Sunteți pe pagina 1din 32

A STUDY ON BASIC NETWORKING CONCEPTS AND SERVER CONFIGURATION WITH REDHAT LINUX 5. SUPERVISED BYMd.Mirza Golam Rashed.

Assistant Professor Dept. Computer Science and Engineering. The Peoples University Of Bangladesh. DHAKA, BANGLADESH.

PRESENTED BYI

What is Computer Networking?


A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users.

Communication model:
There are two basic types of networking models: Protocol models and Reference models.

Protocol models:
A protocol model provides a model that closely matches the structure of a particular protocol suite.

Reference models: A reference model provides a common reference for maintaining


consistency within all types of network protocols and services.

Types of Network :
Peer to peer network: Peer to peer is an approach to computer networking where all computers share equivalent responsibility for processing data.

Clint server Network: The term client-server refers to a popular model for computer networking that utilizes client and server devices each designed for specific purposes.

Fig: Peer to peer network

Fig: Clint server Network

Network Topology
Network Topology means how the network computer are connected with each others on network. There are

Physical topology. Logical topology. Bus topology. Ring topology. Mesh topology. Star topology.

Analog Signal and Digital Signal


Analog Signal: A signal in which some feature increases and decreases in the same way as the thing being transmitted.

Digital Signal: A signal in which the original information is converted into a string of bits before being transmitted. Digital signals can be sent for long distances and suffer less interference than Analog signals.

Fig: Analog Signal.

Fig: Digital Signal.

Transmission Mode ,Base band and Broadband A given transmission on a communications channel between two machines can occur in several different ways. Half duplex transmission: Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full duplex transmission: Full Duplex transmission indicates the transmission of data in two directions simultaneously. Simplex transmission: Simplex transmission is a transmission in which the data flows in only one direction, from the transmitter to the receiver. This type of connection is useful if the data do not need to flow in both directions.

Baseband and Broadband Baseband: Digital communication technology in which the entire bandwidth of a medium such as a wire, cable, or channel, is used to transmit a single signal. Therefore, only one communication channel is available at any given time. Broadband: Broadband refers to telecommunication in which a wide band of frequencies is available to transmit information. Because a wide band of frequencies is available, information can be multiplexed and sent on many different frequencies or channels within the band concurrently, allowing more information to be transmitted in a given amount of time.

LAN , MAN, WAN Local Area Network A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small groups of buildings, such as a school, or an airport. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines Metropolitan Area Network A metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus. A MAN usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides uplink services to wide area networks and the Internet . Wide Area Network A wide area network is a computer network that covers a broad area .This is in contrast with personal area networks , local area networks , campus area networks , or metropolitan area networks which are usually limited to a room, building, campus or specific metropolitan area respectively .

Network interface card A network interface card is a hardware device that handles an interface to a computer network and allows a network-capable device to access that network. The NIC has a ROM chip that contains a unique number, the media access control Address burned into it. The MAC address identifies the device uniquely on the LAN. The NIC exists on the 'Data Link Layer' of the OSI model.

Media Access Control address Media Access Control address is a unique identifier assigned to network adapters or network interface cards usually by the manufacturer for identification. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number. It may also be known as an Ethernet Hardware Address, hardware address, adapter address, or physical address. MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.

Finding the MAC address:


Solaris/SunOS and Linux By using this command # ifconfig -a

Windows XP Run ipconfig/all from a Command Prompt window.

Networking Devices Network devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines. Hub An hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. Repeater A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances . Bridge Bridging is a forwarding technique used in packet-switched computer networks. Unlike routing, bridging makes no assumptions about where in a network a particular address is located. Router In packet-switched networks such as the Internet, a router is a device that determines the next network point to which a packet should be forwarded toward its destination. Switch A network switch computer networking device that connects network segments.

Routing Protocol

Routing requires that every hop, or router, along the path to a packet's destination have a route to forward the packet. Otherwise, the packet is dropped at that hop. This route information can be manually configured on the router or learned dynamically from other routers in the same internetwork.
Static routing

Routes to remote networks with the associated next hops can be manually configured on the router. This is known as static routing. A default route can also be statically configured.
Dynamic routing Routing protocols are the set of rules by which routers dynamically share their routing information. As routers become aware of changes to the networks for which they act as the gateway, or changes to links between routers, this information is passed on to other routers. When a router receives information about new or changed routes, it updates its own routing table and, in turn, passes the information to other routers. Common routing protocols are: Routing Information Protocol (RIP). Enhanced Interior Gateway Protocol (EIGRP). Open Shortest Path First (OSPF).

