460 likes | 591 Views
W-220. Networking. Why create a network. Share limited resources Files Printers Scanner Communication Internet / Intranet Email WWW FTP. Types of networks. Peer to Peer (P2P) No centralized control High level of management for security Client / Server Centralized control
E N D
W-220 Networking
Why create a network • Share limited resources • Files • Printers • Scanner • Communication • Internet / Intranet • Email • WWW • FTP Riad S. Twal
Types of networks • Peer to Peer (P2P) • No centralized control • High level of management for security • Client / Server • Centralized control • Security easily managed Riad S. Twal
Practical concerns • Cable routing • Server location • Network switch location • Future expansion Riad S. Twal
Client Microsoft Netware Service File and Printer Sharing for Microsoft Networking QoS Packet Scheduler SAP Agent Protocol TCP/IP AppleTalk NetBEUI NWLink IPX/SPX How PC’s are organized… Riad S. Twal
How PC’s are organized… • Client log on • Directly to the machine • Common with WinNT, Win2000, WinXP • Usually for administrative access to the ‘box’ • Can be used for multiple users on one ‘box’ • Account on the ‘box’ (local machine) • Network log on • Network account, log on to the network • Common with WinNT, Win2000, WinXP • Used for ‘user’ access to the ‘box’ and the network • Account on the network (on the main server) Riad S. Twal
Protocols • TCP/IP - TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet") http://www.yale.edu/pclt/COMM/TCPIP.HTM • AppleTalk – protocol suite to implement file transfer, printer sharing, and mail service among Apple systems using the LocalTalk interface built into Apple hardware http://www.protocols.com/pbook/appletalk.htm • IPX/SPX - Internetwork Packet Exchange / Sequenced Packet Exchange, created for use with the Novell NetWare network operating system http://www.protocols.com/pbook/novel.htm Riad S. Twal
Resources… • Protocol Directory - http://www.protocols.com/protoc.shtml • Computer Networking http://compnetworking.about.com/cs/basicnetworking/ Riad S. Twal
Computer Security: • Process of preventing and detecting unauthorized use of your computer • Prevention measures help stop unauthorized users (aka "intruders") from accessing your computer system • Detection measures helps determine whether or not: • attempted to break into your system • if they were successful • what they may have done. Riad S. Twal
Why should I care? • Banking / investing • e-Mail • Class Rosters • Class Gradebook • Faculty memo’s Riad S. Twal
Why my computer? • Random intruders • Hackers looking for a system from which to launch an attack on another system • Direct Intruders • Someone looking for private information that you have • Credit card info • Banking info • Gradebooks • Faculty / staff / school district memo’s (not intended for student viewing) • Lesson plan files / course delivery material Riad S. Twal
How easy is it to break into my computer? • “Holes” in any security system are unavoidable (at least when humans are at the controls) • OS and Applications both have ‘Holes’ in security • “Patches” for OS and Applications are constantly being developed • They are available via the Windows Update website, or from the software manufacturers website (ie. Adobe, Macromedia,…) • ‘Patches’ do no good if they are not installed and updated. Riad S. Twal
Internet Technology • Broadband • Cable Modem • DSL • Narowband • Analog dialup modem Riad S. Twal
What does broadband mean? • "Broadband" is the general term used to refer to high-speed network connections. • DSL (Digital Subscriber Line) • Cable Modem • Ethernet connection • Generally anything over 1Mbps Riad S. Twal
What is DSL? • Digital Subscriber Line (DSL) • Dedicated bandwidth between your location and the Internet Service Provider (ISP) • No guarantee of bandwidth from provider to the rest of the Internet Riad S. Twal
What is cable modem? • A cable modem allows a single computer (or network of computers) to connect to the Internet via the cable TV network. • The cable modem usually has an Ethernet LAN connection to the computer, and is capable of speeds in excess of 5 Mbps • Typical speeds tend to be lower than the maximum • entire neighborhoods are turned into LANs which share the same bandwidth • shared-medium topology means that cable modem users may experience somewhat slower network access during periods of peak demand Riad S. Twal
