17
CSCI 360 CSCI 360 Intro To Computer Intro To Computer Networks Networks INFS 361 INFS 361 Network Network Administration Administration Bob Bradley Bob Bradley

CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

Embed Size (px)

Citation preview

Page 1: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

CSCI 360CSCI 360Intro To Computer NetworksIntro To Computer Networks

INFS 361 INFS 361 Network AdministrationNetwork Administration

Bob BradleyBob Bradley

Page 2: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

InstructorInstructor

My name is Bob BradleyMy name is Bob Bradley

Office and office hours and web page Office and office hours and web page

www.utm.edu/~bbradleywww.utm.edu/~bbradley

See web page for SyllabusSee web page for Syllabus and and timelinetimeline

Page 3: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

CS 360CS 360 Class ? Midterm/test/final/quizesClass ? Midterm/test/final/quizes There will be programming projects. More so this semester.There will be programming projects. More so this semester. How I grade projects… This for a C, this for a B, this for an A…How I grade projects… This for a C, this for a B, this for an A…   Prereqs: c++ cs221 , cs200/201 Prereqs: c++ cs221 , cs200/201

Book - Computer Networks and Internets Book - Computer Networks and Internets 4th Edition4th Edition And Workbook - And Workbook - Hands-On-Networking with Internet Technologies 2nd EditionHands-On-Networking with Internet Technologies 2nd Edition Will be going though most of the book. You will need the latest edition.Will be going though most of the book. You will need the latest edition.

Will focus on Network Application Protocols and ProgrammingWill focus on Network Application Protocols and Programming• c++, c#, Javac++, c#, Java• Free MSDN developer studio - get it from the cs departmentFree MSDN developer studio - get it from the cs department

   Will be changing the schedule… Check the web often…Will be changing the schedule… Check the web often… This week Overview then Chap 1,2,3.This week Overview then Chap 1,2,3. Talk about schedule for class...Talk about schedule for class...

Page 4: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

INFS 361INFS 361 Book - Business Data Networks and Telecommunications Book - Business Data Networks and Telecommunications 5th 5th

EditionEdition Prereqs: INFS 316Prereqs: INFS 316   Lots of quizesLots of quizes Several ProjectsSeveral Projects Midterm and FinalMidterm and Final   Will focus on Network AdministrationWill focus on Network Administration ProjectsProjects

• Microsoft Virtual PC 2004Microsoft Virtual PC 2004 Windows 2003 ServerWindows 2003 Server

• File Server, IIS Web ServerFile Server, IIS Web Server• DHCP, DNSDHCP, DNS• MailMail

LinuxLinux• Apache Web ServerApache Web Server• DHCP, DNSDHCP, DNS• SendMailSendMail

Page 5: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

OverviewOverview Data TransmissionData Transmission Packet Transmission - packets, frames, Packet Transmission - packets, frames,

• Sniffers - like radio scannerSniffers - like radio scanner• Privacy and sniffingPrivacy and sniffing• Networks like cell phones… public can scan/receive transmissionsNetworks like cell phones… public can scan/receive transmissions

Hardware addressesHardware addresses LANS vs WANSLANS vs WANS Connection vs ConnectionlessConnection vs Connectionless InternetworkingInternetworking Protocols Protocols

• TCP/IPTCP/IP• IP - arp, bind, ip datagrams, encapsulation, icmpIP - arp, bind, ip datagrams, encapsulation, icmp

Network ApplicationsNetwork Applications Client server - sockets - DNS – E-Mail (whole weeks) – HTTP (Web), FTP, Client server - sockets - DNS – E-Mail (whole weeks) – HTTP (Web), FTP,

SMTPSMTP p2p file sharing Naptsterp2p file sharing Naptster Network security, firewalls, finalsNetwork security, firewalls, finals    Wireless - 802.11b, firewall security, rfcs, vpns, etc.Wireless - 802.11b, firewall security, rfcs, vpns, etc.

Page 6: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

Dorm NetworkDorm Network

In 1996In 1996• UTM was one of the first Universities to UTM was one of the first Universities to

put two hard-wired network connections put two hard-wired network connections in every dorm roomin every dorm room

• network was very fastnetwork was very fast 10 MegaBit Ethernet10 MegaBit Ethernet T1 (24 Phone lines/1.5 MegaBit/Sec) T1 (24 Phone lines/1.5 MegaBit/Sec)

connection to internet connection to internet

• web pages were small and simpleweb pages were small and simple

Page 7: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

1999 Network Slowdown1999 Network Slowdown In 1999, UTM’s network (and most University In 1999, UTM’s network (and most University

networks) became very, very slow.networks) became very, very slow. In 1999, a program called Napster came out!In 1999, a program called Napster came out! Allowed users to download and share music files Allowed users to download and share music files

(MP3s).(MP3s). When this first came out, it made our whole When this first came out, it made our whole

university network totally unusable.university network totally unusable.• You could no longer check any web pages, read email, You could no longer check any web pages, read email,

download files or do anything.download files or do anything.• The file sharing program ate up all of our bandwidth.The file sharing program ate up all of our bandwidth.

