Network Technology Foundations © 2009 Certification Partners, LLC All Rights Reserved Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 1: Introduction to Networking Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 1 Objectives • • • • • • • • • Define telephony and convergence networking Discuss the evolution of networking Define the client/server model Describe a Network Operations Center (NOC) Describe peer-to-peer and server-based networks Identify network topologies Identify network operating systems Describe the OSI/RM and the packet-creation process Define major network protocols Lesson 1 Objectives • • • • • • • • • (cont'd) Describe the basics of LANs, WANs and IXPs Identify common network components Identify transmission media and types Define wireless network technologies Describe IEEE LAN standards Describe T and E carriers Define SONET/SDH Describe how to download files with BitTorrent Identify the requirements and benefits of virtualization Telephony and Convergence Networking • PSTN – still an integral part of the Internet infrastructure because it furnishes most of the long-distance connections • Voice over IP (VoIP) – voice transmissions are delivered in digital form as packets of data using Internet Protocol (IP) • Unified communications enable voice to be converted into text, and vice versa • Presencing – the ability for devices to automatically track and report your location and availability Mainframes • Mainframe (centralized) computing provided the first practical network solution – Retrieving information from mainframes – Mainframe liabilities – The future of mainframes – Mainframes and cloud computing / Software as a Service (SaaS) Mainframe Networking Model Mainframe Terminal Terminal Terminal Terminal Client/Server Model • Client/server model (distributed computing) divides processing tasks between the client and the server Client Server Client/Server Model (cont'd) • Client/server model databases and SQL • Client/server advantages • Two-tier, three-tier and n-tier computing Two-Tier Computing Architecture Data Data Data Data Mainframe Minicomputer Three-Tier Computing Architecture First Tier Second (Middle) Tier Third Tier Database PC Server N-Tier Computing Architecture Second (Middle) Tier First Tier Third Tier Database PC Server Server Server Network Operations Center (NOC) • A specific location from which a network is managed, monitored and maintained • Central point for network maintenance and troubleshooting • Generally includes multiple, redundant network connections and redundant power supplies • Many have dedicated phone lines from a separate provider and mobile phones to ensure communication in an emergency Networking Categories • Peer-to-peer – Microsoft peer-to-peer – P2P – Centralized or decentralized • Server-based – UNIX/Linux – Microsoft LAN manger – Microsoft Windows 2003 Server/2008 Server Network Topologies • • • • • Bus Star Ring Hybrid Mesh Network Operating Systems • Operating systems that manage network resources • Interoperability • Microsoft Windows • UNIX/Linux OSI Reference Model • Defined by the International Organization for Standardization (ISO) in 1983 • Gives developers universal concepts so they can develop and perfect protocols that can work with operating system and network products developed by other vendors • Explains the framework used to connect heterogeneous systems • Describes the process of packet creation (how the layers communicate) OSI Model Layers Packets • Packets consist of: – Header (OSI/RM layer information) – Actual data – Trailer (information that validates the packet) • CRC Packet Creation (Adding Headers) OSI/RM Protocol Examples • Application layer – SMTP, POP3, IMAP, HTTP, SMB, NFS • Transport layer – TCP • Network layer – IP • Data link layer – Ethernet, Token Ring Major Networking Protocols • • • • Connection-oriented (stateful) Connectionless (stateless) Routable Non-routable TCP/IP • Transmission Control Protocol / Internet Protocol • A collection of protocols – TCP – IP – User Datagram Protocol (UDP) • An open standard IPX/SPX • Consists of: – Internetwork Packet Exchange (IPX) – Sequenced Packet Exchange (SPX) Binding Protocols • Binding protocols – You must attach, or bind, protocols to your NIC • Protocols and binding order Local Area Networks (LANs) • A group of computers connected within a confined geographic area • Commonly used for intra-office communication Wide Area Networks (WANs) • A group of computers connected over an expansive geographic area Internet Exchange Point (IXP) • Internet backbones • Backbone Network Service • Segments New York Backbone Atlanta Boston Chicago Phoenix Backbone Seattle San Francisco Common Network Components • Network Interface Cards (NICs) • Hubs • Bridges • Routers • Switches • Channel Service Unit / Data Service Unit (CSU/DSU) • Modems • Firewalls Transmission Media • • • • Twisted-pair cable Coaxial cable Fiber-optic cable Wireless media Wireless Network Technologies • Wireless communications use spread spectrum technologies – OFDM – DSSS – FHSS • Wireless networking modes – Ad-hoc – Infrastructure • Wireless access point (AP) • Wireless AP security features – Wired Equivalent Privacy (WEP) – MAC address filtering Wireless Network Technologies (cont'd) • • • • Wireless management software Suitability of a wireless LAN Attaching a wireless AP to a wired network Next-generation (3G) wireless Transmission Types • Synchronous transmission • Asynchronous transmission • Data transmission flow – Simplex – Half duplex – Full duplex IEEE LAN Standards • • • • • • • IEEE 802.2 Ethernet/IEEE 802.3 IEEE 802.3u — Fast Ethernet IEEE 802.3z and 802.3ab — Gigabit Ethernet IEEE 802.3ae — 10-Gigabit Ethernet IEEE 802.5 — Token Ring IEEE 802.11 — Wireless Ethernet T-Carrier System T-Carrier Data Transfer Rate T1 1.544 Mbps T2 6.312 Mbps T3 44.736 Mbps T4 