Sunteți pe pagina 1din 19

Unit 7 Network Services

Copyright 2010, ITT ESI

Most modern networks rely on two basic elements to get information to its destination
IP Addresses
Numeric address to an individual computer Example: 127.0.0.1

Host Names
A human readable name of a machine Computers need a DNS Server to translate a Host Name into an IP Address for this to be useful

Copyright 2010, ITT ESI

IPv4
Current standard in the US Uses 4 octets for the address Example: 192.168.20.1 Problems:
No Built-in security Limited number of addresses
Around 4 Billion addresses

Currently IPv4 uses NAT to fake extra addresses


Copyright 2010, ITT ESI 3

IPv6
Next major version of IP Built-in security A very large amount of addresses
IPv4 uses 32 bits for addresses IPv6 uses 128 bits for addresses

Written in hexadecimal form with 8 sets of 4 digits Example: 2001:cdba:af34:bbac:3979:3b12:3257:9652

Copyright 2010, ITT ESI

IPv4 vs IPv6
Number of addresses
IPv4
4,294,967,296 (4 billion)

IPv6
340,282,366,920,938,463,463,374,607,431,768,211,456 (340 trillion, trillion, trillion)

To use up every single IPv6 addresses we would need to stack ten billion computers on top of each other over the entire world including the sea.

Copyright 2010, ITT ESI

We are worried about 3 things in our network


Availability Speed Security

Copyright 2010, ITT ESI

Network Speed and Availability can be affected by many factors


Quality of Equipment Service Provider Distance between two points Failures of Devices
Software Hardware Configurations

Copyright 2010, ITT ESI

Ping
Used to test if a network resource is available Sends a small ICMP packet to the destination They respond back with an acknowledgment

No reply could mean many things:


Resource is down Network Connection Issues Destination computer is set up to ignore ICMP packets

Copyright 2010, ITT ESI

Traceroute
Determines how many hops it takes to get to a destination Finds information about the hops
Latency Name IP Address

Useful for determining the location of a problem Traceroute uses increasingtime-to-live settings in the IP packets to get this information

Copyright 2010, ITT ESI

Linux has some extra tools used for gathering network information
Host Dig Jwhois

Copyright 2010, ITT ESI

10

Host can be used for DNS lookups


Given a hostname, it will fetch the IP Address Given an IP Address, it will fetch the hostname

Dig queries the DNS Server for domain information


Aliases of the target machine Which DNS servers hold information about it How many names the target has

Copyright 2010, ITT ESI

11

This command looks up information about the owner of a website


Uses the online whois database servers Retrieves all available information
Owner Last Updated the whois database Server names Physical addresses of the machines

Useful when tracking where information is coming from (spam)


Copyright 2010, ITT ESI 12

There are many reasons to have external connections to a machine


File Sharing Gain Access to non-network devices Use specialized software Utilize the power of another machine to complete a task your current machine cannot

Copyright 2010, ITT ESI

13

There are many linux programs that will allow you to connect to machines remotely
ssh ftp sftp rsh scp

Copyright 2010, ITT ESI

14

ssh is a open source Secure Shell program


This Provides a background framework for other applications to connect securely Provided at no cost
The cost and security makes them popular

Copyright 2010, ITT ESI

15

File Transfer Protocol


Build to be an easy to use file transport tool Built with very little security in mind
Username/Password transmitted in plain text Easy to hijack a session

In general, normal ftp should only be used for publicly available uploads/downloads
Files that are available to the public anyways

Options like sftp can offer better security

Copyright 2010, ITT ESI

16

Secure File Transfer Protocol


Works much like ftp, except it uses a SSH connection All interactions are encrypted end-to-end

Copyright 2010, ITT ESI

17

Remote Shell
Allows you to run programs on a remote machine through your terminal window You can only connect to machines that trust you
Each machine needs to be added to trusted list manually Eliminates the possibility of hackers easily taking over a machine

Copyright 2010, ITT ESI

18

Secure cp
Creates a ssh connection Allows you to copy a file over an encrypted connection
More secure that ftp

One command can copy the file


Example: To copy the local .bashrc file to the server:

scp ~/.bashrc IT250User@DestinationMachine

Copyright 2010, ITT ESI

19

S-ar putea să vă placă și