Linux Manual for Linux Confirmation, Second Release.


40 views
Uploaded on:
Description
Linux Guide to Linux Certification, 2e. 9. The TCP/IP Protocol: IP ... Every PC on a TCP/IP system must have a legitimate IP location and subnet cover ...
Transcripts
Slide 1

Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration

Slide 2

Objectives Describe the reason and sorts of systems, conventions, and media access techniques Understand the essential arrangement of TCP/IP Configure a NIC interface to utilize TCP/IP Linux+ Guide to Linux Certification, 2e

Slide 3

Objectives (proceeded with) Configure a modem, ISDN, and DSL interface to utilize PPP and TCP/IP Understand the motivation behind host names and how they are set out to IP addresses Use normal system utilities to cooperate with system administrations Linux+ Guide to Linux Certification, 2e

Slide 4

Networks and TCP/IP Network: Two or more PCs joined by means of system media and ready to trade data Local Area Networks (LANs): Computers inside closeness Wide Area Networks (WANs): Computers isolated by substantial separations Internet administration supplier (ISP): Company giving web access Linux+ Guide to Linux Certification, 2e

Slide 5

Networks and TCP/IP (proceeded with) Routers: Devices equipped for exchanging bundles between systems Protocols: Set of guidelines for correspondence between organized PCs Packets: Packages of information arranged by a system convention Media access strategy: Defines how organized PCs offer access to the physical medium Linux+ Guide to Linux Certification, 2e

Slide 6

Networks and TCP/IP (proceeded with) Linux system conventions: TCP/IP (Transfer Control Protocol/Internet Protocol) UDP/IP (User Datagram Protocol/Internet Protocol) IPX/SPX (Internetwork Packet Exchange/Sequence Packet Exchange) Appletalk DLC (Data Link Control) DECnet (Digital Equipment Corporation system) Linux+ Guide to Linux Certification, 2e

Slide 7

Networks and TCP/IP (proceeded with) Ethernet: Most regular system media access strategy Token Ring: Popular media access technique Media access technique generally contained on NIC or modem equipment Linux+ Guide to Linux Certification, 2e

Slide 8

The TCP/IP Protocol: IP Addresses IP address: Unique number that recognizes an arranged PC Octets: Series of four 8-bit numbers Unicast: Directed TCP/IP correspondence between two PCs Linux+ Guide to Linux Certification, 2e

Slide 9

The TCP/IP Protocol: IP Addresses (proceeded with) IP addresses made out of two sections: Network ID: Network PC is situated on Host ID: Single PC on that system Cannot have two PCs with same host ID on a system Only PCs with same system ID can convey without a switch Linux+ Guide to Linux Certification, 2e

Slide 10

Subnet Masks Define which a portion of IP location is the system ID and which part is the host ID Series of four 8-bit numbers ANDing: Calculate system and host IDs from an IP address and subnet veil Compare double bits Linux+ Guide to Linux Certification, 2e

Slide 11

Subnet Masks (proceeded with) Figure 14-1: A specimen IP address and subnet cover Linux+ Guide to Linux Certification, 2e

Slide 12

Subnet Masks (proceeded) 0.0.0.0 = all systems 255.255.255.255 = all PCs 255 in an IP location can indicate numerous hosts Broadcast addresses Linux+ Guide to Linux Certification, 2e

Slide 13

Default Gateway IP address on switch that sends parcels to remote systems Routers can recognize diverse systems Move bundles between them Have allocated IP addresses on each appended system Linux+ Guide to Linux Certification, 2e

Slide 14

TCP/IP Classes and Subnetting IP address class characterizes default subnet veil of related gadget Multicast: TCP/IP correspondence bound for a specific gathering of PCs Class D addresses Subnetting: Divide a vast system into littler systems Control movement stream Take bits from host ID, provide for system ID Linux+ Guide to Linux Certification, 2e

Slide 15

TCP/IP Classes and Subnetting (proceeded with) Table 14-1: IP address classes Linux+ Guide to Linux Certification, 2e

Slide 16

Configuring a NIC Interface ifconfig charge: Assign TCP/IP setup to a NIC Also used to view design of all system interfaces in PC dhclient order: Receive TCP/IP design from DHCP or Boot Protocol (BOOTP) server Linux+ Guide to Linux Certification, 2e

Slide 17

Configuring a NIC Interface (proceeded)/and so forth/sysconfig/system scripts/ifcfg-<interface> record: Stores NIC setups Packet web groper (ping) summon: Check TCP/IP availability on a system Linux+ Guide to Linux Certification, 2e

Slide 18

Configuring a NIC Interface (proceeded with) Figure 14-2: Configuring system interfaces Linux+ Guide to Linux Certification, 2e

Slide 19

Configuring a NIC Interface (proceeded with) Figure 14-3: Configuring TCP/IP data for a system interface Linux+ Guide to Linux Certification, 2e

Slide 20

Configuring a PPP Interface Run TCP/IP over serial lines Use a WAN convention Three basic Point-to-Point Protocol (PPP) innovations: Modems ISDN DSL Linux+ Guide to Linux Certification, 2e