274.176 Mbps E-Carrier System E-Carrier Data Transfer Rate E1 2.048 Mbps E2 8.448 Mbps E3 34.368 Mbps E4 139.264 Mbps E5 565.148 Mbps SONET/SDH • High-speed fiber-optic system • Primarily used for network backbones, such as the Internet backbone • Transmissions carried out by optical carrier (OC) Downloading Files with BitTorrent • BitTorrent – a peer-to-peer (P2P) protocol that you can use to download large files quickly – Seeds – Peers – Torrent files • When using BitTorrent, be careful not to illicitly copy and distribute copyrighted material Virtualization • Virtualization allows you to run multiple virtual operating systems and applications on a single physical computer – VMware – Parallels – VirtualBox • Requirements for virtualization • Benefits of virtualization Lesson 1 Summary Define telephony and convergence networking Discuss the evolution of networking Define the client/server model Describe a Network Operations Center (NOC) Describe peer-to-peer and server-based networks Identify network topologies Identify network operating systems Describe the OSI/RM and the packet-creation process Define major network protocols Lesson 1 Summary (cont'd) Describe the basics of LANs, WANs and IXPs Identify common network components Identify transmission media and types Define wireless network technologies Describe IEEE LAN standards Describe T and E carriers Define SONET/SDH Describe how to download files with BitTorrent Identify the requirements and benefits of virtualization Lesson 2: TCP/IP Suite and Internet Addressing Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 2 Objectives • Define and describe the Internet architecture model and various Internet protocols • Describe the purpose of RFCs • Explain the routing process • Discuss routing protocols • Describe port numbers and their functions • Explain IP addressing, address classes, default subnet masks, and the use of private IP addresses • Define Internet Protocol version 6 (IPv6) • Define the TCP/IP properties needed to configure a typical workstation • Describe various diagnostic tools for troubleshooting TCP/IP networks Internet Architecture Application Layer Transport Layer Internet Layer Network Access Layer Requests for Comments (RFCs) • Maturity-level protocol states – Experimental – Proposed – Draft – Standard • Additional protocol states – Historic – Informational Internet Protocols • • • • Network access layer Internet layer Transport layer Application layer Demultiplexing Telnet FTP TFTP TCP SNMP UDP IGMP ICMP IP RARP ARP ETHERNET Introduction to Routing • • • • • Direct routing Indirect routing Routing process Routing information tables Static vs. dynamic routing Routing Protocols • Interior vs. exterior protocols • Routing Information Protocol (RIP) and RIPv2 • Open Shortest Path First (OSPF) Port Numbers • Classifying port numbers – Well-known port numbers – Registered port numbers – Dynamic port numbers Internet Addressing field1. field2.field3.field4 Each field represents one byte of data Subnet Mask • Distinguishes the network and host portions of an IP address • Specifies whether a destination address is local or remote • Network portion of an Internet address can be determined using the TCP/IP ANDing function Internet Address Classes • Class A – 0.0.0.0 to 127.255.255.255 • Class B – 128.0.0.0 to 191.255.255.255 • Class C – 192.0.0.0 to 223.255.255.255 • Class D – 224.0.0.0 to 239.255.255.255 • Class E – 240.0.0.0 to 247.255.255.255 Default Subnet Masks for IP Address Classes Private IP Addresses Internet Protocol Version 6 (IPv6) • Shortcomings of IPv4 – Limited address space – Lack of security – Speed problems – Configuration problems • Strengths of IPv6 – More efficient and requires less administrative overhead than IPv4 – Provides a practically unlimited number of IP addresses – Less dependent on routers System Configuration and IP Addresses • • • • • Default gateway Loopback address Broadcast address Network and special-case source addresses Normal TCP/IP workstation configuration Diagnostic Tools for Internet Troubleshooting • • • • • • • • ping tracert and traceroute route netstat ipconfig — Windows ifconfig — UNIX/Linux arp Network analyzers Troubleshooting Considerations • • • • DNS name resolution Hosts file configuration Static vs. dynamic IP addressing Default gateway and subnet mask Lesson 2 Summary Define and describe the Internet architecture model and various Internet protocols Describe the purpose of RFCs Explain the routing process Discuss routing protocols Describe port numbers and their functions Explain IP addressing, address classes, default subnet masks, and the use of private IP addresses Define Internet Protocol version 6 (IPv6) Define the TCP/IP properties needed to configure a typical workstation Describe various diagnostic tools for troubleshooting TCP/IP networks Lesson 3: Internetworking Servers Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 3 Objectives • Identify and describe the functions and features of various internetworking servers • Describe how each type of internetworking server uses TCP/IP suite protocols • Describe access-security features of an HTTP server • Define MIME, and explain how MIME types are used by HTTP and mail servers • Define instant messaging (IM) • Describe the functions of DNS • Identify industry-standard Internet servers • Discuss the uses and benefits of a Content Management System (CMS) Overview of Internetworking Servers • • • • • • • File Print HTTP Proxy Mail Mailing list Media • • • • • • • DNS FTP News Certificate Directory Fax Transaction File and Print Servers • File servers — network servers that store data files and programs that can be shared by network users • Print servers — network servers that allow multiple users to send print jobs to the same physical printer • Line Printer/Line Printer Daemon (LPR/LPD) — printing