Page 8: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

Web Page vs Music FileWeb Page vs Music File

Typical web page with small Typical web page with small graphicsgraphics• 3-3-3030KB (Kilo-Bytes)KB (Kilo-Bytes)

Typical MP3 music fileTypical MP3 music file• 33-6MB (Mega-Bytes)-6MB (Mega-Bytes)• 100s of times bigger100s of times bigger

Relative width of T1Relative width of T1• 1.5 Mega-bits/sec1.5 Mega-bits/sec• About 150 Kilo-Bytes/secAbout 150 Kilo-Bytes/sec• About 5-50 web pages/secAbout 5-50 web pages/sec• About 1 song in 20-40 secAbout 1 song in 20-40 sec

If only one person using the netIf only one person using the net

Page 9: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

100 Web Pages

Difference in Difference in download timesdownload times

5 Web Pages

5 Songs

Note this example is speeded up, but notice the relative differences in time it takes to download web pages vs. the songs.

Also note, most file sharing programs typically share out 5 or more songs at a time, so multiply this by every user using a file sharing program.

T1

Page 10: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

Wanted traffic gets Wanted traffic gets bogged downbogged down

With a steady stream of large music files coming and going, the “pipe” gets bogged down. Email and web pages have to wait in line and it is a first come first server system.

T1

Page 11: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

Packet/Traffic Packet/Traffic Shaper/FilterShaper/Filter

A packet shaper/traffic filter reserves some of the channels, so that wanted traffic (like web pages and email) can still get though without having to wait on the unwanted traffic (file/music sharing).

T1

Page 12: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

Dorm NetworkDorm Network We now have over 1300 student computers We now have over 1300 student computers

connected in the dorms.connected in the dorms.

We now have a T3/DS3We now have a T3/DS3 28 T1s or 672 phone lines28 T1s or 672 phone lines 45 MegaBits/Sec45 MegaBits/Sec

Relative size of T1 vs Relative size of T3Relative size of T1 vs Relative size of T3

Page 13: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

Bandwidth of ProtocolsBandwidth of Protocols

Even with our DS3 connection, this chart Even with our DS3 connection, this chart shows what happens to our bandwidth if shows what happens to our bandwidth if we turn off our traffic/packet shaperwe turn off our traffic/packet shaper

Bandwidth with filter turned on

Bandwidth when filter is turned off

Page 14: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

NetEnforcerNetEnforcer

The Real-Time Traffic MonitorThe Real-Time Traffic Monitor   

Page 15: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

NetEnforcerNetEnforcerGet monthly updated rules used to filter the traffic

Page 16: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

NetEnforcerNetEnforcer

Protocol Bandwidth Percentage ScreenProtocol Bandwidth Percentage Screen

Page 17: CSCI 360 Intro To Computer Networks INFS 361 Network Administration Bob Bradley

How Not To Get Sued By The How Not To Get Sued By The RIAA For File-SharingRIAA For File-Sharing

(And Other Ideas to Avoid Being Treated Like a Criminal)(And Other Ideas to Avoid Being Treated Like a Criminal)

The Recording Industry Association of America (RIAA) The Recording Industry Association of America (RIAA) announced on June 25, 2003, that it will begin suing users announced on June 25, 2003, that it will begin suing users of peer-to-peer (P2P) file-sharing systems within the next of peer-to-peer (P2P) file-sharing systems within the next few weeks. According to the announcement, the RIAA will few weeks. According to the announcement, the RIAA will be targeting users who upload/share "substantial" amounts be targeting users who upload/share "substantial" amounts of copyrighted music. The RIAA has stated that it will of copyrighted music. The RIAA has stated that it will choose who to sue by using software that scans users' choose who to sue by using software that scans users' publicly available P2P directories and then identifies the ISP publicly available P2P directories and then identifies the ISP of each user. Then, using the Digital Millennium Copyright of each user. Then, using the Digital Millennium Copyright Act (DMCA), the RIAA will subpoena the ISP for each user's Act (DMCA), the RIAA will subpoena the ISP for each user's name, address, and other personal information in order to name, address, and other personal information in order to sue that user. sue that user.

http://www.eff.org/IP/P2P/howto-notgetsued.phphttp://www.eff.org/IP/P2P/howto-notgetsued.php