Download presentation
Presentation is loading. Please wait.
Published byNickolas McDaniel Modified over 9 years ago
1
CSCI 6345 Computer Networks Dr. John P. Abraham, Professor
2
My Teaching Assistant Mr. Long Lu Long.lu01@utrgv.edu Long.lu01@utrgv.edu
3
Textbook Required Textbook: Comer, Douglas E., Computer Networks and Internets, 6 th Edition, Prentice Hall, 2015. ISBN-10: 0133587932 (ISBN-13: 978- 0133587937)
4
Website used All assignments and study questions will be posted at http://faculty.utpa.edu/jabraham/schcurrent.ht m http://faculty.utpa.edu/jabraham/schcurrent.ht m My TA may choose to use Blackboard
5
Multiple choice questions Many of the multiple choice questions will be taken from Behrouz A. Forouzan, TCP/IP Protocol Suite, 4th Ed., McGraw Hill, 2010. ISBN 978-0-07- 337604-2 I will post the multiple choice questions.
6
Attendance Attendance and class participation is required to pass the course. If you must miss an exam, make prior arrangements. No make-up exams will be given unless you contact me in advance! Late homework will be levied heavy penalties. Penalty: One day late 10%, 1 week late 20%, 2 weeks late 50%. Not accepted afterwards.
7
Grading Midterm and Final Exams 60% Group Project 15% Labs, programming & student Ass 25%
8
Practical portion (lab) Virtual Machine Peer to Peer RDP Domain Netadmin Join the domain Create Security groups Grant local Admin rights Packet analyzer WSUS Backup Catchup
9
Group Project Individually each person should complete the task assigned. We do not have enough time to present for such a large class. Therefore, you will be placed in a group for presentation purposes. Meet as a group to discuss what each person will present.
10
Group Project 1 Internetworking with Linux and Windows Install Linux and Windows Server in two different computers. Authentication should be through the use of Windows Active Directory. Share files between the two. Samba provides integration between Windows and Linux.
11
Group Project 2 Router setup using CISCO IOS and creating Virtual Local Area Networks. Set up a CISCO router using IOS. There are home-Cisco router that do not come with IOS; please do not use those. Make sure you can browse the internet and share files.
12
Group Project 3 Cyber Security and Forensics Using Backtrack show how forensic analysis is conducted. Using readily available programs in the internet show how a malware can be planted and show how an attacker then can take control of the system
13
Group Project 4 Microsoft System monitoring and management Demonstrate Task Manager and show what you can do with each of the tabs (Applications, Processes, Services, Performance, Networking and Users) Demonstrate the use of Regedit and show how you can search and delete items that cause problems. Demonstrate the use of MSconfig and show you can modify each of those. Demonstrate the use of computer management and explain the use of System tools (task scheduler, event viewer – please spend considerable time here, local users and groups and device manager), disk management and services and application management. There may be some overlap with item #1 here.
14
Group Project 5 WINDOWS SERVER GROUP POLICY Demonstrate how to administer group policies. Group policy administrative tools include Group Policy Editor for Active Directory and Sysvol, server side snap-ins, Group Policy Management Console, Resultant Set of Policy. Explain these and show examples of using each. Write some group policies for internet search sites, new program installation, etc. and demo them.
15
Group Project 6 VPN Communication Servers Check the syllabus for more information
16
Programming portion Please refer to syllabus
17
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS
18
What is covered in the course Lecture Portion Network Applications & Network programming Data communications (low level details) Packet switching and network technologies Internetworking with TCP/IP Other concepts such as interoperability standards, protocol suites and layering models Practical portion Virtual Machine networking
19
Lecture material Your textbook is a very basic book Since network is constantly evolving I will provide lots of notes from outside the textbook. You should take good notes. Exam questions will come from both. I will point you to a set of multiple choice questions and answers. I will take majority of questions from that site.
20
Socket programming All underlying network applications such as email, ftp, web, etc. use underlying technologies and programs The goal of this course is not to teach you programming. Students should write three socket programs in a language of their choice
21
Data Communication Technologies used to send data across communication lines Modulation Digital to analog Light Multiplexing Encryption
22
Packet Switching and networking technologies Evolved from telegraph and telephone technologies Mechanical connections are replaced with electronic switches Packet switching – eliminated the need for a dedicated circuit Devices through out the network should have information about how to reach the target destination Takes into account speed, cost, distance and size of packets
23
Internetworking with TCP/IP Tolerance of heterogeneity of underlying technologies. The internet is formed by interconncecting multiple packet-switching networks, as well as public and private networks.
24
Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. Introduction to Computer Networks
25
LAN, MAN & WAN Introduction to Computer Networks Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network) Network in a City is call MAN (Metropolitan Area Network) Network spread geographically (Country or across Globe) is called WAN (Wide Area Network)
26
Computer network architectures the client server all communication happens between the server and the client only. A client does not communicate directly with another client. If a client wishes to share a file with another client, it must place the file in a commonly shared area at the server. In case of an application, the client makes the request and the server processes the request and returns the result to the client. the peer-to-peer any node can act as a server as well as a client. Only very limited security is available on a peer-to-peer network.
