SlideShare a Scribd company logo
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
System Administration
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Key Knowledge Areas
Connecting machines and resources
Networking
Networking
Terms and Utilities
network layers
tcp/udp
ethernet
ports
tcp/ip
addressing
ipv4
ipv6
subnet classes
subnet masks
cidr
2
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Overview
3
• Connecting machines and resources for purposes of sharing and communication.
• Handled on many different levels, from physical mediums doing the connecting to the
lofty application layer providing a service to the end user.
Networking
If you crack a networking book, they talk about 7 layer OSI model.
Then immediately tell you to forget it, because networking systems don’t follow the model. :)
Layers cared about:
•Physical cabled, fiber, wireless
•Link Ethernet, 802.11
•NetworkIP
•Transport TCP/UDP
•Application HTTP, FTP, SSH, DNS, SMTP, POP3, IMAP, etc, etc, etc
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Layer Processing
4
• Each layer wraps on top of the next, so a message starts at application layer as
data specific to the application;
• This data gets wrapped with info for TCP/UDP and IP layers, providing
addressing and transport ability;
• Wrapped again by Ethernet, providing physical access;
• Wrapped one more time by physical layer getting sent out;
• When received at other end, each layer is unwound as the message travels “up”
the stack on the receiving system.
Networking
View Slides: Networking TCP/IP
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Ports, TCP/IP and IP Addressing
5
port is an address component in TCP and UDP messages which identifies the
service that should receive the message within the addressed system.
Number from 1-65535
Hundreds of “well-known” ports and corresponding services defined in /etc/services
Ex: HTTP: 80, SMTP: 25, POP3: 110, SSH: 22
Networking
TCP and IP work hand in hand to run network communications.
there is more to IP because of addresses.
IP address provides user-configured, routable virtual address used for
communication in and between LAN’s
There are two versions of the IP protocol: version 4 and version 6.
IPv4 is the old guard, developed decades ago and still in use nearly everywhere.
Fairly simple set of features and a 32 bit address. (focus of this discussion)
IPv6 ( ~10 years ago ) was ratified to address some of the shortcomings of IPv4.
Including security features and a lack of address space. IPv6 addresses are 64 bits.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
IP Addressing and subnetting
6
• 32 bit value (32 1’s and 0’s)
• Not easily represented as 32 digits, broken into four groups of 8 bits
• 8 bits can be represented in decimal as 0-255 - dotted quad: 192.168.1.100
Networking
When IPv4 was designed, it included a subnetting ability.
Subnetting allows grouping and organizing networks within IPv4 address space
•First part of IP address is designated as network address, identifying the subnet to
which the IP address belongs.
•Remaining portion of IP address is known as the host address and uniquely
identifies the addressed node within the subnet.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Subnet mask
7
 Identifying the two components of an IP address is the job of the subnet mask
 A mask is a special number which is compared to another number using
mathematical functions (usually boolean algebra’s AND operation) to extract info.
 A subnet mask is a 32 bit number with a special definition:
• If mask is a 1, corresponds to network address within an IP address,
• If mask is a 0, corresponds to the host address.
 Since there are only two components to an IP address, subnet masks are always
start as a series of ones, then switch to zero’s.
Networking
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Subnet Classes
8
Networking
 Subnet masks are also written as dotted quads.
But since they’re just series of 1, then 0’, they look like: 255.255.255.0 or 255.255.192.0
 An easier way to express a subnet is to use CIDR notation.
CIDR stands for Classless Inter-Domain Routing,
Created to address a shortcoming of the IPv4 standard design - subnet classes.
original IPv4 spec created set network sizes and named them “classes”.
•Class A: 8 bit network address
•Class B: 16 bit network address
•Class C: 24 bit network address
•Class D and Class E: special purpose networks
Defined overall layout of the 32 bit address space. Quickly became insufficient to support the networks
being created, and CIDR was implemented.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
CIDR
9
Networking
CIDR breaks from class-based subnets and allows for the creation of arbitrary
subnet sizes within the overall layout of 32 bit address space.
CIDR notation is simpler than dotted quad for subnet masks
A slash, followed by the number of the last bit of the network address.
Ex: /24 - class C - 255.255.255.0
Usually combined with IP address to form a complete address: 192.168.1.100/24
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Fim de sessão
10

More Related Content

PPT
101 apend. networking generic a
PDF
LISP_in_Secure_Networks_WP
PPTX
ipv4 & ipv6 by pavan
PPTX
Architectures and buildings
PPT
CCNA IP Addressing
PPT
Internet Protocol Version 6
PPTX
101 apend. networking generic a
LISP_in_Secure_Networks_WP
ipv4 & ipv6 by pavan
Architectures and buildings
CCNA IP Addressing
Internet Protocol Version 6

What's hot (20)

