad S. Twal

  27. Windows 98… • Computer name – machine name on the network • Workgroup – where the machine operates • Computer description – unique computer description, allows others to determine what might be shared by the machine Riad S. Twal

  28. Windows 98… • Shared level access • High user maintenance • Individual passwords given to each share • User level access • Users granted access based upon participation in the network (users picked from a network list) Riad S. Twal

  29. Windows 98… • Properties for Client for Microsoft Network • Determine which domain to log on to Riad S. Twal

  30. Windows 98… • Properties for Ethernet Adapter • Advanced properties Riad S. Twal

  31. Windows 98… • Properties for TCP/IP settings • DHCP vs. Static IP • DNS • WINS Riad S. Twal

  32. Windows 2000… • Clients, Services, and Protocols have their own icons • NIC configuration • Sharing Riad S. Twal

  33. Windows 2000… • NIC Advanced Properties • Device drivers… Riad S. Twal

  34. Windows 2000… • TCP/IP Properties • This has been streamlined from the Win98 interface • Advanced tab ‘hides’ controls that were overwhelming in Win98 Riad S. Twal

  35. Windows 2000… • IP, DNS, WINS, and Advanced Options • Win98 has these controls plus TCP/IP Bindings and other low level controls in one window (7 options in total) Riad S. Twal

  36. Windows 2000 • The name of the computer is within the System Properties of Windows 2000. • Windows 98 has the computer name within the network control panel. Riad S. Twal

  37. Windows 2000 • Computer name must be unique on the network • Workgroup • A workgroup is a logical collection of computers that share resources • Domain • Same as workgroup; however there is one single server responsible for managing security Riad S. Twal

  38. Windows XP • Network Control Panel Riad S. Twal

  39. Windows XP • LAN Properties Riad S. Twal

  40. Windows XP • TCP / IP Properties Riad S. Twal

  41. Windows XP • Computer Name • Defined within System Properties • Right click on ‘my computer’ • Or Control Panel, system properties Riad S. Twal

  42. Useful DOS Commands… • Windows 98 winipcfg • Windows 2000 ipconfig • Windows XP ipconfig ipconfig/all Riad S. Twal

  43. Windows 2000… • ipconfig Riad S. Twal

  44. Windows 2000… • Ipconfig/all Riad S. Twal

  45. Windows 2000… • Ipconfig – IUB VPN Riad S. Twal

  46. Windows XP • Ipconfig Riad S. Twal

More Related