27
Components used in a Computer Network Computers Communication ports Cables Hubs or switches Routers The network software.
28
Computers in a Client/Server architecture Must be be robust must be able to run for months or years without being shut down. Must be fast enough to handle many requests from all the requests from the clients. Must have large fast hard drives to store information for all users. Must have enough memory to cache all the directory information as well as most used pages. The computers must be reliable in case of power failures and hardware failures: sufficient redundancy must exist.
29
Example of Types of Servers Fileserver print server database server domain name server communication server DHCP server Name Server
30
Communication ports Network may be done through any communication ports such as serial, parallel, network cards, etc. Most common Network Cards used today are Ethernet and Token Ring.
31
Network Interface Card Plug and play (PNP). Open the computer, install the card, and insert the driver disk. Legacy cards: the interrupt request line (IRQ), base memory address, and the base I/O port must be manually set up on the card by setting the jumpers or DIP switches, or through the use of the manufacturer provided setup software. Speed: 10 Megabits per second (Mbps), 100 Mbps (Fast Ethernet) or 1000 Mbps (Gigabit Ethernet) depending on the card.
32
Connectors on NIC The connector on most Ethernet cards today is the RJ- 45 having 8 pins. Older Ethernet cards may have a Bayonet Nut Connector (BNC), an Attachment Unit Interface (AUI), and/or a RJ-45 connector. A jumper or switch will specify the type of connector used.
33
Network Addresses Every computer connected to a network should have two unique identifying numbers, a physical address and an Internet Protocol (IP) address. The physical address a 6 Byte number, is encoded on a ROM chip on the Ethernet card at the time of manufacturing the IP address A 4 byte address is used to send messages to the outside world. The physical address. configured on each machine.
34
Hub/Switch A Hub or switch connects cables from different nodes together. When purchasing them the number of ports required and the speed of transmission must be specified. An active hub amplifies all signals received and sends the amplified signals on all its ports. Passive hubs are signal splitters and are used only in wiring panels. Even though a little more expensive, a switch will provide faster communication and great deal of diagnostic features. Switches provide link management through physical address identification.
35
Hubs/Switches As the network grows, multiple switches or hubs can be connected with each other using an uplink port or a direct connect cable. Most modern switches have the auto-sensing feature, which will allow any port to work as an uplink. The best location for a switch or hub is a centrally located closet to which cables from all computers are brought.
36
Network Cabling Cabling is the most time consuming part of networking, particularly when cables need to be hidden inside the walls. For that reason it is advisable to have the cables installed or conduits placed at the time of the building construction. To hide wires inside existing buildings, a tape fish will be needed. It may be well worth the time to investigate the wireless technology, particularly when a small area is being networked.
37
Network cabling 2 Three types of cables are used today: coaxial, twisted pair, and fiber- optic. Twisted pair cables either can be unshielded or shielded with a foil. Unshielded twisted pair (UTP) cable can transmit 10 Megabits per second and the shielded can transmit more than 100 Mbps, perhaps all the way up to 1000 Mbps. Wires in each pair are twisted to reduce cross-talk and minimize the effect of external electromagnetic interference. Twisted pair cables are categorized into five categories, from Cat 1 to Cat 5, based on the bandwidth capabilities. The maximum length of a segment is 100 meters.
38
Network Cabling 3 The UTP cable has 4 pairs of color-coded (orange, green, blue and brown) wires. The color of one of the wires in a pair will be solid and the other will be striped with white. Pins in the RJ-45 jack are numbered from 1 to 8. When two computers are connected directly without the use of a hub or a switch some wires need to be crossed (Transmit to Receive). Such a cable is called a crossover cable. Crossover cables need to be used when two hubs or switches that lack uplink ports are connected together.
39
T-568A Straight-Through Ethernet Cable
40
T-568B Straight-Through Ethernet Cable
41
RJ-45 Crossover Ethernet Cable
42
Crossover cable
43
Network Protocols 7 layer OSI model 5 layer TCP/IP suite There exists three TCP/IP network environment today, Novell Networking, Microsoft Windows Networking, and the UNIX/LINUX networking.
44
Network Operating Systems The Novell Networking incorporates its original IPX/SPX protocol suite as well as the TCP/IP protocol suite. Windows and Unix operating systems include TCP/IP networking as part of their operating system. All versions of Windows provide the peer-to-peer networking capabilities, while the NT, 2000 professional, and the XP professional provide for Client/Server architecture. The UNIX/LINUX has consistently adhered to the Client/Server architecture.
45
Windows peer-to-peer networking may use the TCP/IP protocol suite or some other simpler protocols such as the NetBIOS and the NetBEUI. The NetBIOS, an application program interface (API) extends the BIOS to include the support for I/O calls over a network. The NetBIOS Extnded User Interface (NetBEUI), developed by IBM and Microsoft, is the protocol used by Windows Workgroup networking.