PPTX
IPv6 - The Next next generation protocol
PPTX
Classes of adressing
PPTX
Ipv4 & ipv6
PPTX
Ip addressing
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 8
PPTX
IPv4 and IPv6
PPT
Ccna1v31 mod09
PPTX
Arcfire fire forum 2015
PDF
PPTX
IPv6 ND 2020
PPT
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
DOCX
interoperatbility between IPv4 and IPv6
PPTX
Basic Understanding about TCP/IP Addressing system
PDF
I pv6 aag-v3_019-kr
PPT
Ipv4 vs Ipv6 comparison
PDF
Moath alshreef
PPT
Hardware9
PDF
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
PDF
Ipv6 course
PPT
Internet Protocol Version 6 By Suvo 2002
IPv6 - The Next next generation protocol
Classes of adressing
Ipv4 & ipv6
Ip addressing
CCNA 1 Routing and Switching v5.0 Chapter 8
IPv4 and IPv6
Ccna1v31 mod09
Arcfire fire forum 2015
IPv6 ND 2020
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPT
interoperatbility between IPv4 and IPv6
Basic Understanding about TCP/IP Addressing system
I pv6 aag-v3_019-kr
Ipv4 vs Ipv6 comparison
Moath alshreef
Hardware9
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
Ipv6 course
Internet Protocol Version 6 By Suvo 2002
Ad

Viewers also liked (14)

PPT
101 4.7 find system files and place files in the correct location
PPT
101 1.1 hardware settings
PPT
Lpi lição 01 exam 102 objectives
PPT
101 4.6 create and change hard and symbolic links
PPT
101 1.3 runlevels , shutdown, and reboot
PPT
101 1.2 boot the system
PPT
101 2.3 manage shared libraries
PPT
Lpi lição 01 exam 101 objectives
PPTX
Licão 03 vi editor
PPT
101 3.5 create, monitor and kill processes
PDF
Gnu study guide linux admin 1 (lab work lpi 101) v 0.2
PDF
Lpi 101 study_guide
PDF
Lpi Part 1 Linux Fundamentals
PDF
Linux Network Administration (LPI-1,LPI-2)
101 4.7 find system files and place files in the correct location
101 1.1 hardware settings
Lpi lição 01 exam 102 objectives
101 4.6 create and change hard and symbolic links
101 1.3 runlevels , shutdown, and reboot
101 1.2 boot the system
101 2.3 manage shared libraries
Lpi lição 01 exam 101 objectives
Licão 03 vi editor
101 3.5 create, monitor and kill processes
Gnu study guide linux admin 1 (lab work lpi 101) v 0.2
Lpi 101 study_guide
Lpi Part 1 Linux Fundamentals
Linux Network Administration (LPI-1,LPI-2)
Ad

Similar to Apend. networking generic a (20)

PPTX
CCNA RS_ITN - Chapter 8
PPT
Ccna1 presentation
PPTX
CCNA RS_NB - Chapter 7
PPTX
Understanding Ipv4 vs IPv6 key features difference.pptx
PDF
KubernetesNetworkingAndImplementation-Lecture.pdf
PPTX
Internet protocols
PPTX
Migration of corperate networks from ipv4 to ipv6 using dual stack
PPTX
Ccna v5-S1-Chapter 8
DOCX
Ip seminar
PPT
Day-3 PowerPoint
PPSX
Internet Protocol
PPTX
PPT
Chapter2ccna
PPT
Chapter2ccna
PPT
Networking
PDF
I pv6 tutorial
PPT
Digital network lecturer2
PPT
Ccna1v3 Mod09
PPTX
IPv4- Internet Protocol version 4
PDF
I pv6 aag-v3_019-kr
CCNA RS_ITN - Chapter 8
Ccna1 presentation
CCNA RS_NB - Chapter 7
Understanding Ipv4 vs IPv6 key features difference.pptx
KubernetesNetworkingAndImplementation-Lecture.pdf
Internet protocols
Migration of corperate networks from ipv4 to ipv6 using dual stack
Ccna v5-S1-Chapter 8
Ip seminar
Day-3 PowerPoint
Internet Protocol
Chapter2ccna
Chapter2ccna
Networking
I pv6 tutorial
Digital network lecturer2
Ccna1v3 Mod09
IPv4- Internet Protocol version 4
I pv6 aag-v3_019-kr

More from Acácio Oliveira (20)

PPTX
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
PPTX
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
PPTX
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
PPTX
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
PPTX
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
PPTX
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
PPTX
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
PPTX
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
PPTX
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
PPTX
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
PPTX
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
PPTX
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
PPTX
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
PPTX
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
PPTX
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
PPTX
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
PPTX
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
PPTX
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
PPTX
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
PPTX
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Security+ Lesson 01 Topic 17 - Types of Malware.pptx

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine Learning_overview_presentation.pptx
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
A comparative analysis of optical character recognition models for extracting...
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Weekly Chronicles - August'25-Week II

Apend. networking generic a