Download Guide to Networking Essentials, Fifth Edition

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Plan 9 from Bell Labs wikipedia , lookup

AppleTalk wikipedia , lookup

Security-focused operating system wikipedia , lookup

Unix security wikipedia , lookup

Transcript
Guide to Networking Essentials, Fifth Edition
Chapter 8
Simple Network Operations
At a Glance
Instructor’s Manual Table of Contents

Overview

Objectives

Teaching Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms

Technical Notes for Hands-On Projects
8-1
Guide to Networking Essentials, Fifth Edition
8-2
Lecture Notes
Overview
In Chapter 8, students learn about simple network operations. They begin by learning
about the operation fundamentals of network operating systems, their software
components, and how to install them. Students also learn about the process of
configuring network services. Finally, they learn about network application installation
and configuration concepts.
Objectives





Explain the operation fundamentals of network operating systems
Describe networking software components
Describe the basic steps of network operating system installation
Configure network services
Explain network application installation and configuration concepts
Teaching Tips
Network Operating Systems
1. Provide an introduction to the role of NOSs. Stress their importance and briefly mention
how they evolved.
Basic Functions of an Operating System
1. Describe the role of an operating system.
2. Explain how the two features necessary in an NOS work: multitasking and time slicing.
Stress that every contemporary operating system includes these functions.
Teaching
Tip
Explain that many of today’s CPUs have the capability to act as multiple CPUs
through the use of hyperthreading technology or dual-core CPU design, thus
allowing these CPUs to process more than one instruction at a time.
Teaching
Tip
For more information on network operating systems, visit:
http://en.wikipedia.org/wiki/Network_operating_system.
Guide to Networking Essentials, Fifth Edition
8-3
3. Briefly describe the two types of multitasking: preemptive and cooperative. Stress that a
true high-performance NOS must be a preemptive multitasking system.
Teaching
Tip
Read more about multitasking at:
http://en.wikipedia.org/wiki/Computer_multitasking.
Software Components of Networking
1. Describe some of the capabilities of an NOS (see list on page 294).
2. Explain that these capabilities are made possible through a number of NOS
components, such as naming services, directory services, and client and server software,
discussed in the following sections.
Naming Services
1. Explain the importance and role of naming services.
2. NetBIOS Names. Explain that until the release of Windows 2000, Microsoft networking
depended almost completely on using NetBIOS names to identify computers, shared
drives and directories, printers, and other network resources. Use Table 8-1 to discuss
the restrictions that apply to NetBIOS names. Note that ending a name with $ prevents
it from appearing in the NetBIOS browse list.
3. Universal Naming Convention. Introduce the term drive mapping. Describe the role
(and syntax) of UNC in Windows and Linux (running Samba) operating systems.
Teaching
Tip
For more information on UNC, visit: www.webopedia.com/TERM/U/UNC.html.
4. Domain Names and DNS. Explain the importance of domain names. Briefly describe
how DNS works. Note that at least one DNS server is maintained for a domain.
Teaching
Tip
Note that beginning with Windows 2000 Server, Microsoft included support for
the Dynamic DNS (DDNS) naming service, which largely replaces the NetBIOSbased naming service in Microsoft networks. However, NetBIOS naming is still
configured by default for backward compatibility.
Directory Services
1. Describe the role, importance, and characteristics of directory services.
2. Mention some examples (e.g., Active Directory, eDirectory, and NIS). Briefly introduce
the role of X.500 and LDAP.
Guide to Networking Essentials, Fifth Edition
Teaching
Tip
8-4
For more information on directory services, visit:
http://en.wikipedia.org/wiki/Directory_service,
http://en.wikipedia.org/wiki/Novell_Directory_Services, and
http://en.wikipedia.org/wiki/Active_Directory.
Client Network Software
1. Explain the role of client network software. Make sure students understand the role of
redirectors and designators. Introduce the term share.
Teaching
Tip
Stress that although Microsoft documentation uses the term “redirector,” Novell
uses the term “requester.” In Linux (and some other OSs), the term “shell”
sometimes refers to this component.
2. Note that currently, client network software can also refer to Internet access
applications.
Server Network Software
1. Explain that server network software, a component integral to an NOS, handles
resources and services to be distributed to clients. Use Figure 8-1 to explain that the
purpose of a server is to allow sharing resources.
2. Note that server software can also perform access control, enable user/group
management, perform logon authentication, facilitate network administration, and
ensure some level of fault tolerance.
Client and Server Capabilities
1. Explain that many NOSs (e.g., Windows Server 2003, XP, Vista) include client and
server capabilities in both the server versions and the versions intended for desktop
computers.
2. Stress that generally, the desktop version of the NOS is not as powerful or robust as the
server version.
Teaching
Tip
Explain that if a single PC hosts more than two heavily accessed resources, you
