SlideShare a Scribd company logo
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Linux Essenciais and System Administration
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Key Knowledge Areas
Connecting machines and resources
Networking
Networking
Terms and Utilities
network layers
tcp/udp
ethernet
ports
tcp/ip
addressing
ipv4
ipv6
subnet classes
subnet masks
cidr
2
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Overview
3
• Connecting machines and resources for purposes of sharing and communication.
• Handled on many different levels, from physical mediums doing the connecting to the
lofty application layer providing a service to the end user.
Networking
If you crack a networking book, they talk about 7 layer OSI model.
Then immediately tell you to forget it, because networking systems don’t follow the model. :)
Layers cared about:
•Physical cabled, fiber, wireless
•Link Ethernet, 802.11
•NetworkIP
•Transport TCP/UDP
•Application HTTP, FTP, SSH, DNS, SMTP, POP3, IMAP, etc, etc, etc
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Layer Processing
4
• Each layer wraps on top of the next, so a message starts at application layer as
data specific to the application;
• This data gets wrapped with info for TCP/UDP and IP layers, providing
addressing and transport ability;
• Wrapped again by Ethernet, providing physical access;
• Wrapped one more time by physical layer getting sent out;
• When received at other end, each layer is unwound as the message travels “up”
the stack on the receiving system.
Networking
View Slides: Networking TCP/IP
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Ports, TCP/IP and IP Addressing
5
port is an address component in TCP and UDP messages which identifies the
service that should receive the message within the addressed system.
Number from 1-65535
Hundreds of “well-known” ports and corresponding services defined in /etc/services
Ex: HTTP: 80, SMTP: 25, POP3: 110, SSH: 22
Networking
TCP and IP work hand in hand to run network communications.
there is more to IP because of addresses.
IP address provides user-configured, routable virtual address used for
communication in and between LAN’s
There are two versions of the IP protocol: version 4 and version 6.
IPv4 is the old guard, developed decades ago and still in use nearly everywhere.
Fairly simple set of features and a 32 bit address. (focus of this discussion)
IPv6 ( ~10 years ago ) was ratified to address some of the shortcomings of IPv4.
Including security features and a lack of address space. IPv6 addresses are 64 bits.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
IP Addressing and subnetting
6
• 32 bit value (32 1’s and 0’s)
• Not easily represented as 32 digits, broken into four groups of 8 bits
• 8 bits can be represented in decimal as 0-255 - dotted quad: 192.168.1.100
Networking
When IPv4 was designed, it included a subnetting ability.
Subnetting allows grouping and organizing networks within IPv4 address space
•First part of IP address is designated as network address, identifying the subnet to
which the IP address belongs.
•Remaining portion of IP address is known as the host address and uniquely
identifies the addressed node within the subnet.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Subnet mask
7
 Identifying the two components of an IP address is the job of the subnet mask
 A mask is a special number which is compared to another number using
mathematical functions (usually boolean algebra’s AND operation) to extract info.
 A subnet mask is a 32 bit number with a special definition:
• If mask is a 1, corresponds to network address within an IP address,
• If mask is a 0, corresponds to the host address.
 Since there are only two components to an IP address, subnet masks are always
start as a series of ones, then switch to zero’s.
Networking
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Subnet Classes
8
Networking
 Subnet masks are also written as dotted quads.
But since they’re just series of 1, then 0’, they look like: 255.255.255.0 or 255.255.192.0
 An easier way to express a subnet is to use CIDR notation.
CIDR stands for Classless Inter-Domain Routing,
Created to address a shortcoming of the IPv4 standard design - subnet classes.
original IPv4 spec created set network sizes and named them “classes”.
•Class A: 8 bit network address
•Class B: 16 bit network address
•Class C: 24 bit network address
•Class D and Class E: special purpose networks
Defined overall layout of the 32 bit address space. Quickly became insufficient to support the networks
being created, and CIDR was implemented.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
CIDR
9
Networking
CIDR breaks from class-based subnets and allows for the creation of arbitrary
subnet sizes within the overall layout of 32 bit address space.
CIDR notation is simpler than dotted quad for subnet masks
A slash, followed by the number of the last bit of the network address.
Ex: /24 - class C - 255.255.255.0
Usually combined with IP address to form a complete address: 192.168.1.100/24
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Fim de sessão
10

More Related Content

PPT
Apend. networking generic a
PDF
LISP_in_Secure_Networks_WP
PPTX
ipv4 & ipv6 by pavan
PPTX
Classes of adressing
PPT
Internet Protocol Version 6
PPT
CCNA IP Addressing
PPTX
IPv4 and IPv6
PDF
Apend. networking generic a
LISP_in_Secure_Networks_WP
ipv4 & ipv6 by pavan
Classes of adressing
Internet Protocol Version 6
CCNA IP Addressing
IPv4 and IPv6

What's hot (20)

