2000 Copyrights, Danielle S. Lahmani UNIX Tools G22.2245-001, Fall 2000 Danielle S. Lahmani Lecture 10.

Slides:



Advertisements
Similar presentations
6 UNIX Network Utilities Mauro Jaskelioff. Introduction Overview of computer networks Network related utilities –Accessing a remote computer –Transferring.
Advertisements

Network Layer and Transport Layer.
Chapter 2 Network Models.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Socket Programming.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 11.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
1 Introduction to TCP/IP. 2 Agenda What Is TCP/IP? IP Addressing.
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
CS 356 Systems Security Spring Dr. Indrajit Ray
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How TCP/IP Works INTRO v2.0—4-1.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
NETWORKING CONCEPTS. TCP/IP The TCPIIP protocol suite was developed prior to the OSI model TCP/IP protocol suite was defined as having four layers: Host-to-network,
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Workshop 1: Introduction to TCP/IP
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Chapter 9.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
Huda AL_Omairl - Network 71 Protocols and Network Software.
TCP/IP and the Internet ARPANET (1969) –R&D network funded by DARPA. –Packet Switching Survive nuclear war. –Experimental to operational (1975). –Not suitable.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Chapter 9 Networking Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, Original Notes by Raj Sunderraman.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Data Communications and Networks
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
Introduction to TCP/IP. Agenda What Is TCP/IP? IP Addressing.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
TCP/IP PROTOCOL UNIT 6. Overview of TCP/IP Application FTP, Telnet, SMTP, HTTP.. Presentation Session TransportHost-to-HostTCP, UDP NetworkInternetIP,
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Lecture 6: TCP/IP Networking By: Adal Alashban
Process-to-Process Delivery:
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 10

2000 Copyrights, Danielle S. Lahmani UNIX Networking UNIS was one of the first OS to provide access to widely distributed local networks as well as Internet networks. 1990's: huge explosion in the use of UNIX networks, because of UNIX networking capabilities using a client- server paradigm.

2000 Copyrights, Danielle S. Lahmani UNIX Networking Designed to allow different computers to communicate easily. provided ranges of communication and networking capabilities: –electronic mail –file transfer –logging in on remote system –remote execution of cmds –file sharing

2000 Copyrights, Danielle S. Lahmani Networking Terminology A computer network is a communication system for connecting end-systems. A host is a name used to refer to an end-system: –can range in size –dedicated such as a file or print servers –or general purpose time-sharing systems

2000 Copyrights, Danielle S. Lahmani Types of networks LAN: Local Area Network connects computer systems that are close together (single- building or a few kilometers apart) WAN: Wide Area Network connects computers in different cities or countries (referred sometimes as Long Haul Network) Internet or Internetworking is the connection of two or more networks so that computers on one network are able to communicate with computers on another network.

2000 Copyrights, Danielle S. Lahmani Local Area Networks popular technologies: token ring or Ethernet –Ethernet standard: sending a message using a broadcast mechanism with possibility of a collision. LANs operate at high speeds: –10Mbps (million bits per second) using Ethernet –100 Mbps using FDDI (Fiber Distributed Data Interface )

2000 Copyrights, Danielle S. Lahmani Network Definition Different entities in an internet must agree on: –Protocols to communicate, (e.g., TCP/IP protocol suite.) –Addressing scheme –Naming scheme –Routine scheme

2000 Copyrights, Danielle S. Lahmani OSI Model protocols are often complex and are designed in layers The OSI Reference Model: –Application –Presentation –Session –Transport –Network –Data Link –Physical

2000 Copyrights, Danielle S. Lahmani UNIX UUCP serial-line based or dial-up networking older than TCP/IP point to point communication: store and forward type networking for many years, primary means of networking in UNIX provides basic networking utilities

2000 Copyrights, Danielle S. Lahmani UUCP Usage Today viewed as second class alternative to the Internet:batch mode usage not adequate for high-speed networking UUCP connections are non-interactive not available on many OS: –therefore, cannot be used in heterogeneous environment