Network Protocol
The Internet Protocol is a protocol used for communicating data across a packet switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP. IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering distinguished protocol packets from the source host to the destination host solely based on their addresses.

Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4,294,967,296 possible unique addresses. Private Address In the Internet addressing architecture, a private network is a network that uses private IP address space, These addresses are commonly used for home, office, and enterprise local area networks (LANs), when globally routable addresses are not mandatory, or are not available for the intended network applications.
IP address range Number of addresses

10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255

16,777,216
1,048,576 65,536

Public Addresses The vast majority of the addresses in the IPv4 unicast host range are public addresses. These addresses are designed to be used in the hosts that are publicly accessible from the Internet. Even within these address blocks, there are many addresses that are designated for other special purposes.
Address Classes In the original Internet routing scheme developed in the 1970s, sites were assigned addresses from one of three classes: Class A Class B Class C Class D Class E Address Class Class A Class B 1st octet Range 1-127 128-191 Default Subnet Mask 255.0.0.0 255.255.0.0

Class C
Class D Class E

192-223
224-239 240-255

255.255.255.0
Use for Multicasting. Experimental.

Reserved address blocks


CIDR address block 0.0.0.0/8 Description Current network (only valid as source address)

10.0.0.0/8
127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.0.0.0/24 192.0.2.0/24 192.88.99.0/24 192.168.0.0/16 198.18.0.0/15 198.51.100.0/24 203.0.113.0/24 224.0.0.0/4 240.0.0.0/4 255.255.255.255

Private network
Loopback Link-Local Private network Reserved (IANA) TEST-NET-1, Documentation and example code IPv6 to IPv4 relay Private network Network benchmark tests TEST-NET-2, Documentation and examples TEST-NET-3, Documentation and examples Multicasts (former Class D network) Reserved (former Class E network) Broadcast

Making LAN Connection


The RJ-45 connector is the male component crimped on the end of the cable. When viewed from the front, the pins are numbered from 8 to 1. When viewed from above with the opening gate facing you, the pins are numbered 1 through 8, from left to right. This orientation is important to remember when identifying a cable. Straight-through UTP Cables A straight-through cable has connectors on each end that are terminated the same in accordance with either the T568A or T568B standards. Crossover UTP Cables For two devices to communicate through a cable that is directly connected between the two, the transmit terminal of one device needs to be connected to the receive terminal of the other device.

Fig: Straight-through Cables.

Fig: Crossover Cables.

Servers
In a general networking context, any device that responds to requests from client applications is functioning as a server. A server is usually a computer that contains information to be shared with many client systems. For example, web pages, documents, databases, pictures, video, and audio files can all be stored on a server and delivered to requesting clients. There are different types of servers dipped on their service. Such as -

DNS Server. DHCP Server, Mail Server, WEB Server, PROXY Server, Database Server, FTP Server, SAMBA Server and etc.

Fig: Servers

DNS Server: In data networks, devices are labeled with numeric IP addresses, so that they can participate in sending and receiving messages over the network. However, most people have a hard time remembering this numeric address. Hence, domain names were created to convert the numeric address into a simple, recognizable name. The Domain Name System was created for domain name to address resolution for these networks.
The DNS server stores different types of resource records used to resolve names. These records contain the name, address, and type of record . Some of these record types are: A - An end device address. NS - an authoritative name server.

CNAME - the canonical name for an alias; used when multiple services have the single network address but each service has its own entry in DNS.
MX - mail exchange record; maps a domain name to a list of mail exchange servers for that domain.

Primary DNS Server Configuration steps:

1. Set IP Address.

[root@pc1~]#setup

2. Restart the network service [root@pc1~]#/etc/init.d/network restart 3. Edit the /etc/sysconfig/network [root@pc1~]#vim /etc/sysconfig/network

Fig: IP address Assign.

Fig: Set the Domain Name.

