Introduction To Networking - Parkland    

Last Modified:
Monday, 19-Feb-2018 07:59:50 CST

CSC130 Spring 18 - Outline


Week 1
Jan. 16 Tue.
Mon 15 MLK Day
Week 2
Jan. 22
Week 3
Jan. 29
Week 4
Feb. 5
Week 5
Feb. 12
Week 6
Feb. 19
Thurs. Parkland Closed
Week 7
Feb 26
Week 8
Mar. 5
Week 9
Mar. 12
Mar 17-25 Spring Break
Week 10
Mar. 26
Week 11
Apr. 2
Week 12
Apr. 9
Week 13
Apr. 16
Week 14
Apr. 23
Week 15
Apr. 30
Week 16
May 7

Week 1: Jan. 16 Tue.
Mon 15 MLK Day

Content:
Labs:

Lab : In class: Rebuild your virtual machine and run ipconfig /all to view your TCP/IP stack information.


For Next Week:
Get the book and read Ch1.

| Top | CSC130 Home | Overview |  

Week 2: Jan. 22

Content:


Finish Chapter 1 - Introduction

Read Chapter 3 - Physical Media
Our Network Documentation

Labs:
Lab : In class: Run the packet sniffer and look at the following protocols arp , ping and nslookup protocols.
Lab : In class: We were working on building the infrastructure for our lab machines. See Net Notes
Lab : In class: We looked at how a machine comes on a TCP/IP network. We looked at RARP (gratuitious arp again) and how a machine comes on a TCP/IP network, and the TTL (using tracert) in the packet sniffer. We also connected to our DNS (Domain Name Server) server at 192.168.1.155 , we also looked at the NBNS (NetBIOS Name Service).



For Next Week:

Exercise 1 Chapter 1 and 3: Intro Topologies and Wiring Specifications.
Due: See Calendar in Cobra.

| Top | CSC130 Home | Overview |  

Week 3: Jan. 29

Content:

Finish Chapter 1

Read Chapter 2 - The OSI Model
OSI Model
Lecture on the OSI Model and Access Methods
The OSI Model


Lecture

Continue covering Ch 2 and the OSI Model.

There will be a quiz covering the OSI model on the second day of class next week.

DOS Commands You Need to



Labs:


Lab: OSI Model upper layers, netstat,
configure redirector: net use h: \\servername\sharename /persistent:no
ftp .

Lab: Layers 5 6 and 7 in the OSI model, including using command line telnet [host] [port]

For Next Week:
Exercise 2 Chapter 2, the OSI Model:

| Top | CSC130 Home | Overview |  

Week 4: Feb. 5

Content:

Chapter 2: OSI model continued. Prep for Quiz next week.

Quiz covering the OSI Model the First meeting of NEXT week.
At the beginning of the class 25 questions 25 points 35 minutes. Open book.

The net Commands


DOS Commands

Labs:

Lab: We were looking at the OSI model's middle layers, Layer3 and 4, We hooked up the new routers and ran tracert and looked at TTL.
We saw that CLOSED ports return RST (reset) packets. telnet [host] [port_number] sends a SYN packet to the port of our choice.



Lab 8: Finsihed up the OSI model and had overview of all layers focusing more on the middle.


For Next Week:


Quiz Chapter 2:
Covering Ch2 the OSI Model.
This will be next on the OSI Model next week the first class meeting of the week.

| Top | CSC130 Home | Overview |  

Week 5: Feb. 12

Content:



Quiz on the OSI Model on the first day of this week.

Chapter 6-7-8 TCP/IP

TCP/IP Resources:
Chapter 6 - TCP/IP

Chapter 6 overview Chapter 7 - IP Addressing






Chapter 17, TCP/IP utilities
The Microsoft NetBIOS NET Commands (This goes along with Chapter 17 in your book)




Labs:

Class Lab:Putty to connect to shaula.csit.parkland.edu and
grep [searchstring] /etc/services
to look for IANA assigned port assignments
Class Lab:Begin Ch 6. Sniffed ftp, tracert and layer3 calculate netmasks.

