by Limoncelli, Hogan, & Chalup

Slides:



Advertisements
Similar presentations
Networking Some of the basics. What is a Network Simply put, its two or more computer connected together through a communication medium. A communication.
Advertisements

IST346: Workstations. Agenda  Look at the computer from the administration viewpoint.  Discuss common workstation operating systems  Discuss computer.
Chapter 14: Troubleshooting and Problem Resolution.
NetComm Wireless Logging Architecture Feature Spotlight.
Wireless and Switch Security NETS David Mitchell.
Installing SAS 9.3 Raymond R. Balise Health Research and Policy.
Installing SAS 9.3 Raymond R. Balise Health Research and Policy.
Principles of Information Technology
The StarNet Analyzer. Contact SNA Department x172
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
A Guide to major network components
Chapter 27 Q and A Victor Norman IS333 Spring 2015.
Computer Networks IGCSE ICT Section 4.
TAX-AIDE Local Area Networking July, 2013.
Installing software on personal computer
Fundamentals of Networking Discovery 1, Chapter 9 Troubleshooting.
Bullet-Proofing Your Wireless Router By Steve Janss.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Networking Components Chad Benedict – LTEC
Technical Training: DIR-615
IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
Troubleshooting Computers in the FHC. Hardware Issues Computer will not turn on – Check power cable – Check power strip Computer is on, but screen is.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Q and A for Ch. 17 CS 332, Spring Fiber Modems Q: Why use fiber modem extensions? Is it to save money on not having to use as much fiber (otherwise.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Chapter 7 - Networks CPTE 433 John Beckett. OSI Model 7 Application – SNMP, HTTP, FTP, etc. 6 Presentation – Data formats, encoding, encryption 5 Session.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
COEN 252 Computer Forensics
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Common Devices Used In Computer Networks
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
HUB Connects multiple workstations, servers, and other devices to a network. Can be used to connect two or more computers to one network port. Handles.
Chapter 4 Initial Configuration Tasks. Understanding the Initial Configuration Tasks window Microsoft now provides a new feature, the Initial Configuration.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Chapter 12 Troubleshooting Internet Connectivity Prepared by: Khurram N. Shamsi.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Climb Out of the Hole CPTE 433 Chapter 2 Adapted by John Beckett from The Practice of System & Network Administration by Limoncelli, Hogan, & Chalup.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
9: Troubleshooting Your Network
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Open Solutions for a Changing World™ Copyright 2005, Data Access Worldwide June 6-9, 2005 Key Biscayne, Florida 1 Application Deployment Stephen W. Meeley.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Linux Operations and Administration
NETWORKS (2) Mr Conti Lesson 2. Learning Objectives  By the end of this presentation we will have learned:  what a network is  the advantages and disadvantages.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
WLAN(stands for wireless LANs)
Local Area Networks Yiannos Mylonas.
10 – Workstation Fleet Logistics
Introduction to Computers
Networking for Home and Small Businesses – Chapter 2
Networking for Home and Small Businesses – Chapter 2
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Network hardening Chapter 14.
IST346: Workstations & Clients
The Troubleshooting theory
Principles of Information Technology
Presentation transcript:

by Limoncelli, Hogan, & Chalup Workstations CPTE 433 Chapter 3 Adapted by John Beckett from The Practice of System & Network Administration by Limoncelli, Hogan, & Chalup

Define “Workstation” Used by a single individual Or perhaps a kiosk used by a single individual at a time A lab computer is a form of kiosk May be remotely used (yours, for example) There are many deployed It is to our advantage to have them identical Easier to manage Need a carefully-defined life cycle

Managing Operating Systems Three Tasks Loading the system software and applications Updating the system software and applications Configuring network parameters Automating these procedures is the key!

Evard’s Life Cycle of a Machine New Rebuild Build Update Entropy Initialize Configured Unknown Clean Debug Only useful state Retire Figure 3.1 Off

Lessons from Evard Identifiable states and transitions exist. The computer is usable only in the configured state. Negative state changes happen by themselves. CSA effort is required to make positive state changes. Automating positive state changes helps.