should consider transferring these resources to a real server because accessing
them can reduce performance on a PC running a desktop OS.
Guide to Networking Essentials, Fifth Edition
8-5
Quick Quiz 1
1. What is an NOS?
Answer: A network operating system (NOS) is a computer operating system with
functions that facilitate network communication, allow computer resources to be shared
on a network, and provide management functions to control access to those resources.
The NOS serves as an interface for users and applications to access the network and its
resources.
2. ____________________ is the capability of an OS to support numerous processes at
one time.
Answer: Multitasking
3. ____________________ is the process of associating a network storage resource with a
local drive letter.
Answer: Drive mapping
4. What is a directory service?
Answer: A directory service is a network service that manages information about other
network services, resources, users, groups, and other objects so that users can access
resources and services by browsing for them or asking for them by type.
Installing a Network Operating System
1. Explain that installing an NOS is not much different from installing a standard desktop
OS.
Installation Preparation
1. Explain that before installation of an NOS can begin, you must complete a few
preparatory steps. Before you begin an NOS installation, you need to understand the
following network aspects (briefly describe each):
a. Size of the Network. Explain that the size of a network can affect which services
you decide to configure, how many servers you need, and the number of
connection licenses you require.
b. Server Job Requirements. Explain that the services and resources hosted by a
server determine what components are installed. Make sure students understand
the difference between a domain controller and a member server.
c. Storage Device Organization. Stress that storage device organization is crucial
to a network’s success when accessibility, performance, and fault tolerance are
essential. Introduce the term partition. Briefly describe each of the four ways to
organize an NOS drive: multiple-boot, single-partition single-NOS, multiplepartition single-NOS, and fault-tolerant storage.
Guide to Networking Essentials, Fifth Edition
8-6
d. File Systems. Describe the role of file systems and explain that they differ in
how they allocate space, how files are located on disk, the level of fault
tolerance, and how access to files is secured.
e. Naming Conventions. Stress the importance of having a consistent (and easy to
use and understand) naming convention that enables clear object identification.
Describe some common naming schemes for user names, group names, and
computer names.
f. Network Adapter Configuration. Explain that if an NIC is not plug-and-play,
you must verify compatibility with the operating system version you are using
and have a driver disk ready in case the OS doesn’t recognize the NIC.
g. Protocol Selection. Explain that protocol and configuration options must be
compatible for computers to communicate. For example, TCP/IP requires the
following pieces of information before NOS installation begins: IP address,
subnet mask, default gateway, DNS, WINS, and DHCP.
h. Hardware Compatibility. Describe how to check if the hardware components of
a computer are compatible with the NOS (in Windows, Linux and NetWare).
Teaching
Tip
Have students experienced any computer hardware compatibility issues before?
If so, you may ask them to share their experiences in class.
Installing Microsoft Windows Servers
1. Explain that Windows server versions are not much more difficult to install than
Windows XP or Vista.
2. Beginning the Installation. Explain that the first step is to choose the installation
method, which includes answering the following questions: Complete baseline
installation or use existing OS? Network or local installation? Use Figure 8-2 to explain
that after running Winnt.exe or Winnt32.exe, the installation begins with a text-based
phase.
3. Text-Based Phase. Use Figure 8-3 to explain that during the initial text-based phase,
you configure hard drives, format file systems, confirm the license agreement, and
define the name of the system directory. Note that after this phase has been completed,
the distribution files are copied into a temporary directory on the destination partition.
4. GUI Phase. Briefly describe the GUI phase installation process.
5. Network Setup Phase. Briefly describe the network setup phase, including what happens
after this phase is completed.
Installing Novell NetWare 6.5
Guide to Networking Essentials, Fifth Edition
8-7
1. Explain that you can install NetWare over the network or from a CD.
2. Note that the primary install utility, INSTALL.NLM, has two phases: text mode and
GUI mode. Briefly describe each of these phases.
Installing Linux
1. Note that installing Linux is similar to other NOS installations. Use Figures 8-4 through
8-6 to briefly describe the installation process of Linux Fedora Core 4.
2. Make sure students understand the role of a boot loader.
3. Stress that Linux developers have always been concerned about security, so they
developed a built-in firewall for the Linux OS. Thus, during installation of Linux, you
can select the level of security you want and customize the firewall’s operation, as
shown in Figure 8-6.
Configuring Network Services
1. Describe the role of network services. Explain that the two most basic shared network
resources (network services) are printers and file folders.