FTP the file transfer protocol:

For Next Week:

cobra Exercise 3 - Ch 6-7-8 TCP/IP Fundamentals:



| Top | CSC130 Home | Overview |  

Week 6: Feb. 19
Thurs. Parkland Closed


Content:


Quiz - Lab practical on day 2 of next week.

Exam 1 will be on Week 8 day 1. It will cover everything that we have covered so far including the labs.

Chapter 6 - IP The Internet Protocol
Chapter 6 overview
TCP/IP Web Pages

Chapter 7 - IP Addressing
TCP/IP Address Classifications

Chapter 8 - Subnetting
Subnetting a TCP/IP network






Lab Material:


Lab: DNS Search Domains and the hosts file.
C:\windows\system32\drivers\etc\hosts file.
Lab: Login Scripts and PDC

For Next Week:

cobra Exercise 4 - TCP/IP and DNS advanced and subnetting:

| Top | CSC130 Home | Overview |  

Week 7: Feb 26

Content:

Quiz - Lab practical on Day 2 of NEXT week.



Name Services
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • c:\windows\system32\drivers\etc\hosts
  • NetBIOS Name Service - UDP Port 137
  • DNS and BIND - Info about DNS (Port 53 UDP) and BIND (The Berkeley Internet Name Daemon).
  • The IANA and ICANN manage the system overall.
  • nslookup - Information about the nslookup utility
Day 2: We continued on with the DNS Lab: including forward and reverse lookups. NetBIOS name service, hosts file, forward and reverse files on surt.csc130.parkland.edu ,

Lab Material:



Lab: Name Services and hosts file
C:\windows\system32\drivers\etc\hosts

Day 2: We continued on with the DNS Lab: including forward and reverse lookups. NetBIOS name service, hosts file, forward and reverse files on surt.csc130.parkland.edu ,

For Next Week:


Week 8: Mar. 5

Content:




Exam 1 is Next Week.

Lab Practical is Day2 this week


Review for Lab practical.


TCP/IP Utilities Ch 17

pp. 643, Table 17.5 NetBIOS service Definitions table
TCP/IP Utilities



Lab Material:

Lab: Review for Lab practical.
See the announcement on the front page of cobra.

Lab: We are continuing on working on the lab wiring after the Practical.
For Next Week:

cobra Exercise 5 TCP/IP Utilities Ch 17:


| Top | CSC130 Home | Overview |  

Week 9: Mar. 12
Mar 17-25 Spring Break


Content


Chapter 17 TCP/IP Utilities
The TCP/IP Utilities
How to send packets to a port of your choice..
Using telnet to connect to a port of your choice on a host. If you do not have the telnet.exe program on your system you can use putty and select port 23 .
Demonstration of tunneling.

Day 2: Exam 1







Lab Material:


Lab TCP/IP Utilities.

TCP-IP Utils Lab


For Next Week:


| Top | CSC130 Home | Overview |  

Week 10: Mar. 26

Content



Chapter 13 Authentication and Access Controls

Security Overview .
Intro to Security concepts.


Lecture about Passwords and other Account security
Demonstration of Access Controls
net commands.


Lab Material

Lab: POP Mail - Installing software in a networked NT Domain
POP mail Lab Intro
POP mail Lab

Lab desktop.ini: We eliminated error messages from the startup process. And saw that our profiles are networked once using a PDC.



For Next Week:


cobra Exercise 6 - Ch 13 authentication and access controls.

| Top | CSC130 Home | Overview |  

Week 11: Apr. 2

Content
Be sure to finish the POP mail Lab.

Continuing Discussion on Ch 13 account security.
Password Hashes
Access Control Lists
How files are stored and the process of Authorization

Security Overview .

Lab Material:

Lab - ACL's, machine accounts, principle of isolation etc. Take Ex6 at least 2 times for a 10 pointer.

On Day 2 we did not have a specific lab. We went over a lot of details on working with the PDC and networked software installs.



For Next Week:

| Top | CSC130 Home | Overview |  

Week 12: Apr. 9

Content

Chapter 13 - Authentication and Access Controls continued

Account Security and policies

Security Overview .