protocol in UNIX that allows users to submit print jobs to network printers HTTP Server Essentials • The Web — a collection of computer systems running the HTTP service • Web server — has access to HTML documents that are returned to a client in response to a request HTTP Server Essentials (cont'd) • HTTP Servers and MIME – Multipurpose Internet Mail Extensions (MIME) — allow HTTP and e-mail attachments to identify the files they must use – MIME types — identify the contents of a file so browsers can display the contents properly HTTP Server Essentials (cont'd) • Additional HTTP server considerations: – HTTP servers work with a variety of operating systems – Permissions — restrict or allow access to system resources • Operating system permissions usually override HTTP server permissions – Access control — specifies who has access to system resources HTTP Server Essentials (cont'd) • Additional HTTP server considerations: – Aliases (or virtual directories) • Flexible mapping of URL path names to file names – Logging — a log of requests handled by the server • Access data • Referrer data • Error data HTTP Server Essentials (cont'd) • Additional HTTP server considerations: – Monitor server and network bandwidth use • Helps maintain consistent performance • Helps to identify bottlenecks • Helps to create a baseline against which future network activity can be compared HTTP Server Essentials (cont'd) • Common Web servers – Apache server – Microsoft Internet Information Services (IIS) – Sun Java System Web Server • Server-side technologies – JavaServer Pages (JSP) – Active Server Pages (ASP) and .NET – PHP Hypertext Preprocessor (PHP) • Open Database Connectivity (ODBC) Database Servers • Database — a file that stores information in a series of tables and columns • Relational database — a database consisting of two or more tables related by a common field • Database server — a server that presents relational databases and makes it possible for remote individuals to access the data • All database servers use SQL to create, maintain and query databases Proxy Servers • Proxy server — an intermediary between a network host and other hosts outside the network • Proxy servers: – Provide enhanced security – Manage TCP/IP addresses – Speed Internet access by caching Web documents – Replace network IP address with another, contingent address Mail Servers • Mail servers store/forward e-mail messages using several protocols: – SMTP — used to send messages – POP3 — used to store and forward messages (forces a user to download messages before managing them) – IMAP — used to store and forward messages (allows a user to browse and manage messages remotely) • MIME is used to transmit files with e-mail Instant Messaging (IM) • Instant messaging runs on a mail server • Use IM to: – Type and view messages sent to one or more recipients – View the responses immediately • IMs can be sent only to contacts who are currently online Mailing List Servers • A mailing list server forwards an e-mail message to every member on a distribution list • Mailing List Manager (MLM) — the interface that allows you to configure a mailing list server • Public vs. private mailing lists • Examples of public mailing lists: – LISTSERV – Majordomo Mailing List Servers (cont'd) Media Servers • A media server provides streaming audio and video over a network • Uses UDP ports and buffers to achieve the effect of a real-time connection – UDP is a connectionless protocol – Buffer — cache of memory that stores frequently used data to allow for faster access times DNS Servers • DNS — mechanism used on the Internet to translate host computer names into IP addresses – www.CIW-certified.com = http://74.206.104.14 • Hosts file — file referenced locally by applications and commands for name-toaddress resolution DNS Servers (cont'd) • DNS hierarchy – Root-level domain — the top of the hierarchy that contains entries for each toplevel domain – Top-level domain — consists of categories found at the end of domain names – Second-level domain — includes the businesses and institutions that register their domain names with the top-level domains DNS Servers (cont'd) • DNS components – Name server — server that supports nameto-address translation and runs the DNS service – Name resolver — software that uses the services of one or more DNS servers to resolve an unknown request • DNS records — entries in DNS database that provide additional routing and resolution information DNS Servers • DSN server types – Root – Primary – Secondary – Caching-only – Forwarding (cont'd) DNS Servers .(root) Domain name space ie se (cont'd) com mx net ch xyz user1 iso ftp user2 www DNS Servers (cont'd) • nslookup – Used to query Internet domain name servers to learn name-to-IP-address mappings – Example of nslookup one-time command: • nslookup www.CIW-certified.com – Used interactively by typing: • nslookup FTP Servers • File Transfer Protocol (FTP) allows the transfer of large files between file servers in real time • Files of 2 MB or greater should be transferred by means of FTP • Sending files by means of FTP is faster than with e-mail and HTTP News Servers • A news server uses Network News Transfer Protocol (NNTP) • Written text output • Multi-person input • Allows users to post information any time • Can be used to create secure newsgroups by enabling user-specific password protection or through an SSL session Certificate Servers • A certificate server validates, or certifies, encryption keys • Keys — strings of text generated from encryption algorithms that allow you to secure communications for a company or group of users Directory Servers • Identify all resources on a network, then make them available to authenticated users • Enable a company to reuse information in its directory • Reduce/eliminate re-entry of user information for applications that require it • Help administrators manage applications and users • Help users locate other users or e-mail addresses • Locate and manage all company accounts • Allow users inside and outside the network to use the service • Maintain a single database of e-mail contacts Directory Servers (cont'd) • Directory server protocols – X.500 — used to manage user and resource directories – X.500 offers: • Scalability • Synchronization • Replication – Lightweight Directory Access Protocol (LDAP) — a TCP/IP suite protocol that allows communication on both intranets and the Internet Fax and Transaction Servers • Fax servers – Provide a centrally located fax system – Consist of a bank of fax/modems • Transaction servers – Guarantee that all required databases are updated when a transaction takes place Choosing Web Server Products • Apache Web server – Used by almost half of all Web sites – Supports UNIX and Windows – Available free of charge • Microsoft IIS – Includes HTTP, FTP, NNTP, SMTP, certificate, ASP, index (catalog) and transaction services – Allows you to use a remote server to store and retrieve files Choosing Web Server Products (cont'd) • Sun Java System Web Servers – Support many platforms, including Sun Solaris, Windows, Linux, AIX and HP-UX – Support JavaServer Pages (JSP) technology and Java servlets – Can use Java to connect to databases – Can implement other server-side scripting applications Choosing Web Server Products (cont'd) • Java software and Web servers – Java servlet — Java code that is compiled and runs solely on Web servers – Servlets allow: • Chaining • Connections to databases • Near-universal support on systems Content Management System (CMS) • CMS – allows you to easily create, store and track all documents and information produced by an organization • Benefits – Centralized management of content – Ability to reuse content – Increased collaboration Content Management System (CMS) (cont'd) • Common CMS Services – Role management – Permission management – Content publication – Content editing – Version control – Indexing and searching – Caching and replication – Simplified backup – Syndication Content Management System (CMS) (cont'd) • CMS as a workflow management tool – Helps managers and executives ensure that users properly submit and manage content • CMS requirements analysis – Number of users – Projected server load – Storage capacity Content Management System (CMS) (cont'd) • Managing a CMS – Workflow management – Content acquisition – Standard tagging – Taxonomic and social tagging – Template creation and management – Localization – Personalization and portals Content Management System (CMS) (cont'd) CMS and the content life cycle Content Management System (CMS) (cont'd) • CMS security concerns • Types of CMS – Web CMS – Enterprise CMS • CMS vendors and products Lesson 3 Summary Identify and describe the functions and features of various internetworking servers Describe how each type of internetworking server uses TCP/IP suite protocols Describe access-security features of an HTTP server Define MIME, and explain how MIME types are used by HTTP and mail servers Define instant messaging (IM) Describe the functions of DNS Identify industry-standard Internet servers Discuss the uses and benefits of a Content Management System (CMS) Lesson 4: Hardware and Operating System Maintenance Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 4 Objectives • Identify the characteristics of motherboards • Identify common IRQ, I/O address and DMA settings • Identify SATA and SCSI traits • Identify NICs and common peripheral ports • Identify the characteristics of CDs, DVDs and Blu-ray Discs • Identify the characteristics of TV tuner cards, HDMI connections and mobile computing devices Lesson 4 Objectives (cont'd) • Describe the importance of obtaining proper software licensing • Identify how to partition disks and prepare logical drives • Describe the characteristics of file system types • Describe the uses of file system management tools • Identify and suggest corrective measures for operating system boot problems and application failures • Identify methods to remotely manage and troubleshoot workstations Basic Hardware and System Maintenance • Fix hardware problems by ensuring: – Components are plugged in – Components are turned on – Components are connected properly in order to operate (such as connecting the keyboard to the computer) • Periodically clean hardware components • Establish a preventive maintenance plan Motherboard • Main circuit board in a computer • Must be securely fastened to system chassis • Should never touch anything metal, except through proper connections • Most motherboard components are soldered on and no longer replaceable • If components fail (except for memory and the microprocessor), the entire motherboard needs to be replaced IRQs, I/O Addresses and DMA • Interrupt requests (IRQs) — hardware lines used to identify when a device wants to communicate with the processor – Example: When a printer has finished printing, it sends an interrupt signal to the computer so the computer can decide what to process next • Input/output (I/O) address — memory location that allows the system processor and system devices to communicate • Direct memory access (DMA) — allows a device to access system memory directly, bypassing the processor Electronic Communication • Binary numbering – Converting decimal values into binary – Bytes and bits • Hexadecimal numbering – Converting from hexadecimal into binary and decimal – Converting from binary into hexadecimal • ASCII Communication Basics Serial communication Communication Basics (cont'd) Parallel communication Mass Storage Device Interfaces • To communicate with a motherboard, mass storage devices need to be connected to the motherboard through an interface • Two most common interfaces are: – SATA – SCSI Serial ATA (SATA) • SATA is currently the de facto standard for PCbased drives • SATA devices are connected using a cable that somewhat resembles a small Category 5 Ethernet cable Small Computer System Interface (SCSI) • With SCSI, multiple devices can be connected to a single controller in a daisy chain configuration • You can attach as many as 127 internal or external SCSI devices to a single controller • SCSI devices include hard disk drives, printers, scanners and tape drives • SCSI daisy chain must be terminated at both ends and only at the ends Network Interface Card (NIC) • Each network device must have a NIC (or network adapter card) • The network adapter makes the physical connection between the device and the network cabling • The network adapter converts the data from the computer into a format appropriate for transmission over the network • Transceiver — the network adapter component that handles data transmission Common Peripheral Ports Common Peripheral Ports (cont'd) • PS/2-style ports are for the mouse and keyboard • Serial ports – Communicate using serial asynchronous communication – Are used for serial communication devices • Parallel ports – Communicate using parallel communication – Are used for parallel communication devices Common Peripheral Ports (cont'd) • USB ports – Support asynchronous and isochronous transmissions for data transfer – Communicate using serial communication – Support as many as 127 peripheral devices in a daisy chain configuration • FireWire (IEEE 1394) – A high-speed serial interface to which you can daisy chain as many as 63 peripheral devices – Good for devices that need to transfer large amounts of data Power Requirements • Electricity is measured according to different standards in North America and Europe • Computing and networking equipment is also manufactured to different standards • When traveling from North America to Europe, you will need: – A special plug adapter – A power inverter Compact Disc—Read-Only Memory (CD-ROM) • CD-ROM — an optical storage device from which data can be read only • CD-ROM drives use common mass storage interfaces • Writable CD devices allow you to create, or "burn," your own data and audio CDs – CD-R (CD-recordable) — write data once – CD-RW (CD-rewritable) — write data multiple times Digital Video Disc (DVD) • DVD — optical storage device from which data can be read only • DVDs are similar to CD-ROMs but have higher storage capacity – Initial DVD standard provided 4.7 GB of storage capacity – Current DVD standards support dual-layer discs with a storage capacity of 8.5 GB – Double-sided disc standard supports 9.4 GB when writing to one side or 17 GB total when writing to both sides Blu-Ray Discs (BDs) • High-definition optical disc storage medium that is designed to be the successor to DVDs • Single-layer Blu-ray Discs can hold up to 25 GB of data • Dual-layer Blu-ray Discs can hold up to 50 GB of data • BD-R — a write-once format • BD-RE — a rewritable format Optical Disc Drive Maintenance • Keep the drives closed when they are not in use, and check all media for foreign matter before inserting into the drive • Optical discs should be handled only by the edges • Avoid scratching the disc surface • Never directly touch or try to manually clean the laser • Brush away and vacuum accumulated dust • Manually eject a stuck disc by inserting a wire into the small hole on the face of the drive, then pressing hard until the disc is ejected TV Tuner Card • Enables television signals to be viewed on a computer monitor • Four kinds of TV tuner cards: – Analog TV tuners – Digital TV tuners – Hybrid tuner – Combo tuner High-Definition Multimedia Interface (HDMI) Connections • Transmit high-definition digital video and highresolution digital audio data • Consist of 19 wires wrapped in a single cable • Carry bandwidth of up to 5 Gbps • Preserve the source digital signal by eliminating the digital-to-analog-to-digital conversion • Should not run longer than 15 feet (5 meters) to prevent signal degradation Mobile Computing • A person's ability to use technology while "on the go" • Common devices and associated technologies: – PDAs – Bluetooth – Smartphones • iPhone • BlackBerry – Portable media players • iPod and iPod Touch • Zune – Memory Sticks – Secure Digital (SD) cards – Google Android Netbooks • A more compact, Web-oriented version of the standard laptop PC • Relies on the cloud-computing model in which the Internet is used for remote access to Web applications • Relies on wireless network connections • Does not use a traditional hard disk; uses a solid-state drive or a Secure Digital (SD) card instead • Easy to use and maintain Software Licensing • When you purchase software, you are purchasing the right to use the software under certain restrictions • These restrictions are outlined in the license agreement • When you load software, the license agreement typically displays during the installation process • You must indicate that you have read and understood the agreement before the installation procedure will allow you to continue Software Licensing (cont'd) • Apart from legal consequences, using unlicensed software can also mean: – No documentation – No warranties – No technical product support – Greater exposure to software viruses, corrupt discs or otherwise defective software – Ineligibility for software upgrades Partitions and Logical Drives • When installing an operating system on a new computer or after recovering from a hard disk failure, prepare the hard disk for use by: – Partitioning the hard disk – Creating logical drives – Formatting logical drives Disk Partitioning • Partition disks to divide total storage space • Primary partition — the system’s boot drive, used for system startup • Extended partition — the remaining drive space after you create the primary partition Logical Disk Drives • A disk partition