Broadband vs. dial-up service • Dial-up Internet services • "dial-on-demand" service • your computer only connects to the Internet when it has something to send, such as email or a request to load a web page. Once there is no more data to be sent, or after a certain amount of idle time, the computer disconnects the call • modem IP addresses are dynamically assigned, your computer is usually assigned a different IP address on each call. • Broadband services • "always-on" services • There is no call setup when your computer has something to send. The computer is always on the network, ready to send or receive data through its network interface card (NIC). Since the connection is always up, your computer’s IP address will change less frequently (if at all), thus making it more of a fixed target for attack Riad S. Twal
How do I secure my computer? • When not in use, TURN IT OFF!!! • Someone walking by would have to turn it on before anything could be done • Secure the location • Best physical security is behind a dead-bolt • Secure the Network Connection • If you are not utilizing network resources, don’t be on the network Riad S. Twal
How do I secure my computer? • Secure the Network Connection • If you are utilizing network resources, don’t share unnecessary files • Sharing the “My Documents” folder automatically shares all sub-folders as well… • Use a Firewall to ‘hide’ your computer • Software • Hardware Riad S. Twal
Practical implications… • We are living in the information age. Information has power (like money use to have), and others will want to have access to that power. While cooperation and sharing is necessary, it is not necessary to share all information with everyone. Riad S. Twal
Resources… • NETg@IU Tutorials – • Networking Tech. Network Security • http://www.indiana.edu/~netg/ • CERT/CC – Carnegie Mellon University • http://www.cert.org/tech_tips/home_networks.html • Internet Security Alliance • http://www.isalliance.org/ Riad S. Twal
Controls to look for… • Machine identification • Network identification • NIC configuration • TCP/IP properties • DNS properties • File Sharing access Riad S. Twal
Windows 98 Start, Settings, Control Panel, Network Control Panel Or Right click on Network Neighborhood, Properties Windows 2000 Start, Settings, Network and Dial-up Connections, New Connections Or Right click on My Network Places, Properties Right click on My Computer, Properties for Network ID Where are the control panels … Riad S. Twal
Windows 98… • Clients, Adapters, and Protocols have their own icons • Primary Network Logon: • Client for Network • Machine • Sharing Riad S. Twal
Windows 98… • Computer name – machine name on the network • Workgroup – where the machine operates • Computer description – unique computer description, allows others to determine what might be shared by the machine Riad S. Twal
Windows 98… • Shared level access • High user maintenance • Individual passwords given to each share • User level access • Users granted access based upon participation in the network (users picked from a network list) Riad S. Twal
Windows 98… • Properties for Client for Microsoft Network • Determine which domain to log on to Riad S. Twal
Windows 98… • Properties for Ethernet Adapter • Advanced properties Riad S. Twal
Windows 98… • Properties for TCP/IP settings • DHCP vs. Static IP • DNS • WINS Riad S. Twal
Windows 2000… • Clients, Services, and Protocols have their own icons • NIC configuration • Sharing Riad S. Twal
Windows 2000… • NIC Advanced Properties • Device drivers… Riad S. Twal
Windows 2000… • TCP/IP Properties • This has been streamlined from the Win98 interface • Advanced tab ‘hides’ controls that were overwhelming in Win98 Riad S. Twal
Windows 2000… • IP, DNS, WINS, and Advanced Options • Win98 has these controls plus TCP/IP Bindings and other low level controls in one window (7 options in total) Riad S. Twal
Windows 2000 • The name of the computer is within the System Properties of Windows 2000. • Windows 98 has the computer name within the network control panel. Riad S. Twal
Windows 2000 • Computer name must be unique on the network • Workgroup • A workgroup is a logical collection of computers that share resources • Domain • Same as workgroup; however there is one single server responsible for managing security Riad S. Twal
Windows XP • Network Control Panel Riad S. Twal
Windows XP • LAN Properties Riad S. Twal
Windows XP • TCP / IP Properties Riad S. Twal
Windows XP • Computer Name • Defined within System Properties • Right click on ‘my computer’ • Or Control Panel, system properties Riad S. Twal
Useful DOS Commands… • Windows 98 winipcfg • Windows 2000 ipconfig • Windows XP ipconfig ipconfig/all Riad S. Twal
Windows 2000… • ipconfig Riad S. Twal
Windows 2000… • Ipconfig/all Riad S. Twal
Windows 2000… • Ipconfig – IUB VPN Riad S. Twal
Windows XP • Ipconfig Riad S. Twal