Introduction To Networking - Parkland    

Last Modified:
Thursday, 16-Nov-2017 11:06:36 CST

CSC130 Fall 17 - Outline


Week 1
Aug. 21
Week 2
Aug. 28
Week 3
Sept. 5
Sept. 4 -Labor Day
Week 4
Sept. 11
Week 5
Sept. 18
Week 6
Sept. 25
Week 7
Oct. 2
Week 8
Oct. 9
Week 9
Oct. 16
Week 10
Oct. 23
Week 11
Oct. 30
Week 12
Nov. 6
Week 13
Nov. 13
Week 14
Nov. 20
Thanksgiving Break
Begins Wed. 5pm
Week 15
Nov. 27
Week 16
Dec. 4

Week 1: Aug. 21

Content:
Labs:

Lab 1: In class: Rebuild your virtual machine and run ipconfig /all to view your TCP/IP stack information.

Lab 2: In class: We started working on getting our new hubs installed.

For Next Week:
Get the book and read Ch1.

| Top | CSC130 Home | Overview |  

Week 2: Aug. 28

Content:


Finish Chapter 1 - Introduction

Read Chapter 3 - Physical Media

Labs:

Lab 3: In class: We were working on building the infrastructure for our lab machines. See Net Notes
Lab 4: In class: We looked at how a machine comes on a TCP/IP network. We looked at RARP (gratuitious arp again) and how a machine comes on a TCP/IP network, and the TTL (using tracert) in the packet sniffer. We also connected to our DNS (Domain Name Server) server at 192.168.1.155 , we also looked at the NBNS (NetBIOS Name Service).



For Next Week:

Exercise 1 Chapter 1 and 3: Intro Topologies and Wiring Specifications.
Due: See Calendar in Cobra.

| Top | CSC130 Home | Overview |  

Week 3: Sept. 5
Sept. 4 -Labor Day

Content:

Finish Chapter 1

Read Chapter 2 - The OSI Model
OSI Model
Lecture on the OSI Model and Access Methods
The OSI Model


Lecture

Continue covering Ch 2 and the OSI Model.

There will be a quiz covering the OSI model on the second day of class next week.

DOS Commands You Need to



Labs:


Lab 5: OSI Model upper layers, netstat,
configure redirector: net use h: \\servername\sharename /persistent:no
ftp .

Lab 6: We examined Layers 5 6 and 7 in the OSI model, including using command line telnet [host] [port]

For Next Week:
Exercise 2 Chapter 2, the OSI Model:

| Top | CSC130 Home | Overview |  

Week 4: Sept. 11

Content:

Chapter 2: OSI model continued. Prep for Quiz next week.

Quiz covering the OSI Model the First meeting of NEXT week.
At the beginning of the class 25 questions 25 points 35 minutes. Open book.

The net Commands


DOS Commands

Labs:

Lab 7: We were looking at the OSI model's middle layers, Layer3 and 4, We hooked up the new routers and ran tracert and looked at TTL. We then saw that CLOSED ports return RST (reset) packets. telnet [host] [port_number] sends a SYN packet to the port of our choice.



Lab 8: Finsihed up the OSI model and had overview of all layers focusing more on the middle.


For Next Week:


Quiz Chapter 2:
Covering Ch2 the OSI Model.
This will be next on the OSI Model next week the first class meeting of the week.

| Top | CSC130 Home | Overview |  

Week 5: Sept. 18

Content:



Quiz on the OSI Model on the first day of this week.

Chapter 6-7-8 TCP/IP

TCP/IP Resources:
Chapter 6 - TCP/IP

Chapter 6 overview Chapter 7 - IP Addressing






Chapter 17, TCP/IP utilities
The Microsoft NetBIOS NET Commands (This goes along with Chapter 17 in your book)




Labs:
Lab 9:Begin Ch 6. Sniffed DNS, tracert and Layer 3 Lab 10:Putty to connect to shaula.csit.parkland.edu and
grep [searchstring] /etc/services
to look for IANA assigned port assignemtns

For Next Week:

cobra Exercise 3 - Ch 6-7-8 TCP/IP Fundamentals:



| Top | CSC130 Home | Overview |  

Week 6: Sept. 25


Content:


Quiz - Lab practical on day 2 of the week after next.