4.Then Edit resolv.con fig file

[root@pc1~]# vim /etc/resolv.conf

5.Then go to /var/ftp/pub/Server and install package BIND and Chching-Name


[root@pc1~]# rpm -ivh bind-* [root@pc1~]# rpm -ivh caching-nameserver-9.3.6-4.P1.el5.i386.rpm

6.Then go to /var/named/chroot/etc/ and copy named.caching-nameserver.conf as name named.conf.Then change the group permission
[root@pc1~]# cd /var/named/chroot/etc/ [root@pc1~]# cp named.caching-nameserver.conf named.conf [root@pc1~]# chgrp named named.conf

7.Then copy some line from named.rfc1912.zones file and paste that line in named.conf and disable some line and save that file. [root@pc1~]# vim named.rfc1912.zones [root@pc1~]# vim named.conf

8.Go to /var/named/chroot/var/named/ directory and copy named.local as thesis.fz and edit that file [root@pc1~]# cd /var/named/chroot/var/named/ [root@pc1~]# cp named.local thesis.fz [root@pc1~]# vim thesis.fz 9.Copy the cp thesis.fz file as thesis.rz. And edits this file. Then change the group permission for both file [root@pc1~]# cp thesis.fz thesis.rz [root@pc1~]# vim thesis.rz [root@pc1~]# chgrp named thesis.fz [root@pc1~]# chgrp named thesis.rz

Fig: Forward Zone File.

Fig: Reverse Zone File.

10.Then restart some services and test the DNS server. [root@pc1~]# /etc/init.d/named restart [root@pc1~]# chkconfig named on [root@pc1~]# dig thesis.com [root@pc1~]# ping 192.168.0.254

Fig: Output by DIG Command.

Fig: Output by PING Command.

DHCP Server: The Dynamic Host Confirmation Protocol (DHCP) service enables devices on a network to obtain IP addresses and other information from a DHCP server. This service automates the assignment of IP addresses, subnet masks, gateway and other IP networking parameters.
DHCP Server Configuration Steps: 1. Install the dhcp packages. 2. Then go to directory /usr/share/doc/dhcp-3.0.5/ directory and copy. 3. dhcpd.conf.sample as /etc/dhcpd.conf and edit that file. 4. Then restart some services for on DHCP server.

Mail Server: E-mail, the most popular network service, has revolutionized how people communicate through its simplicity and speed. Yet to run on a computer or other end device, e-mail requires several applications and services. Two example Application layer protocols are Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP), As with HTTP, these protocols define client/server processes. Mail Server Configuration steps: 1.Edit the file vim /etc/mail/sendmail.mc. We make some change on line 116 and 155.We describe in this file our DNS name. [root@pc1~]# vim /etc/mail/sendmail.mc 2.Then open /etc/mail/local-host-names and here set pc name and domain name. [root@pc1~]# vim /etc/mail/local-host-names 3.Then open /etc/mail/access file here describe the access and rejected domain.

4.In vim /etc/dovecot.conf file need to make enable line 20.

5.Now need to make macro sendmail and for relay. [root@pc1~]# m4 /etc/mail/sendmail.mc> /etc/mail/sendmail.cf [root@pc1~]# makemap hash /etc/mail/access.db < /etc/mail/access
6.Now need to change forward and reverse zone file.

Fig: Forward Zone File.

Fig: Reverse Zone File.

7.Service named restart. [root@pc1~]# m4 /etc/mail/sendmail.mc> /etc/mail/sendmail.cf [root@pc1~]# makemap hash /etc/mail/access.db < /etc/mail/access [root@pc1~]# service sendmail restart [root@pc1~]# service dovecot restart [root@pc1~]# chkconfig named on [root@pc1~]# chkconfig sendmail on [root@pc1~]# chkconfig dovecot on 8.For test MAIL server, we need to make others two user in linux system. [root@pc1~]# adduser rajib [root@pc1~]# adduser tunna [root@pc1~]# passwd rajib [root@pc1~]# passwd tunna

Telnet: Telnet was developed to meet that need. Telnet dates back to the early 1970s and isamong the oldest of the Application layer protocols and services in the TCP/IP suite.Telnet provides a standard method of emulating text-based terminal devices over the data network. Both the protocol itself and the client software that implements the protocol are commonly referred to as Telnet. Telnet configuration steps: 1.Install package telnet-server. For support need to install xinets package. [root@pc1~]# rpm ivh telnet-server* [root@pc1~]# rpm ivh xinetd* 2.Now for access via telnet we edit /etc/xinetd.d/telnet .Just disable=no

3.Then restart the xinetd services [root@pc1~]# service xinetd restart

Testing Telnet:

This All about our Presentation .

S-ar putea să vă placă și