2. Note that you can add numerous capabilities, resources, and delivery methods to a
default NOS installation to extend its usefulness.
Installing, Removing, and Configuring Network Services
1. Use Figure 8-7 to explain that setting up network services is similar to configuring
hardware device drivers. You may describe the role of MMC snap-ins (in Windows)
and packages (Linux).
Network Bindings
1. Explain that binding is the process of linking network components from various levels
of the network architecture to enable communication between those components.
2. Explain that while many NOSs enable all valid bindings by default, this often results in
some performance degradation.
3. Stress that binding order should enhance the computer’s use of the network.
Network Printing
1. Describe the role of the redirector in network printing. Briefly describe the role of each
of the three components of network printing: the print server, the print queue, and the
printer.
Guide to Networking Essentials, Fifth Edition
Teaching
Tip
8-8
User access, security, and auditing are discussed in Chapters 9 and 10. One can
address these issues simply by taking additional steps in the share-establishment
process for printers and folders or directories.
2. Note that in some cases, a workstation or client computer must have local printer
drivers installed; in other cases, a workstation can access printer drivers from the print
server. In either case, a new logical printer that points to the printer share, as shown in
Figure 8-8, is installed.
3. Printer Management. Explain that on most networks, you manage printers from local
direct access or through the network printer share. Note that sometimes, you may use a
Web browser (e.g., IPP) to manage printers. Note that the user must have the right level
of access granted to perform administration tasks. Briefly list the activities that are
usually covered by print management.
4. Sharing Fax Modems. Explain that this feature is not often a default component in an
NOS, but many third-party vendors offer add-on products to share a fax modem over a
network.
File Shares
1. Explain that a file share, sometimes referred to as a directory share, is the second
primary network service. Use Figure 8-9 to explain that file shares make it possible for
clients to access and interact with storage devices anywhere on the network.
2. Stress that the redirector and the designator play major roles in the file-sharing service.
3. Briefly describe each of the three ways in which you can access a file share. Note that
like a printer share, you can manage a file share by granting and restricting user access
levels.
4. Explain that sharing files and folders in Linux is usually done by using NFS or Samba.
Network Applications
1. Explain that network applications are designed for multiple simultaneous users on
computers on a network.
2. Discuss the advantages and disadvantages of network applications (versus traditional
local applications).
3. Briefly describe each of the following types of architectures for network applications:
centralized, file-system sharing, and true client/server.
Guide to Networking Essentials, Fifth Edition
8-9
E-Mail or Messaging
1. Explain that e-mail is the most popular network application. Note that e-mail is fast and
asynchronous, and based on a common protocol and standards for communication.
2. Briefly describe each of the following protocols: POP3, SMTP, IMAP, X.400, X.500,
and MHS.
3. Students should run Simulation 8-1 to better understand the process of sending an
Internet e-mail message.
Scheduling or Calendaring
1. Describe the characteristics and tasks usually performed by a scheduling application.
Teaching
Tip
Students may be familiar with scheduling applications. You may ask them to list
some scheduling applications (and their characteristics) in class.
Groupware
1. Describe the characteristics and tasks usually performed by groupware applications.
2. Stress that the biggest explosion in groupware products is integrating PDAs with
corporate networks.
Teaching
Tip
Students may be familiar with groupware applications. You may ask them to list
some groupware applications (and their characteristics) in class.
Quick Quiz 2
1. What is the difference between a domain controller and a member server?
Answer: A domain controller authenticates users and maintains directory services and
the security database for a domain. A member server simply hosts a service or resource
and doesn’t participate in maintaining the directory and security database.
2. A(n) ____________________ is a logical organization of disk space, in which each
portion appears as a separate logical drive.
Answer: partition
3. What are network services?
Answer: Network services, the basic resources on all networks, are the foundation of
network applications. Without these basic services, networks cannot exist.
Guide to Networking Essentials, Fifth Edition
8-10
4. E-mail clients use the ____________________ protocol to download incoming
messages from an e-mail server to their local desktops.
Answer: Post Office Protocol version 3 (POP3)
Post Office Protocol version 3
POP3
Class Discussion Topics
1. Of the e-mail protocols discussed in this chapter, which ones have students used or
configured before? Ask them to discuss their experiences with these e-mail protocols.
2. Have students installed or configured an NOS before? If so, ask them to discuss their
experiences.
Additional Projects
1. Ask students to visit www.distrowatch.com to find out which are (currently) the top ten