2000 Copyrights, Danielle S. Lahmani Unix TCP/IP Internet Package is ethernet-based, supports high-speed connections bundled with BSD UNIX since 1982 TCP is the Transmission Control Protocol and IP is the Internet Protocol

2000 Copyrights, Danielle S. Lahmani TCP/IP Protocol Suite IP networks are packet-switched high-speed IP networking offers interactive connections between remote hosts implemented on different platforms and OS: used in heterogenous environments networking based on TCP/IP is the basis for the Internet

2000 Copyrights, Danielle S. Lahmani TCP/IP TCP is a connection-oriented protocol that provides a reliable, full-duplexed byte-stream for a user process. IP is the internet protocol that provides the packet delivery service for TCP, UDP or ICMP. It provides a connection-less and unreliable delivery system. IP datagrams contain source and destination addresses. Each can be routed and delivered independently.

2000 Copyrights, Danielle S. Lahmani Internet Addresses using IP 32 bits IP addresses encode the network ID and the Host ID. The Host ID is relative to the Network ID. Every host on a network must have a unique ID assigned by a central authority internet addresses are written as four decimal numbers, separated by decimal points –example: spunky –These addresses are being extended to 128 bits quantities in IPv6 standard.

2000 Copyrights, Danielle S. Lahmani IP Naming correlation can be assigned between a host name and an IP address. Mapping is kept in a file called /etc/hosts on local host.

2000 Copyrights, Danielle S. Lahmani UNIX TCP/IP Internet Package establishes TCP/IP networking provides set of user-level commands for networking tasks –DARPA commands –Berkeley Remote commands (aka as r* commands) Unix System to Unix System commands

2000 Copyrights, Danielle S. Lahmani The r* commands rcp :remote copy: allows you to copy files between your local UNIX host and another remote UNIX host scp: secure remote copy rlogin: allows you to login on a remote UNIX host rsh: allows you to execute a command on a remote UNIX host. Security issue ssh: secure shell client (remote login program ) –provides secure encrypted communications between two untrusted hosts over an insecure network.

2000 Copyrights, Danielle S. Lahmani Security Issues with r* commands host equivalence: based on the idea that if the user has been authenticated on one trusted computer (host), then there is no reason to reauthenticate the user on a second computer. host equivalence: extended through use of.rhost,.netrc and /etc/hosts.equiv files. –host level security: /etc/host.equiv –user level security:.rhosts file

2000 Copyrights, Danielle S. Lahmani Security Pitfalls of the r* cmds An ordinary user can create a file.rhost in her $HOME directory and extend host equivalence to herself when accessing the computer without any intervention from a system administrator. In Sun systems, the r* commands have been modified to run on top of ssh (secure shell) which requires a password and ignores.rhosts equivalence.

2000 Copyrights, Danielle S. Lahmani DARPA commands ftp: (file transfer protocol) allows you to copy files between your local UNIX host and any other host (possibly non-UNIX) that support the ftp protocol. telnet: allows you to execute on any remote host that has a telnet server.

2000 Copyrights, Danielle S. Lahmani Obtaining Information about other users and hosts rwho : finger: get information on a particular user on any machine in your network ruptime: to get status of all machines on the network ping: to check if remote machine is up

2000 Copyrights, Danielle S. Lahmani The Client/Server Model Server is a process that is waiting to be contacted by a client process so that server can do something for the client. –Server is started, sleeps waiting for a service request from a client –Client processes started on same system or another system within a network. –Client process sends a request across the network to the server requesting service of some form.

2000 Copyrights, Danielle S. Lahmani Unix Client/Server Model Implemented using sockets. One process, a server, creates a socket whose name is known by other client processes Client first creates an unnamed socket and then requests that it be connected to the server's named socket. Successful connection returns one file descriptor to the client and another one to the server, both of which may be used for reading and writing.