Exam 1 will be on Week 9 day 1. It will cover everything that we have covered so far including the labs.

Chapter 6 - IP The Internet Protocol
Chapter 6 overview
TCP/IP Web Pages

Chapter 7 - IP Addressing
TCP/IP Address Classifications

Chapter 8 - Subnetting
Subnetting a TCP/IP network






Lab Material:


Lab: FTP the file transfer protocol: Lab: Login Scripts and PDC

For Next Week:

cobra Exercise 4 - TCP/IP and DNS advanced and subnetting:

| Top | CSC130 Home | Overview |  

Week 7: Oct. 2

Content:

Quiz - Lab practical on Day 2 of NEXT week.



Name Services
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • c:\windows\system32\drivers\etc\hosts
  • NetBIOS Name Service - UDP Port 137
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • The IANA and ICANN manage the system overall.
  • nslookup - Information about the nslookup utility
Day 2: We continued on with the DNS Lab: including forward and reverse lookups. NetBIOS name service, hosts file, forward and reverse files on surt.csc130.parkland.edu ,

Lab Material:



Lab: Name Services and hosts file
C:\windows\system32\drivers\etc\hosts

Day 2: We continued on with the DNS Lab: including forward and reverse lookups. NetBIOS name service, hosts file, forward and reverse files on surt.csc130.parkland.edu ,

For Next Week:


Week 8: Oct. 9

Content:




Exam 1 is Next Week.

Lab Practical is Day2 this week


Review for Lab practical.


TCP/IP Utilities Ch 17

pp. 643, Table 17.5 NetBIOS service Definitions table
TCP/IP Utilities



Lab Material:

Lab: Review for Lab practical.
See the announcement on the front page of cobra.

Lab: We are continuing on working on the lab wiring after the Practical.
For Next Week:

cobra Exercise 5 TCP/IP Utilities Ch 17:


| Top | CSC130 Home | Overview |  

Week 9: Oct. 16


Content


Chapter 17 TCP/IP Utilities
The TCP/IP Utilities
How to send packets to a port of your choice..
Using telnet to connect to a port of your choice on a host. If you do not have the telnet.exe program on your system you can use putty and select port 23 .
Demonstration of tunneling.

Day 2: Exam 1







Lab Material:


Lab TCP/IP Utilities.

TCP-IP Utils Lab


For Next Week:


| Top | CSC130 Home | Overview |  

Week 10: Oct. 23

Content



Chapter 13 Authentication and Access Controls

Security Overview .
Intro to Security concepts.


Lecture about Passwords and other Account security
Demonstration of Access Controls
net commands.


Lab Material

Lab: POP Mail - Installing software in a networked NT Domain
POP mail Lab Intro
POP mail Lab

Lab desktop.ini: We eliminated error messages from the startup process. And saw that our profiles are networked once using a PDC.



For Next Week:


cobra Exercise 6 - Ch 13 authentication and access controls.

| Top | CSC130 Home | Overview |  

Week 11: Oct. 30

Content
Be sure to finish the POP mail Lab.

Continuing Discussion on Ch 13 account security.
Password Hashes
Access Control Lists
How files are stored and the process of Authorization

Security Overview .

Lab Material:

Lab - ACL's, machine accounts, principle of isolation etc. Take Ex6 at least 2 times for a 10 pointer.

On Day 2 we did not have a specific lab. We went over a lot of details on working with the PDC and networked software installs.



For Next Week:

| Top | CSC130 Home | Overview |  

Week 12: Nov. 6

Content

Chapter 13 - Authentication and Access Controls continued

Account Security and policies

Security Overview .


