Introduction To Networking - Parkland    

Last Modified:
Monday, 23-Apr-2018 10:10:12 CDT

CSC130 Summer 18 - Outline


Week 1
Jan. 16 Tue.
Mon 15 MLK Day
Week 2
Jan. 22
Week 3
Jan. 29
Week 4
May 21
Week 5
May 28
Week 6
June 4
Week 7
June 11
Week 8
June 18
Week 9
June 25
Week 10
July 2
Week 11
July 9
Week 12
July 16
Week 13
July 23
Week 14
July 30
Week 15
Aug. 6
Week 16
May 7

Week 1: Jan. 16 Tue.
Mon 15 MLK Day

Content:
Labs:

Lab : In class: Rebuild your virtual machine and run ipconfig /all to view your TCP/IP stack information.


For Next Week:
Get the book and read Ch1.

| Top | CSC130 Home | Overview |  

Week 2: Jan. 22

Content:


Finish Chapter 1 - Introduction

Read Chapter 3 - Physical Media
Our Network Documentation

Labs:
Lab : In class: Run the packet sniffer and look at the following protocols arp , ping and nslookup protocols.
Lab : In class: We were working on building the infrastructure for our lab machines. See Net Notes
Lab : In class: We looked at how a machine comes on a TCP/IP network. We looked at RARP (gratuitious arp again) and how a machine comes on a TCP/IP network, and the TTL (using tracert) in the packet sniffer. We also connected to our DNS (Domain Name Server) server at 192.168.1.155 , we also looked at the NBNS (NetBIOS Name Service).



For Next Week:

Exercise 1 Chapter 1 and 3: Intro Topologies and Wiring Specifications.
Due: See Calendar in Cobra.

| Top | CSC130 Home | Overview |  

Week 3: Jan. 29

Content:

Finish Chapter 1

Read Chapter 2 - The OSI Model
OSI Model
Lecture on the OSI Model and Access Methods
The OSI Model


Lecture

Continue covering Ch 2 and the OSI Model.

There will be a quiz covering the OSI model on the second day of class next week.

DOS Commands You Need to



Labs:


Lab: OSI Model upper layers, netstat,
configure redirector: net use h: \\servername\sharename /persistent:no
ftp .

Lab: Layers 5 6 and 7 in the OSI model, including using command line telnet [host] [port]

For Next Week:
Exercise 2 Chapter 2, the OSI Model:

| Top | CSC130 Home | Overview |  

Week 4: May 21

Content:

Chapter 2: OSI model continued. Prep for Quiz next week.

Quiz covering the OSI Model the First meeting of NEXT week.
At the beginning of the class 25 questions 25 points 35 minutes. Open book.

The net Commands


DOS Commands

Labs:

Lab: We were looking at the OSI model's middle layers, Layer3 and 4, We hooked up the new routers and ran tracert and looked at TTL.
We saw that CLOSED ports return RST (reset) packets. telnet [host] [port_number] sends a SYN packet to the port of our choice.



Lab 8: Finsihed up the OSI model and had overview of all layers focusing more on the middle.


For Next Week:


Quiz Chapter 2:
Covering Ch2 the OSI Model.
This will be next on the OSI Model next week the first class meeting of the week.

| Top | CSC130 Home | Overview |  

Week 5: May 28

Content:



Quiz on the OSI Model on the first day of this week.

Chapter 6-7-8 TCP/IP

TCP/IP Resources:
Chapter 6 - TCP/IP

Chapter 6 overview Chapter 7 - IP Addressing






Chapter 17, TCP/IP utilities
The Microsoft NetBIOS NET Commands (This goes along with Chapter 17 in your book)




Labs:

Class Lab:Putty to connect to shaula.csit.parkland.edu and
grep [searchstring] /etc/services
to look for IANA assigned port assignments
Class Lab:Begin Ch 6. Sniffed ftp, tracert and layer3 calculate netmasks.

