Intro to Linux
Week 13 Agenda
1. Discuss Red Hat
decision to discontinue personal versions of Linux after RH9 and
transition to open
source model for Fedora
2. Review/discuss
take-home quiz
3. Intro to
Networking (See Chapter 20)
a. Two general categories for computer networks are _________ and
__________.
b. Linux networks most commonly run on a network architecture called
____________
(or __________________), which has three popular speeds,
__________,
________________, and _________________.
c. To connect computers to the Internet, they must be configured to
use the ______ protocol
to connect them to a server or router provided by an ISP. (in
most cases). Common
systems to connect computers on a local network to routers or
servers on a wide area network
include _________ connections, through a telephone line, faster
_________ connections through
a telephone line, _____________, _____________, and
______________ connections.
d. Each computer on the network must have a unique identification.
Numerical addresses
are translated into alphanumeric names called ______________.
Single or grouped
servers are identified by name and accessed over the World Wide
Web through
_______________.
e. Internet domain names were created to give an easy
to use system to find services in something
other than an IP address. The browser, itself, can
identify a computer host through either the IP
address or the domain name.; For instance, see if you can find
the numerical address associated
with www.yahoo.com ______________________. If you open a
web browser and enter
this IP address in the URL window, you should see the same
result as when you enter the www
domain name.
f. Under the Domain Name System, there are six
top-level domain extensions:
____ ____ ____ ____ ____ ____
See http://netforbeginners.miningco.com/library/101/bl-domainnames.htm for
a tabular list and
http://www.learnthat.com/courses/computer/inet/network3.shtml
for more information about
the domain name system.
Internet domain names are also called
_____________________________________. These
should no t be confused with the Microsoft domain terminology
developed for Windows NT.
Simple Microsoft workgroup and domain names are not visible over
the Internet. They are
similar to Linux hostnames, and are defined through a protocol
called NETBIOS. With
Windows 2000 Server, Microsoft added support for true Internet
domain names.
g. On Ethernet networks, each network adapter card is
identified by a unique string called a
____________. How can you find this string for the network
card in your computer?
_________________________________________________.
h. Electronic information is sent from computer to
computer
with these cards through a seven-layer system called
____________. (See Jang, p.610 and
this
section of the MCMCSE Network + Study Guide.)
OSI stands for ______________________________. Try this OSI
practice test.
i. The TCP/IP model for networking includes ___ layers. (See
Jang, p. 613).
Major protocols that work under the TCP/IP model include
____, _____,
_____, _____, _____. (See Jang, p. 614 for a more complete
list.)
What are the TCP/IP transport-level protocols?
_____ ______
What are the TCP/IP network-level protocols? _____ ______
What are the TCP/IP link-level protocols?
_____ ______ ______ ______
(See this
link for more information.)
j. Define these TCP/IP network services:
Domain Name System:
____________________________________________
______________________________________________________________
Dynamic Host Configuration Protocol
________________________________
______________________________________________________________
Address Resolution Protocol
_______________________________________
______________________________________________________________
h. Tp set up a computer on a TCP/IP network, you need
___________
(manually assigned by an administrator or automatically
assigned by ____,
a ______ address and a ___________. Additionally, to
connect to sites on
the Internet, you need ___________.
The current standard in use for IP addressing is
called ____. IP addresses can
be expressed in two formats ___________ and __________.
Addresses under this standard are expressed in ___ columns
with
numerical values between __ and ____.
i. IP addresses are divided into ___ classes. (See
Jang, p. 618.
What class do the addresses on our classroom computers
belong to? _____
Do the classroom computers use public or private
addresses? _______
How would you write the IP address of your
classroom computer in binary notation?
___________________
j. Experiment with PING and IFCONFIG commands.
Change your adapter's IP address. Check
the graphic redhat-config-network application and see if
the change carries over.
Stop and restart the network using the Service
[servicename] command.
After making sure that your Sendmail server
is disabled, change the hostname of
your computer, in preparation for the next set of
exercises.
Review network mask settings (see Jang, p. 629).
7. Linux Practical Application Exercises