Linux OS Concepts

Download Report

Transcript Linux OS Concepts

Basic Networking and Exchange Server

Softsmith Infotech

Overview of Basic Networking

• Basics of Network, Types of Computer Network, Components of computer Network • OSI Model • Network Connecting Devices • IP Address • Protocols Softsmith Infotech

Basic of Network

• Network definition – A network is an interconnection of two or more devices in order to enable transfer of data or information from one place to another Softsmith Infotech

Advantage and Disadvantage of Network

• Advantages – Sharing of Software and Hardware resources – Central storage and Data security – Easier and faster sharing of information • Disadvantages – Costly Hardware and Software – Need for an administrator to take care of the network Softsmith Infotech

Types of Computer Network

Computer Networks:

• LAN – A Network consisting of two or more computers that are interconnected by means of cable in a single location is called as Local Area Network.

• Types of LAN – Peer to Peer • This is an example of simple network where two or more computers are directly connected to each other and share resources. There is no central control over the network. Peer networks are organized into workgroups.

Softsmith Infotech Contd…

– Server Based Network • In this type of network, there is a main computer called as the SERVER that controls the network and provides central storage space for information. The other computers that are connected to the Server are called as CLIENTS, or WORKSTATIONS – Hybrid Network • These types of network are a combination of both peer to peer and SERVER network Contd… Softsmith Infotech

• Wide Area Network – A network of computers that are interconnected over a large area is called Wide Area Network. The computers are connected by means of Cables, Telephone lines, Satellites or Radio transceivers.

i.e. Internet • Metropolitan Area Network – A network of computers that are interconnected within a specific geographical area like university campus or a city is called as Metropolitan Area Network or Campus Area Network Softsmith Infotech

Network Connecting Devices

Network connecting devices are • • Hubs • Switches • Routers • Ethernet Card • Cables & Connectors – Hubs Hubs amplify signals and split them so that the signals reach their destinations. Hubs available configurations are 4 /8/ 16/ 32 for connection 4 /8/ 16/ 32 computers respectively. Hubs is isolated device now.

Contd… Softsmith Infotech

• Switches – These are the connecting points in a network where UTP and STP cables are used. Switches amplify signals and split them so that the signals reach their destination – The main differences between hubs and switches is that hubs transmit signals to all ports that are attached, whereas, switches send the signal directly to the destination MAC address. Switches also work in full-duplex mode where the signals can be transmitted and received between the switch and the computer simultaneously – Switches are available in configuration of 8/ 16/ 24/ 32 ports for connecting computers • Routers – A Router is a combination of hardware and software. The hardware may be a server or a separate routing device and the software consists of the network operating system and the routing protocol. Routers work at the network layer of the OSI model. Contd… Softsmith Infotech

– Routers use the network address to select the appropriate destination for signals.

– They are more intelligent than other devices because they have special instructions to determine the quickest path to send a packet to a network – TCP/IP, NWLink, IPX are the popular routable protocols used in an internetwork.

– RIPv1, RIPv2, OSPF, IGRP, EIGRP are the Network Operating System protocols used to communicate from one place to another place • Ethernet Card – An Ethernet card is one kind of network adapter. These adapters support the Ethernet (Network) standard for high-speed network connections via cables. Ethernet cards are sometimes called as network interface card (NIC).

Softsmith Infotech

Ethernet Cables and Connector

Category

CAT 1 CAT 2 CAT 3 CAT 4 CAT 5 CAT 5e CAT 6 CAT 6e

Data Transfer Speed

4MBPS 4MBPS 16MBPS 20MBPS 100MBPS 1000MBPS 1GBPS 10GBPS

No. of Wires

Two Two Four Four Four Four Four Four

Connector

RJ11 RJ11 RJ45 RJ45 RJ45 RJ45 RJ45 RJ45

Application

Voice Communication Voice Communication Computer Network Computer Network Computer Network Computer Network Computer Network Computer Network Softsmith Infotech

IP Address

• IP Address – Internet Protocol (IP) address is a numerical identification and logical address that is assigned to devices participating in a computer utilizing the Internet Protocol for communication between its nodes – Two types of IP protocol versions are IPv4 and IPv6

Ex. IPv4 – 192.168.1.0 & IPv6 - 2001:db8:0:1234:0:567:1:1 Class

A B C D

Start

0.0.0.0

128.0.0.0

192.0.0.0

224.0.0.0

End

127.255.255.255

191.255.255.255

223.255.255.255

239.255.255.255

Suffix

/8 /16 /24 /4

Default Subnet

255.0.0.0

255.255.0.0

255.255.255.0

Not defined Contd… Softsmith Infotech

• Private IP Address – Private IP addresses are typically used on local networks i.e. home, school and business LANs including airports and hotels.