Lab Material:


Lab Day 1: Lab POP PDC 2 - You will login to the PDC and be sure that you have everything configured correctly to network your e-mail. You will then have me come up and watch you as you login to another machine and send an e-mail to smauney@surt.csc130.parkland.edu using your networked e-mail client.

Lab day 2 (ungraded) - The difference between AUTH(entication) and Authorization and how a file is stored. - We found that even though all of our files that were in the \\OLIN\NETLOGON share could only be executed by us, ANYONE could delete them. There is a difference in how files are opened, so for instance if a file was opened to execute the local file permission denying anyone else execute access denied that.
BUT if someone tried to open the file for deletion the permission for the parent directory was checked and since anyone could do anything at that level, the file would be deleted.
To prevent this, we employed the "sticky bit" which can be viewed like this on shaula.csit.parkland.edu
ls -ld /tmp which will show that the permission on the /tmp directory is:
drwxrwxrwt where the t is the "sticky" bit. This sticky bit allows anyone to execute the directory which means "pass through it" but it forces ownership of a file to delete it.
The permission to set the sticky bit on a publicly writable directory is:
chmod 1777 dirname
Also remember this little bit of complication was created by the fact that there is interaction between 2 services, Samba server and the local Linux file services. Gotta watch for that!
See Also: man chmod and our Linux textbook for a more complete handling of the sticky bit.




For Next Week:


| Top | CSC130 Home | Overview |  

Week 13: Nov. 13

Content:

Encryption:

Encryption Continued:

Lab Material:


Lab: ssh-keygen We used public-key encryption to provide Authentication services. We also looked at the stickybit and Authorization in a Linux/Windows Environment
Lab - ssh-keygen


Lab: Netmeeting
Lab Intro - Netmeeting
Lab - Netmeeting





For Next Week:

We are moving into Chapter 14 next week.

| Top | CSC130 Home | Overview |  

Week 14: Nov. 20
Thanksgiving Break
Begins Wed. 5pm

Content

Network Threats and Mitigation - Chapter 14
Running whois from shaula.csit.parkland.edu to find out who is responsible for a host on the internet.

Interacting With a Web Server

  • Transferring files to shaula.csit.parkland.edu using WinSCP
  • Using a .htaccess file to override default Web Server Configurations
  • Looking at the configuration of the Web server on www.csit.parkland.edu
  • /etc/httpd/httpd.conf
  • /etc/httpd/*
  • /etc/httpd/extra/*
  • Looking at the web server error logs
  • /var/log/httpd/vhosts/www/error_log


  • Lab Material:
    Day 1: Interacting with a Web server lab


    For Next Week:

    | Top | CSC130 Home | Overview |  

    Week 15: Nov. 27

    Content

    Chapter 14 Continued: Firewalls and Secure Configurations

    Diffie Hellman key exchange

    Diffie Hellman Key exchange is where a public key encrypted session is used to generate a private key pair which is then used in a TCP session in HTTPS.

    Trust Relationships and digital certificates.

    Secure Sockets Layer Client challenge and encryption suite identification

    Lab Material:



    VNC
    VNC - vnc Remote System Management
    VNC - Real VNC
    Lab on vnc Lab

    Binding Network Protocols
    Intro - Bindings
    Lab - Bindings





    For Next Week:



    | Top | CSC130 Home | Overview |  

    Week 16: Dec. 4

    Content

    Chapter 15 Physical and Hardware Security.

    Firewalls and Secure Configurations

    Lecture on fault Tolerance and Disaster Recovery
    RAID
    Physical and Hardware Security Ch 15.
    The attrib command

    Backup Types:

    Videos on IPv6

    IPv6
    IPv6 Addressing

    Review for final.

    Lab Material:



    Making a Cat 5 Cable Lab
    Overview of Cabling
    Cable Assembly
    Punchdown
    Cable Testing

    For Finals Week:

    Final Review

    Finals Week Finals Week
    Dec. 11-15




    Final Exams:

    Sean's Finals Schedule

    | Top |