FTP the file transfer protocol:

For Next Week:

cobra Exercise 3 - Ch 6-7-8 TCP/IP Fundamentals:



| Top | CSC130 Home | Overview |  

Week 6: June 4


Content:


Quiz - Lab practical on day 2 of next week.

Exam 1 will be on Week 8 day 1. It will cover everything that we have covered so far including the labs.

Chapter 6 - IP The Internet Protocol
Chapter 6 overview
TCP/IP Web Pages

Chapter 7 - IP Addressing
TCP/IP Address Classifications

Chapter 8 - Subnetting
Subnetting a TCP/IP network






Lab Material:


Lab: DNS Search Domains and the hosts file.
C:\windows\system32\drivers\etc\hosts file.
Lab: Login Scripts and PDC

For Next Week:

cobra Exercise 4 - TCP/IP and DNS advanced and subnetting:

| Top | CSC130 Home | Overview |  

Week 7: June 11

Content:

Quiz - Lab practical on Day 1 of next week.

Exam 1 - midterm on Day 2 of NEXT week.

We spent most of this week on PDC connections, making a share and practicing for the lab practical.

Lab Material:



Day 1 Continue on with PDC connection Lab.

Day 2: Practice for the lab practical and sharing files in MS Windows.

For Next Week:


cobra Exercise 5 Ch 17 TCP/IP Utilities:

Week 8: June 18

Content:


Lab Practical is on day 1 this week.

Exam 1 is day 2 this week.

Name Services
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • c:\windows\system32\drivers\etc\hosts
  • NetBIOS Name Service - UDP Port 137
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • The IANA and ICANN manage the system overall.
  • nslookup - Information about the nslookup utility






TCP/IP Utilities Ch 17

pp. 643, Table 17.5 NetBIOS service Definitions table
TCP/IP Utilities



Lab Material:

Lab: Review for Lab practical.
See the announcement on the front page of cobra.


For Next Week:

cobra Exercise 5 TCP/IP Utilities Ch 17:


| Top | CSC130 Home | Overview |  

Week 9: June 25


Content


Name Services
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • c:\windows\system32\drivers\etc\hosts
  • NetBIOS Name Service - UDP Port 137
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • The IANA and ICANN manage the system overall.
  • nslookup - Information about the nslookup utility



Chapter 17 TCP/IP Utilities
The TCP/IP Utilities
How to send packets to a port of your choice..
Using telnet to connect to a port of your choice on a host. If you do not have the telnet.exe program on your system you can use putty and select port 23 .
Demonstration of tunneling.









Lab Material:


Lab TCP/IP Utilities.
TCP-IP Utils Lab

Lab: POP Mail - Installing software in a networked NT Domain
POP mail Lab Intro
POP mail Lab


For Next Week:


| Top | CSC130 Home | Overview |  

Week 10: July 2

Content



Chapter 13 Authentication and Access Controls

Security Overview .
Intro to Security concepts.


Lecture about Passwords and other Account security
Demonstration of Access Controls
net commands.


Lab Material


Lab:



For Next Week:


cobra Exercise 6 - Ch 13 authentication and access controls.

| Top | CSC130 Home | Overview |  

Week 11: July 9

Content


Continuing Discussion on Ch 13 account security.
Password Hashes
Access Control Lists
How files are stored and the process of Authorization

Security Overview .

Lab Material:

Day 1: Lab - ACL's, machine accounts, principle of isolation etc. Differentation of authentication and authorization.

On Day 2 we did not have a specific lab. We went over a lot of details on working with the PDC and networked software installs.



For Next Week:

| Top | CSC130 Home | Overview |  

Week 12: July 16

Content

Chapter 13 - Authentication and Access Controls continued

Account Security and policies

Security Overview .