– Devices with private IP addresses cannot connect directly to the Internet. – Computers outside the local network cannot connect directly to a device with a private IP.

Class

A B C

Address Range

10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255

Subnet

255.0.0.0

255.255.0.0

255.255.255.0

Maximum Hosts

1,67,77,216 10,48,576 65,536 Softsmith Infotech

Common Protocols and Ports

Name HTTP HTTPS FTP SSH Telnet DNS DHCP POP3 SMTP LDAP SNMP Description Hyper Text Transfer protocol Hyper Text Transfer protocol Secure File Transfer protocol Secure Shell Terminal port Domain Naming Server Dynamic Host Configuration protocol Post Office protocol Simple Mail Transfer protocol Light Weight Directory Access protocol Simple Network Management protocol Softsmith Infotech Port 80 443 20, 21 22 23 53 67, 68 110 25 389 161, 162

DNS – Domain Name Server

• A system for converting host names and domain names into IP addresses on the Internet or on local networks that use the TCP/IP protocol DNS Possible Zones include: – Forward lookup zone - Name to IP address map. – Reverse lookup zone - IP address to name map. – Standard primary zone (primary zone) - A master copy of a forward or reverse lookup zone. – Active Directory integrated zone - A copy of a standard primary or Active Directory integrated zone. The IP address and computer name is stored in Active Directory and replicated to all local domain controllers. DNS information is not replicated to domain controllers outside the domain.

Softsmith Infotech

Common DNS Records

• AAAA Host resource record for IPv6 protocol • A - Address record allowing a computer name to be translated into an IP address. Each computer must have this record for its IP address to be located. These names are not assigned for clients that have dynamically assigned IP addresses, but are a must for locating servers with static IP addresses.

• CNAME - Canonical name allowing additional names or aliases to be used to locate a computer • MX - Mail Exchange server record. There may be several • MG - Mail group resource record. • MINFO - Mailbox mail list information resource record • ATMA - Asynchronous Transfer Mode resource record Softsmith Infotech

Authentication

• An authentication factor is a piece of information used to authenticate or verify a person's identity on appearance or in a procedure for security purposes and with respect to individually granted access rights • Authentication protocols are PAP, SPAP, CHAP, MS CHAP and EAP. NTLMV3, Kerberous Softsmith Infotech

Firewall

• A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Contd… Softsmith Infotech

• Firewall techniques: – Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. – Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. – Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. – Proxy server: intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. Softsmith Infotech

Proxy

• In computer networks, a proxy server is a server (a computer system or an application program) that acts as a go-between for requests from clients seeking resources from other servers. • A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. • Mainly Proxy server used for following purposes, – To keep machines behind it anonymous (mainly for security). – To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server or internet server.

Softsmith Infotech

Microsoft Exchange Server

Microsoft Exchange Server is a messaging and collaboration server for integrated messaging and data storage. – Exchange Server features include calendaring, contact management, e-mail, and instant messaging. – Exchange Server can store applications, documents, and Web content and make them accessible via Internet protocols like HTTP and NNTP • Prerequisites to Install Exchange Server – Active Directory Services – IIS – Internet Information Services – SMTP Service – Messaging Queuing Service – NNTP – DNS – Domain Name Server Softsmith Infotech

Microsoft Exchange Services

• Services are – Microsoft Active directory connector – Microsoft Exchange event – Microsoft Exchange Imap4 – Microsoft Exchange information store – Microsoft Exchange mta stack – Microsoft Exchange pop3 – Microsoft Exchange smtp – Microsoft Exchange routing engine – Microsoft Exchange system attendant – Microsoft Exchange site replication services Softsmith Infotech