must be assigned a logical drive identifier • A primary partition is treated as a single logical drive • An extended partition can be divided into multiple logical drives (Drives D and E in figure) Logical Drive Format • Low-level format – Prepares the hard disk before disk partitions can be defined – Primarily the responsibility of the hard disk manufacturer • High-level format – Logical drive formatting that prepares the drive for use by the operating system – Creates the file system root directory and the files used to track disk space use File System Types • Primary partitions and logical drives must be formatted so the operating system can use them • Formatting creates the file system by adding information about how files should be stored on the drive to organize and manage disk storage • File system types include: – FAT32 and NTFS (Windows) – Ext3/4 and ReiserFS/4 (Linux) File and Directory Permissions • NTFS allows you to set permission bits on system resources • In NTFS, you can protect files so that only certain users or groups of users can read them • Concerns – If permissions are applied improperly, users may take security for granted – Improperly set permissions can disrupt an operating system Convert Utility • Information about the files on an NTFS volume and their attributes is stored in the master file table (MFT) • Convert utility — used to convert a partition or logical drive from FAT32 to NTFS convert drive /FS:NTFS [/v] Disk Defragmenter Utility • As files are created and deleted, a partition can become severely fragmented • Fragmented files are no longer located in contiguous clusters • You can use the Disk Defragmenter utility to defragment hard disks and put files back together in a contiguous format Chkdsk Utility • You can use the Chkdsk utility in Windows to: – Create and display a status report for a disk based on its file system – List and correct errors on the disk – Display the status of the disk in the current drive Disk Cleanup Utility Use the Disk Cleanup utility to recover the disk space used by: – Temporary files – Unused applications – Files in the Recycle Bin – Files you downloaded as part of Web pages – Files created when Chkdsk attempted to recover lost file fragments Backup and Restore Utilities • Keep a current backup of all data files to ensure that data can be recovered if a hard drive fails • When you back up data, you store copies of folders and files to a source other than your computer's hard disk • You restore data when you need to access the backed up data Troubleshooting Software • Software troubleshooting refers to anything other than problems caused by system hardware • Software problems can be caused by: – Bugs – Corrupted files – Incompatibilities – Virus infections Operating System Boot Problems • Error: No operating system – Bad or missing command interpreter – Missing ntldr (Windows) – Kernel not available (Linux) – Operating system files missing – Hard disk or controller failure Blue Screen of Death (BSOD) • Blue screen that indicates that a critical operating system failure has occurred during startup • To troubleshoot: – Restart the system in Safe mode and use the Last Known Good Configuration option – Reinstall the operating system – Attempt to diagnose the problem by parsing the dump file System Lockup • Lockup causes: – Applications that are incompatible with the operating system or with a hardware component – IRQ conflicts – Related problems that you may be able to find in the system log file • Power down your system by manually pressing and holding down the power key for five seconds Application Failures • Application failure causes: – Low system RAM – Current logon environment crashes – Improper permissions – Improper system resolution or color levels • View the system log – Windows Event Viewer – Linux/UNIX "messages" Application Failures (cont'd) • Windows protection error causes: – Device drivers that may not be written specifically for your operating system – Applications or utilities that attempt to bypass the operating system and directly access local system hardware • Application installation and loading failures: – Application will not load into memory – Application can cause an illegal operation, resulting in the blue screen of death – Application may not install at all Remote Management and Troubleshooting • Telnet — TCP/IP command that establishes a remote connection with a server • SSH — protocol and command interface that can gain secure access to a remote computer • VNC — program that controls a remote computer – VNC consists of two components: • A server that listens to a specific port • The viewer, which shows the remote system’s logon environment Remote Management and Troubleshooting (cont'd) • Remote Desktop — Windows service used to gain access to a Windows session that is running on another computer – Allows multiple users to have active sessions on a single computer – Allows you to switch from one user to another on the same computer • Remote Assistance — Windows service used to seek help from a remote user Lesson 4 Summary Identify the characteristics of motherboards Identify common IRQ, I/O address and DMA settings Identify SATA and SCSI traits Identify NICs and common peripheral ports Identify the characteristics of CDs, DVDs and Blu-ray Discs Identify the characteristics of TV tuner cards, HDMI connections and mobile computing devices Lesson 4 Summary (cont'd) Describe the importance of obtaining proper software licensing Identify how to partition disks and prepare logical drives Describe the characteristics of file system types Describe the uses of file system management tools Identify and suggest corrective measures for operating system boot problems and application failures Identify methods to remotely manage and troubleshoot workstations Lesson 5: Network Security and Personal