Slide 21

Configuring a PPP Interface (proceeded with) Figure 14-4: Adding a system interface Linux+ Guide to Linux Certification, 2e

Slide 22

Configuring a PPP Interface (proceeded with) Figure 14-5: Selecting modem equipment Linux+ Guide to Linux Certification, 2e

Slide 23

Configuring a PPP Interface (proceeded with) Figure 14-6: Selecting ISDN equipment Linux+ Guide to Linux Certification, 2e

Slide 24

Configuring a PPP Interface (proceeded with) Figure 14-7: Specifying ISP settings Linux+ Guide to Linux Certification, 2e

Slide 25

Configuring a PPP Interface (proceeded with) Information about PPP gadgets put away in documents named ifcfg-<InternetServiceProviderName>/and so forth/sysconfig/system scripts index Other setups utilized by PPP daemon put away as a part of/and so on/ppp and/and so on/isdn Linux+ Guide to Linux Certification, 2e

Slide 26

Configuring a PPP Interface (proceeded with) Figure 14-8: Specifying TCP/IP settings Linux+ Guide to Linux Certification, 2e

Slide 27

Configuring a PPP Interface (proceeded with) Figure 14-9: Configuring a xDSL association Linux+ Guide to Linux Certification, 2e

Slide 28

Configuring a PPP Interface (proceeded with) Figure 14-10: Activating a PPP association Linux+ Guide to Linux Certification, 2e

Slide 29

Name Resolution Hostnames: User-accommodating PC name FQDN: Hostname taking after DNS tradition DNS: Hierarchical namespace for host names hostname charge: View or set a PC\'s host name Linux+ Guide to Linux Certification, 2e

Slide 30

Name Resolution (proceeded with) Figure 14-11: The Domain Name Space Linux+ Guide to Linux Certification, 2e

Slide 31

Name Resolution (proceeded with) TCP/IP can\'t distinguish PCs by means of hostnames Must guide hostnames to IP addresses Entries in/and so on/hosts document ISPs list FQDNs in DNS servers on Internet Applications ask for IP addresses connected with FQDN Linux+ Guide to Linux Certification, 2e

Slide 32

Connecting to Network Resources Network assets: Shared printers Applications Files To utilize system assets, must have fitting system utilities Linux+ Guide to Linux Certification, 2e

Slide 33

Downloading Files Using FTP Most web programs have worked in FTP utility FTP utility: Downloads documents from FTP servers Linux+ Guide to Linux Certification, 2e

Slide 34

Downloading Files Using FTP (proceeded with) Figure 14-12: Using a Web program FTP customer Linux+ Guide to Linux Certification, 2e

Slide 35

Downloading Files Using FTP (proceeded with) Table 14-2: Common FTP orders Linux+ Guide to Linux Certification, 2e

Slide 36

Downloading Files Using FTP (proceeded with) Table 14-2 (proceeded with): Common FTP orders Linux+ Guide to Linux Certification, 2e

Slide 37

Accessing Files with NFS: Common strategy for document exchange amongst UNIX and Linux PCs Not as basic as FTP Mount registry from a remote PC Linux+ Guide to Linux Certification, 2e

Slide 38

Accessing Windows Files Mount shared Windows catalog to nearby catalog Filesystem must be smbfs smbmount charge: Mount registries from Windows PCs smbclient utility: Connect to offers on a Windows framework umount order: Unmount Windows indexes Linux+ Guide to Linux Certification, 2e

Slide 39

Running Remote Applications Access to BASH shell might be acquired by associating with a server over a system telnet utility: Most basic utility used to get BASH shell over a system No encryption Secure Shell (ssh) utility: Uses encryption Linux+ Guide to Linux Certification, 2e

Slide 40

Running Remote Applications (proceeded) rlogin: Obtain a shell from remote PC on system "r" utilities permit access to remote PCs without a secret key Trusted access: Computers permitted to get to a PC without giving a watchword Linux+ Guide to Linux Certification, 2e

Slide 41

Accessing E-mail Post Office Protocol (POP): Download email messages from email server Internet Message Access Protocol (IMAP): View email messages crosswise over system Simple Mail Transfer Protocol (SMTP): Sending letters from MUA to email server Mozilla Mail is most basic MUA for Linux Linux+ Guide to Linux Certification, 2e

Slide 42

Accessing E-mail (proceeded with) Figure 14-13: Configuring a mail account in Mozilla Mail Linux+ Guide to Linux Certification, 2e

Slide 43

Accessing E-mail (proceeded with) Figure 14-14: Using Mozilla Mail Linux+ Guide to Linux Certification, 2e

Slide 44

Accessing E-mail (proceeded with) Linux frameworks ordinarily utilize an inner mail framework intended for organization Daemons email root client when vital occasions or issues happen mail utility: Basic email peruser accessible on most Linux circulations mutt utility: Popular MUA Can keep running in a terminal Linux+ Guide to Linux Certification, 2e

Slide 45

Accessing E-mail (proceeded with) Figure 14-15: The mutt mail client operator Linux+ Guide to Linux Certification, 2e

Slide 46

Summary A system is an accumulation of PCs that are associated together and offer data Protocols characterize the configuration of data that is transmi

Recommended
View more...