What is a “First Class Citizen?” A device that receives full support. Other devices may get: Networking support Limited-time support “Best-effort” (ie, left-over time)

Why “promote” an undesired device or configuration? It is politically necessary to tolerate it. Botched installation/configuration by users is creating problems. Perhaps it is something you ought to learn to like!

Questions For Vendors How are SA processes automated in your product line? What is the deployment cost? This must be added to what we have to pay you, so it affects your competitive position.

Why Not Hand-Load Software? Mistakes. It simply doesn’t work right because someone got something wrong. Non-uniformity. Each difference means we might have difficulty tracking down yet a different problem.

Is Your System Automated? “You just run this little script after the download…” Duh…that means somebody has to: Wait until the download completes Notice the download has completed Run the script Wait for the script to complete Note that the script completed correctly

E.T. Call Home The final step in a deployment script should be to send an email to the perpetrator giving… Which machine this is What script was run Status details as of completion

How Do You Get There From Here? Document manual steps carefully Package steps in a script Proof the script Consider possible variations it might encounter Comment the script This takes time …but if you’re doing the same thing a lot, it saves time

Partial Automation Document the process. Make notes on the documentation. Watch for opportunities to turn… a documented procedure into an automated procedure

Vendor Installations You don’t know what’s really in there. They may change their “standard” installation without telling you. You don’t know if you can replace it. Do you even have all the pieces (drivers especially?) If you didn’t install it and the vendor didn’t install it from your images, you don’t know what is there!

Update - Host is in a usable state You are changing the status from “configured” to “unknown” and then back. That’s two transitions, not one!

Update – The host is in an office Ideally you can do the update from your desk. In the case of heavy network traffic needed, you might wish to have a special room where hosts to be updated can be taken so that their traffic is isolated.

Update – No physical access Physical visits cost time and money. A visit might not work because: The person might not be there. The person might be in the middle of an important task. The whole office might be locked. Updates should be possible from wherever you are.

Updates – The host is already in use This is no time to do something that will mess it up! Have a backup plan in case of disaster.

Updates – The host may not be in a “known state.” Automation must be done more carefully than at initial load time. This is a good reason for “unknown” to be considered the same as “new”.

Updates in a 24x7 age The host may have “live” users Can’t be taken down while they’re on. SMS can hold updates until a user logs off. Bell Labs has an Auto Patch system for the same purpose. The host may be gone, e.g. laptop. The host may be dual-boot.

Patch Propagation A patch can actually create problems. So stage it: One machine. A few more – perhaps other SAs. Many. Save the automated update for the “many” stage.

What About Stop-Gaps? You have a need that isn’t on the standard load You implement the change Put it into a ticket!

Rogue DHCP Servers Router connected backwards “I was just trying LINUX” And he loaded “everything” (and activated it.) Internet Connection Sharing Example: Southern Village. Second NIC in a student’s computer is used to connect to cable modem. He wishes to share the bandwidth with a friend in Talge.

Symptoms of a Rogue As machines are rebooted, they act strangely and sometimes don’t get an IP address. DHCP renewal often takes a surprisingly long time. Refreshed Ethernet links get strange addresses (which may or may not “work”).

Tracing a Rogue Collect all information you can. From a computer getting a bad IP address: What IP address were they getting? (192.168.0.x may mean “D-link router”). What is the IP address of the DHCP server? From another LINUX machine, use arp –a And “grep” for the IP address to pick up the MAC address. Temporarily turn off your DHCP server and refresh a workstation

“Sharing” Computer 1 has a wireless Connection to the building’s Network so they can get through your firewall. That connection is shared so others can have the same privilege. Sharing means the other NIC is now functioning as a DHCP server! Now other machines in your network may be receiving DHCP from this computer! Computer 1 Wireless (shared) Wired 192.168.0.1 Hub or Switch

Another way to share Use Bridged sharing Connects your network with whatever network they’ve connected to Connects the DHCP server on the wireless network they are “sharing”, with your workstations So the rogue DHCP server is actually not in your building!

What Good is a MAC address? It may be in your database. The machine has been “upgraded” to a new one and somebody tried something with the old box. You can look up the Ethernet vendor to see what brand it is – narrowing down the field. Intelligent switches can be queried as to the physical location of a specific MAC. But remember, a MAC address can be changed or even spoofed.