Privacy Protection Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 5 Objectives • Define security • Describe computer viruses and worms • Identify various network attacks and ways to defeat them • Describe authentication principles • Explain the three major types of encryption • Describe firewalls, common firewall topologies and security zones • Describe the function of a VPN • Describe security audit principles • Describe the function of a UPS • Discuss Internet-related personal privacy issues • Discuss Internet-based challenges against which users should be protected Defining Security • Security — a set of procedures designed to protect transmitted and stored information, as well as network resources • Security administrators must determine which people can take appropriate actions on specific items at the appropriate time Viruses and Worms • Virus — code that causes damage to systems • Virus types – Macro/script – File infecting – Boot sector – Stealth – Polymorphic – Retro • Worm — similar to virus but automatically replicates Overview of Network Attack Types • • • • • Spoofing Man in the middle DOS Distributed DOS Brute force • • • • • Dictionary Back door Buffer overflow Trojan Social engineering To avoid attacks: • Install stable updates • Use encryption • Be suspicious of information requests • Remain informed Defeating Attacks • OSI/RM security services – Authentication – Access control – Data confidentiality – Data integrity – Non-repudiation • Updates Authentication • Three authentication methods – What you know – What you have – Who you are • Passwords – Strong passwords – Age passwords appropriately • Account lockout — disables accounts after a given number of invalid passwords have been entered • Account reset — enables you to choose whether accounts reset automatically after a given interval Authentication (cont'd) • Managing passwords – Use password manager software to help store and manage your passwords – Example: KeePass • Password generators – Algorithms that receive input from a random or pseudo-random number generator and then automatically generate a password Digital Certificates • • • • • Provide authoritative identification Verify the sender's identity Use the X.509 standard Are used for non-repudiation Contain digital signatures – Certificate authority (CA) Public Key Infrastructure (PKI) • PKI CA servers: – Are repositories for managing digital certificates – Enable the secure creation and management of digital certificates – Provide the ability to revoke an invalid key • If you need a certificate for a server, use PKI Encryption • The primary means to ensure privacy across the enterprise • Symmetric-key encryption – One key to encrypt and decrypt – All parties must know and trust one another • Symmetric algorithms – DES – Triple DES – AES Encryption (cont'd) • Asymmetric-key encryption – Uses a key pair (one public, one private) – Used to create a digital signature • Asymmetric algorithms – RSA – DSA Encryption (cont'd) • Hash encryption – Uses a hash table that contains a hash function – Used for information that will not be decrypted or read • Hash algorithms – MD2, MD4 and MD5 – SHA Encryption (cont'd) • Pretty Good Privacy (PGP) — uses a combination of the three encryption types • GNU Privacy Guard (GPG) — the open-source version of PGP • PGP and GPG: – Use symmetric-key encryption to scramble the original message you want to send – Use asymmetric-key encryption to encrypt only the symmetric key you just used – Use hash encryption to "sign" the message and ensure that no one can tamper with it Firewalls • A firewall is a secure computer system placed between a trusted network and an untrusted one, such as the Internet – The most common location for a firewall is between a corporate LAN and the Internet • Allows users from a protected network to access a public network while simultaneously making the protected company's products and services available to the public Internal and Personal Firewalls • Internal firewall — resides inside your company's internal network – Internal firewalls can: • Protect sensitive systems • Isolate networks that still need Internet connectivity but which use software that may cause problems with other company resources • Personal firewall — offers protection for an individual system Packet Filtering • Packet filter — inspects each packet for predefined content • Packet filters filter data based on the following fields in the packet: – Source IP address – Destination IP address – TCP/UDP source port – TCP/UDP destination port Proxy Servers • A proxy server replaces the network IP address with a single IP address • Provides the following services: – Hiding of network resources – Logging – Caching • Application-level gateway — a proxy between the Internet and your internal system at the application level • Most firewalls are combinations of packet filtering and application-level gateways Network Address Translation (NAT) • The practice of hiding internal IP addresses from the external network • Two ways to provide NAT – Configure masquerading on a packetfiltering firewall – Use a proxy server to conduct requests on behalf of internal hosts Accessing Internet Services • If Internet access is required and a network is located behind a proxy server or firewall, you may have problems accessing Internet services that use ports other than common ports • To avoid these problems: – Make sure the network has access to all Internet-related protocols used by the company – Make sure that the IP addresses assigned to the computers in your network have permission to access the Internet Troubleshooting Access Through Firewalls • Firewalls can cause a bottleneck • Firewalls may not allow home-based account access to the corporate e-mail server • To troubleshoot firewall problems: – Verify that you are using the correct IP address and