Lab Material:



Lab day 1 (ungraded) - The difference between AUTH(entication) and Authorization and how a file is stored. - We found that even though all of our files that were in the \\OLIN\NETLOGON share could only be executed by us, ANYONE could delete them. There is a difference in how files are opened, so for instance if a file was opened to execute the local file permission denying anyone else execute access denied that.
BUT if someone tried to open the file for deletion the permission for the parent directory was checked and since anyone could do anything at that level, the file would be deleted.
To prevent this, we employed the "sticky bit" which can be viewed like this on shaula.csit.parkland.edu
ls -ld /tmp which will show that the permission on the /tmp directory is:
drwxrwxrwt where the t is the "sticky" bit. This sticky bit allows anyone to execute the directory which means "pass through it" but it forces ownership of a file to delete it.
The permission to set the sticky bit on a publicly writable directory is:
chmod 1777 dirname
Also remember this little bit of complication was created by the fact that there is interaction between 2 services, Samba server and the local Linux file services. Gotta watch for that!
See Also: man chmod and our Linux textbook for a more complete handling of the sticky bit.




Lab: Netmeeting
Lab Intro - Netmeeting
Lab - Netmeeting





For Next Week:


| Top | CSC130 Home | Overview |  

Week 13: July 23

Content:

Encryption: How encryption supports authentication


Lab Material:


Lab: ssh-keygen We used public-key encryption to provide Authentication services. We also looked at the stickybit and Authorization in a Linux/Windows Environment
Lab - ssh-keygen
This will be due by Monday at 10:30 am. You will have 1/2 hour to work on it at the beginning of class Monday.





For Next Week:

We are moving into Chapter 14 next week.

| Top | CSC130 Home | Overview |  

Week 14: July 30

Content

  • Demonstration of Tunneling
  • telnet [host] port
  • netstat
Network Threats and Mitigation - Chapter 14
Running whois from shaula.csit.parkland.edu to find out who is responsible for a host on the internet.

Interacting With a Web Server
We edited a .htacess file to over-ride the default web servers configuration.
  • Transferring files to shaula.csit.parkland.edu using WinSCP
  • Using a .htaccess file to override default Web Server Configurations
  • Looking at the configuration of the Web server on www.csit.parkland.edu
  • /etc/httpd/httpd.conf
  • /etc/httpd/*
  • /etc/httpd/extra/*
  • Looking at the web server error logs
  • /var/log/httpd/vhosts/www/error_log


  • Lab Material:
    Some Light Encryption
    • Encrypt a file using the following openssl commands
    • Also see shred
    • openssl enc -e -aes128 -in [file_to_encrypt] -out [file_to_encrypt].enc
    • openssl enc -d -aes128 -in [file_to_decrypt] -out [file_to_viewplaintext]
    • Now practice decrypting the file.
    • Encryption Lab
    Day 2: Interacting with a Web server lab


    For Next Week:

    | Top | CSC130 Home | Overview |  

    Week 15: Aug. 6

    Content

    Chapter 14 Continued: Firewalls and Secure Configurations

    Diffie Hellman key exchange

    Diffie Hellman Key exchange is where a public key encrypted session is used to generate a private key pair which is then used in a TCP session in HTTPS.

    Trust Relationships and digital certificates.

    Secure Sockets Layer Client challenge and encryption suite identification

    Lab Material:



    VNC
    VNC - vnc Remote System Management
    VNC - Real VNC
    Lab on vnc Lab

    Binding Network Protocols
    Intro - Bindings
    Lab - Bindings





    For Next Week:



    | Top | CSC130 Home | Overview |  

    Week 16: May 7

    Content

    Chapter 15 Physical and Hardware Security.

    Firewalls and Secure Configurations

    Lecture on fault Tolerance and Disaster Recovery
    RAID
    Physical and Hardware Security Ch 15.
    The attrib command

    Backup Types:

    Videos on IPv6

    IPv6
    IPv6 Addressing

    Review for final.

    Lab Material:

    Setting the Master Browser on a NetBIOS Network

    Lab: Groups Master Browser
    10 Points



    Making a Cat 5 Cable Lab
    Overview of Cabling
    Cable Assembly
    Punchdown
    Cable Testing

    For Finals Week:

    Final Review

    Finals Week Final Exams
    May 11, Fri. -May 17, Thurs.




    Final Exams:

    Sean's Finals Schedule

    | Top |