46
Windows peer-to-peer networking NetBios is non-routable, therefore could not reach beyond the local physical network. It does not require an IP address, rather works with the name registration within a workgroup. In the newer Windows operating systems, the NetBEUI is encapsulated inside the TCP/IP, referred to as NetBIOS over TCP/IP (NBT), and uses the IP address.
47
Configuring the windows network From the control panel’s, local area network, add a NIC if it does not show up already. Insert the appropriate driver software. Next Choose the protocols to be bound to the network card, NetBios, TCP/IP, IPX/SPX, Appletalk, etc. Set up the properties for the protocol you chose. For example, for the TCP/IP, you will asked to either obtain the addresses automatically or type in the IP Address, mask, default gateway, and DNS. The default gateway is the address of the host through which internetworks can be reached (a router or a computer that shares Internet). DNS is the server that provides the IP address given a domain name. Install the client services and give your computer a name and a group. Finally, you may want to share your resources.
48
Applications of Networks Introduction to Computer Networks Resource Sharing Hardware (computing resources, disks, printers) Software (application software) Information Sharing Easy accessibility from anywhere (files, databases) Search Capability (WWW) Communication Email Message broadcast See next slide
49
Application of network 2 Remote computing Virtualization (see future slides) Supercomputing - used for highly calculation-intensive tasks in quantum physics, genetics, weather modeling, etc. Distributed processing – A program running on top of a network that distributes the job. GRID Computing – very similar to distributed. A middleware is used to manage all the computers in the system (see next slide). Cloud computing (see future slide)
50
Grid computing Multiple independent computing clusters which act like a “grid” because they are composed of resource nodes not located within a single administrative domain. Offering online computation or storage (like electricity sale). The creation of a “virtual supercomputer” by using spare computing resources within an organization
51
Virtualization the act of decoupling one computing resource from others without impacting the usability across these resources. User state virtualization Application virtualization. Client-Hosted Desktop virtualization Server-based Desktop virtualization Application Virtualization
52
User state virtualization. separates the user data and settings from any PC and enables IT to store them centrally (i.e., in the datacenter) while also making them accessible on any PC. It also simplifies the central backup of user data since data is already stored centrally on servers. http://technet.microsoft.com/en- us/windows/ff629664 http://technet.microsoft.com/en- us/windows/ff629664
53
Application virtualization Only need to install once. Can run it from any machine. Isolates applications from each other and solves application to application compatibility issues by allowing applications to run together even though they may require the same resources from the OS Application virtualization allows IT to store the application centrally and stream the application to a desktop based on user access. http://www.youtube.com/watch?v=kSa9VBYyyk4 http://www.installfree.com/beta-signup
54
Client-Hosted Desktop Virtualization. technology (such as Microsoft® Virtual PC or Sun xVM Virtual Box ) that separates the operating system from the physical hardware and allows a single PC to run virtual machines side by side with the host OS. http://www.microsoft.com/virtualization/assets /media/chv/local/index.htm http://www.microsoft.com/virtualization/assets /media/chv/local/index.htm http://www.youtube.com/watch?v=0Y2eClEy7 jU http://www.youtube.com/watch?v=0Y2eClEy7 jU
55
Server-Based Desktop Virtualization: Allows the execution of an environment at one place and presentation of that environment or user interface at a different location. These technologies usually use remote desktop protocols, such as RDP, to decouple the user interface location from the execution environment location. Remote execution enables organizations to use older PCs as “thin clients,” giving users the benefit of newer applications and versions of Windows while helping save the environment by avoiding the dumping of electronics into landfills. http://www.cio.com/article/504348/Desktop_Virtualizati on_5_Most_Popular_Flavors_Explained http://www.cio.com/article/504348/Desktop_Virtualizati on_5_Most_Popular_Flavors_Explained
56
Cloud Computing is location independent computing shared servers provide resources, software, and data to computers. computing is moved away from personal computers or an individual application server to a “cloud” of computers. Users of the cloud only need to be concerned with the computing service being asked for, as the underlying details of how it is achieved are hidden. This method of distributed computing is done through pooling all computer resources together and being managed by software rather than a human. http://www.microsoft.com/en-us/server-cloud/new.aspx
57
Network Topology The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions. Introduction to Computer Networks
58
Bus Topology Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable. Introduction to Computer Networks
59
Star & Tree Topology Introduction to Computer Networks The star topology is the most commonly used architecture in Ethernet LANs. When installed, the star topology resembles spokes in a bicycle wheel. Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host.
60
Ring Topology Introduction to Computer Networks A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. The frame then continues around the ring until it finds the destination node, which takes the data out of the frame. Single ring – All the devices on the network share a single cable Dual ring – The dual ring topology allows data to be sent in both directions.
61
Mesh Topology The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult. Introduction to Computer Networks
62
Applications E-mail Searchable Data (Web Sites) E-Commerce News Groups Internet Telephony (VoIP) Video Conferencing Chat Groups Instant Messengers Internet Radio Introduction to Computer Networks
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.