Linux distributions. For each distribution, they should find out if it is recommended to
be installed on servers (as an NOS) or on workstations.
2. Ask students to find out if a Universal Naming Convention (UNC) is used at the class
lab (or at any other lab). If so, ask them to document how to name users, groups, and
computers following the lab’s convention.
Additional Resources
1. Network Operating System:
http://en.wikipedia.org/wiki/Network_operating_system
2. Computer Multitasking:
http://en.wikipedia.org/wiki/Computer_multitasking
3. Time Slice Multiplexing:
http://en.wikipedia.org/wiki/Time_slice_multiplexing
4. What is UNC?
www.webopedia.com/TERM/U/UNC.html
5. Directory Service:
http://en.wikipedia.org/wiki/Directory_service
6. Novell eDirectory:
http://en.wikipedia.org/wiki/Novell_Directory_Services
7. Active Directory:
Guide to Networking Essentials, Fifth Edition
8-11
http://en.wikipedia.org/wiki/Active_Directory
8. An LDAP Roadman & FAQ:
www.kingsmountain.com/ldapRoadmap.shtml
Key Terms
 binding — The OS-level association of NICs, protocols, and services to fine-tune
network operation and performance.
 client network software — A type of software designed for workstations that enables
the use of network resources.
 cooperative multitasking — A form of multitasking in which each process controls the
length of time it maintains exclusive control over the CPU.
 designator — This NOS software component aids in network resource interaction and
drive mapping. Working in coordination with a redirector, it exchanges the locally
mapped drive letter with the correct network address of a directory share inside a
resource request.
 directory service — A comprehensive network service that manages information about
network services, resources, users, groups, and other objects, so that users can access
resources and services by browsing for them, or asking for them by type, along with
maintaining and enforcing access control information for directory objects.
 drive mapping — The convention of associating a local drive letter with a network
directory share to simplify access to the remote resource.
 file system — The method by which an operating system stores, organizes, and
manages access to files on a mass storage device, such as a hard drive.
 groupware — A type of network application in which multiple users can
simultaneously interact with each other and with data files.
 Internet Message Access Protocol (IMAP) — An Internet e-mail standard that might
replace POP3 because of its advanced message controls and fault-tolerance features.
The appeal of IMAP (a more modern client message transfer protocol) is that it permits
clients to read and manage messages locally while leaving them stored on the server.
 member server — Any server on a Windows NT or Server 2000/2003 network that’s
not responsible for user authentication.
 Message Handling System (MHS) — A Novell-developed standard that’s similar to
X.400.
 multitasking — A mode of CPU operation in which a computer processes more than
one task at a time. In most instances, multitasking is an illusion created through the use
of time slicing.
 naming convention — A predetermined schema for naming objects within network
space. It simplifies the location and identification of objects.
 network applications — Enhanced software programs made possible through the
communication system of a network. Examples include e-mail, scheduling, and
groupware.
 network services — Resources offered by a network that aren’t normally found in a
standalone OS.
 partition — A logical separation of disk space that is viewed as a separate logical
drive.
Guide to Networking Essentials, Fifth Edition
8-12
 Post Office Protocol version 3 (POP3) — An Internet message transfer protocol that
e-mail clients use to copy messages from an e-mail server to a client machine to be read
and managed on the local desktop.
 preemptive multitasking — A form of multitasking in which the NOS or OS retains
control over the length of time each process can maintain exclusive use of the CPU.
 server network software — A type of software designed for a server computer; this
software enables the hosting of resources for clients to access.
 share — A network resource made available for remote access by clients.
 time slicing — A method of granting CPU cycles to different processes by limiting the
amount of time each process has exclusive use of the CPU.
 Universal Naming Convention (UNC) — A standard method for naming network
resources; it takes the form \\servername\sharename.
 X.400 — A hardware- and software-independent message-handling protocol.
 X.500 — An improved message-handling protocol that can communicate across
networks and maintain a global database of addresses.
Technical Notes for Hands-On Projects
Hands-On Project 8-1: In this project, students use Windows Explorer (Windows XP).
Hands-On Project 8-2: In this project, students use Windows XP’s Add Printer Wizard.
Hands-On Project 8-3: In this project, students use Windows XP’s My Network Places.
Hands-On Project 8-4: In this project, students install a new network service on a Fedora Core
4 Linux computer (System Settings  Add/Remove Applications). This project assumes
that the Samba service has not yet been installed, as would be the case on a typical
workstation or personal desktop.
Hands-On Project 8-5: In this project, students create a custom Microsoft Management Console
(MMC) in Windows XP.
Hands-On Project 8-6: This project requires a Web browser and Internet access.