PPTX
Basic Understanding about TCP/IP Addressing system
PPTX
Ip addressing
PPTX
Ipv4 & ipv6
PPTX
IPv6 - The Next next generation protocol
PPTX
Architectures and buildings
PPT
Ccna1v31 mod09
PDF
Moath alshreef
PPTX
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 8
PPT
Hardware9
PPTX
IPv4 and IPv6
PPTX
3. RINA use cases, results, benefits
PPTX
Ipv4 & ipv6
PPT
Internet Protocol Version 6 By Suvo 2002
PPT
CCNA Introducing Networks
PDF
Using IO Visor to Secure Microservices Running on CloudFoundry [OpenStack Sum...
PPTX
IP addressing seminar ppt
PPTX
Slideshare
PDF
LF_DPDK17_Abstract APIs for DPDK and ODP
PPT
Ipv4 vs Ipv6 comparison
Basic Understanding about TCP/IP Addressing system
Ip addressing
Ipv4 & ipv6
IPv6 - The Next next generation protocol
Architectures and buildings
Ccna1v31 mod09
Moath alshreef
CCNA 1 Routing and Switching v5.0 Chapter 8
Hardware9
IPv4 and IPv6
3. RINA use cases, results, benefits
Ipv4 & ipv6
Internet Protocol Version 6 By Suvo 2002
CCNA Introducing Networks
Using IO Visor to Secure Microservices Running on CloudFoundry [OpenStack Sum...
IP addressing seminar ppt
Slideshare
LF_DPDK17_Abstract APIs for DPDK and ODP
Ipv4 vs Ipv6 comparison
Ad

Viewers also liked (19)

PDF
אלקנקנה 819 וילך תשע''ו
PDF
CARA TECHNOLOGY LIMITED
PPTX
Suppin Japan Introduction
PDF
Ebc manual basico sobre los criterios 4.0.5
PDF
Convirtiéndose en Hacker
PDF
Ebc manual basico sobre los criterios 4.0.5
PDF
What would be the benefits for AHE from setting up a manufacturing unit in Me...
PPT
Apend. networking linux
PDF
Autoxten 简体奖金制度及如何运作
PPTX
De verzekeringstoekomst in België
PPTX
4 Keys to win in Stock Market
PPS
Terapia punto rojo
PPS
Montage sur le voyage en normandie 2010
PPSX
Amazon返修指导
PPT
λίμνη στυμφαλία
PPT
Corrosión
PDF
臨床眼科8月号2011
PDF
Ficha socioeconômico
PDF
Diseno de Banco para Centro Leon : cl-b 1921
אלקנקנה 819 וילך תשע''ו
CARA TECHNOLOGY LIMITED
Suppin Japan Introduction
Ebc manual basico sobre los criterios 4.0.5
Convirtiéndose en Hacker
Ebc manual basico sobre los criterios 4.0.5
What would be the benefits for AHE from setting up a manufacturing unit in Me...
Apend. networking linux
Autoxten 简体奖金制度及如何运作
De verzekeringstoekomst in België
4 Keys to win in Stock Market
Terapia punto rojo
Montage sur le voyage en normandie 2010
Amazon返修指导
λίμνη στυμφαλία
Corrosión
臨床眼科8月号2011
Ficha socioeconômico
Diseno de Banco para Centro Leon : cl-b 1921
Ad

Similar to 101 apend. networking generic a (20)

PPTX
CCNA RS_ITN - Chapter 8
DOCX
Ip seminar
PPT
Ccna1 presentation
PPTX
Internet protocols
PPTX
CCNA RS_NB - Chapter 7
PPT
Day-3 PowerPoint
PDF
KubernetesNetworkingAndImplementation-Lecture.pdf
PPTX
Understanding Ipv4 vs IPv6 key features difference.pptx
PPSX
Internet Protocol
PPTX
IPv4- Internet Protocol version 4
PPTX
Ccna v5-S1-Chapter 8
PPTX
Migration of corperate networks from ipv4 to ipv6 using dual stack
PPTX
PPT
Chapter2ccna
PPT
Chapter2ccna
PPT
Networking
PPT
TCP IP Addressing
DOCX
Assignment 2 LASA 1 IP NetworkingIn this assignment, you will wri.docx
PPTX
Ip addressing
CCNA RS_ITN - Chapter 8
Ip seminar
Ccna1 presentation
Internet protocols
CCNA RS_NB - Chapter 7
Day-3 PowerPoint
KubernetesNetworkingAndImplementation-Lecture.pdf
Understanding Ipv4 vs IPv6 key features difference.pptx
Internet Protocol
IPv4- Internet Protocol version 4
Ccna v5-S1-Chapter 8
Migration of corperate networks from ipv4 to ipv6 using dual stack
Chapter2ccna
Chapter2ccna
Networking
TCP IP Addressing
Assignment 2 LASA 1 IP NetworkingIn this assignment, you will wri.docx
Ip addressing

More from Acácio Oliveira (20)

PPTX
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
PPTX
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
PPTX
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
PPTX
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
PPTX
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
PPTX
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
PPTX
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
PPTX
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
PPTX
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
PPTX
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
PPTX
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
PPTX
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
PPTX
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
PPTX
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
PPTX
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
PPTX
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
PPTX
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
PPTX
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
PPTX
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
PPTX
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx

101 apend. networking generic a