Lab Material:


Lab Day 1: Lab POP PDC 2 - You will login to the PDC and be sure that you have everything configured correctly to network your e-mail. You will then have me come up and watch you as you login to another machine and send an e-mail to smauney@surt.csc130.parkland.edu using your networked e-mail client.

Lab day 2 (ungraded) - The difference between AUTH(entication) and Authorization and how a file is stored. - We found that even though all of our files that were in the \\OLIN\NETLOGON share could only be executed by us, ANYONE could delete them. There is a difference in how files are opened, so for instance if a file was opened to execute the local file permission denying anyone else execute access denied that.
BUT if someone tried to open the file for deletion the permission for the parent directory was checked and since anyone could do anything at that level, the file would be deleted.
To prevent this, we employed the "sticky bit" which can be viewed like this on shaula.csit.parkland.edu
ls -ld /tmp which will show that the permission on the /tmp directory is:
drwxrwxrwt where the t is the "sticky" bit. This sticky bit allows anyone to execute the directory which means "pass through it" but it forces ownership of a file to delete it.
The permission to set the sticky bit on a publicly writable directory is:
chmod 1777 dirname
Also remember this little bit of complication was created by the fact that there is interaction between 2 services, Samba server and the local Linux file services. Gotta watch for that!
See Also: man chmod and our Linux textbook for a more complete handling of the sticky bit.




For Next Week:


| Top | CSC130 Home | Overview |  

Week 13: Apr. 16

Content:

Encryption:

Encryption Continued:

Lab Material:


Lab: ssh-keygen We used public-key encryption to provide Authentication services. We also looked at the stickybit and Authorization in a Linux/Windows Environment
Lab - ssh-keygen


Lab: Netmeeting
Lab Intro - Netmeeting
Lab - Netmeeting





For Next Week:

We are moving into Chapter 14 next week.

| Top | CSC130 Home | Overview |  

Week 14: Apr. 23

Content

Network Threats and Mitigation - Chapter 14
Running whois from shaula.csit.parkland.edu to find out who is responsible for a host on the internet.

Interacting With a Web Server
We edited a .htacess file to over-ride the default web servers configuration.
  • Transferring files to shaula.csit.parkland.edu using WinSCP
  • Using a .htaccess file to override default Web Server Configurations
  • Looking at the configuration of the Web server on www.csit.parkland.edu
  • /etc/httpd/httpd.conf
  • /etc/httpd/*
  • /etc/httpd/extra/*
  • Looking at the web server error logs
  • /var/log/httpd/vhosts/www/error_log


  • Lab Material:
    Day 1: Interacting with a Web server lab


    For Next Week:

    | Top | CSC130 Home | Overview |  

    Week 15: Apr. 30

    Content

    Chapter 14 Continued: Firewalls and Secure Configurations

    Diffie Hellman key exchange

    Diffie Hellman Key exchange is where a public key encrypted session is used to generate a private key pair which is then used in a TCP session in HTTPS.

    Trust Relationships and digital certificates.

    Secure Sockets Layer Client challenge and encryption suite identification

    Lab Material:



    VNC
    VNC - vnc Remote System Management
    VNC - Real VNC
    Lab on vnc Lab

    Binding Network Protocols
    Intro - Bindings
    Lab - Bindings





    For Next Week:



    | Top | CSC130 Home | Overview |  

    Week 16: May 7

    Content

    Chapter 15 Physical and Hardware Security.

    Firewalls and Secure Configurations

    Lecture on fault Tolerance and Disaster Recovery
    RAID
    Physical and Hardware Security Ch 15.
    The attrib command

    Backup Types:

    Videos on IPv6

    IPv6
    IPv6 Addressing

    Review for final.

    Lab Material:

    Setting the Master Browser on a NetBIOS Network

    Lab: Groups Master Browser
    10 Points



    Making a Cat 5 Cable Lab
    Overview of Cabling
    Cable Assembly
    Punchdown
    Cable Testing

    For Finals Week:

    Final Review

    Finals Week Final Exams
    May 11, Fri. -May 17, Thurs.




    Final Exams:

    Sean's Finals Schedule

    | Top |