subnet mask – Check your default gateway and verify that the computer can communicate with systems on the same subnet – Verify DNS resolution – Try to use multiple protocols on the Internet Firewall Topologies • Common firewall implementations – Packet filter – Dual-homed bastion host – Triple-homed bastion host – Screened subnet (back-to-back firewalls) • Bastion host — a computer that houses various firewall components and services, and is connected to a public network Packet Filter Topology Dual-Homed Bastion Host Triple-Homed Bastion Host Screened Subnet Security Zones • Demilitarized zone (DMZ) — a mini-network that resides between a company's internal network and the external network • Intranet — a security zone available only to authorized organization employees • Extranet — a private network that allows selected access to outsiders only after they provide authentication information • Virtual LAN (VLAN) — a logical grouping of hosts, generally not implemented by a firewall Virtual Private Network (VPN) • A technique that allows secure communication across long distances, usually for a company extranet • In a VPN, the Internet is often the corporate network backbone • Appropriate for any organization requiring secure external access to internal resources • All VPNs are tunneling protocols — encryption occurs at the source and decryption occurs at the destination Virtual Private Network (VPN) (cont'd) • VPN protocols – Point-to-Point Tunneling Protocol (PPTP) — works only with IP protocols – Layer 2 Tunneling Protocol (L2TP) — works with non-IP protocols – IP Security (IPsec) — more flexible than PPTP or L2TP because you can specify different authentication methods Remote Access Server (RAS) • Requires the use of dial-up modems to dial up, connect and log on to RAS • Offers security through a callback feature – A user logs on to RAS – The user is disconnected – RAS calls the user back to ensure the call was made from an authorized computer Security Audit • Review of the state of the network • Auditing process: – Conduct a status quo analysis – Conduct a risk analysis – Make recommendations based on findings Uninterruptible Power Supply (UPS) • Device that allows a computer to keep running temporarily when the primary power source is lost • Can be configured to: – Shut down entire systems automatically – Shut down only certain components automatically – Place components into minimal power use mode until the system is shut down manually Personal Privacy and the Internet • Internet privacy – the ability to control what information you reveal about yourself over the Internet and to whom (or what) you reveal it • Anonymizing tools – Internet components and application features that make the user's Internet activity untraceable – Browser privacy mode features – Proxy servers – VPN servers – Anonymizer Web sites Internet Privacy • Browser privacy mode – no cache or history of your browsing sessions are kept • Browsers with privacy mode features – Mozilla Firefox – Microsoft Internet Explorer (InPrivate) – Google Chrome (Incognito) – Apple Safari (Private Browsing) • Use Web sites that provide anonymizer services to thwart tracebacks, hide your online identity and bypass proxy servers Ethics of Anonymous Browsing • Anonymous browsing hides your identity – You can use anonymous browsing to minimize risk if you engage in online behavior that may be potentially dangerous • People can also engage in anonymous browsing for unethical or illegal purposes – Anonymous browsing allows a person to browse the Web without leaving behind any incriminating evidence Internet Fraud • Scams or other deceptive practices committed via the Internet, usually for the purpose of monetary gain or identity theft – Auction and retail scams – Business opportunity scams – Investment scams – Credit card scams – Purchase scams – Money transfer scams – Dating scams Identity Theft • Fraud committed in your name by someone else who has illicitly gained access to your personal information • Methods used by identity thieves – Dumpster diving – Skimming – Phishing – Address changing – Stealing Phishing, Pharming and Anti-Phishing Software • Phishing – a form of social engineering that attempts to gather personal and financial information from unsuspecting victims by sending e-mail and luring the user to a legitimate-looking site, then requesting passwords, accounts numbers, etc. • Pharming – the act of installing malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking bogus Web site • Anti-phishing software – program designed to identify phishing content contained in Web sites and e-mail messages Personal Protection and the Internet • Online stalking – Occurs when a person ("stalker") stealthily pursues, harasses and/or preys upon another person using online venues such as e-mail, chat rooms and social networking sites • Cyberbullying – The willful harm inflicted on others through the use of information and communication technologies • Internet addiction – Many users spend so much time involved with online games, social networking, blogging, instant messaging and so forth that they are missing out on real-world experiences Lesson 5 Summary Define security Describe computer viruses and worms Identify various network attacks and ways to defeat them Describe authentication principles Explain the three major types of encryption Describe firewalls, common firewall topologies and security zones Describe the function of a VPN Describe security audit principles Describe the function of a UPS Discuss Internet-related personal privacy issues Discuss Internet-based challenges against which users should be protected Network Technology Foundations Introduction to Networking TCP/IP Suite and Internet Addressing Internetworking Servers Hardware and Operating System Maintenance Network Security and Personal Privacy Protection