Intro to Linux
Week 13 Agenda
1. Discuss Red Hat
decision to discontinue personal versions of Linux after RH9 and
transition to open source model for Fedora
3. Intro to Networking (See Chapter 20)
a. Two general categories for computer networks are _________ and __________.
b. Linux networks most commonly run on a network architecture called ____________
(or __________________), which has three popular speeds, __________,
________________, and _________________.
c. To connect computers to the Internet, they must be configured to use the ______ protocol
to connect them to a server or router provided by an ISP. (in most cases). Common
systems to connect computers on a local network to routers or servers on a wide area network
include _________ connections, through a telephone line, faster _________ connections through
a telephone line, _____________, _____________, and ______________ connections.
d. Each computer on the network must have a unique identification. Numerical addresses
are translated into alphanumeric names called ______________. Single or grouped
servers are identified by name and accessed over the World Wide Web through
e. Internet domain names were created to give an easy
to use system to find services in something
other than an IP address. The browser, itself, can identify a computer host through either the IP
address or the domain name.; For instance, see if you can find the numerical address associated
with www.yahoo.com ______________________. If you open a web browser and enter
this IP address in the URL window, you should see the same result as when you enter the www
f. Under the Domain Name System, there are six
top-level domain extensions:
____ ____ ____ ____ ____ ____
See http://netforbeginners.miningco.com/library/101/bl-domainnames.htm for a tabular list and
http://www.learnthat.com/courses/computer/inet/network3.shtml for more information about
the domain name system.
Internet domain names are also called
should no t be confused with the Microsoft domain terminology developed for Windows NT.
Simple Microsoft workgroup and domain names are not visible over the Internet. They are
similar to Linux hostnames, and are defined through a protocol called NETBIOS. With
Windows 2000 Server, Microsoft added support for true Internet domain names.
g. On Ethernet networks, each network adapter card is
identified by a unique string called a
____________. How can you find this string for the network card in your computer?
h. Electronic information is sent from computer to
with these cards through a seven-layer system called ____________. (See Jang, p.610 and
this section of the MCMCSE Network + Study Guide.)
OSI stands for ______________________________. Try this OSI practice test.
i. The TCP/IP model for networking includes ___ layers. (See Jang, p. 613).
Major protocols that work under the TCP/IP model include ____, _____,
_____, _____, _____. (See Jang, p. 614 for a more complete list.)
What are the TCP/IP transport-level protocols? _____ ______
What are the TCP/IP network-level protocols? _____ ______
What are the TCP/IP link-level protocols?
_____ ______ ______ ______
(See this link for more information.)
j. Define these TCP/IP network services:
Domain Name System: ____________________________________________
Dynamic Host Configuration Protocol ________________________________
Address Resolution Protocol
h. Tp set up a computer on a TCP/IP network, you need
(manually assigned by an administrator or automatically assigned by ____,
a ______ address and a ___________. Additionally, to connect to sites on
the Internet, you need ___________.
The current standard in use for IP addressing is
called ____. IP addresses can
be expressed in two formats ___________ and __________.
Addresses under this standard are expressed in ___ columns with
numerical values between __ and ____.
i. IP addresses are divided into ___ classes. (See Jang, p. 618.
What class do the addresses on our classroom computers belong to? _____
Do the classroom computers use public or private
How would you write the IP address of your
classroom computer in binary notation?
j. Experiment with PING and IFCONFIG commands.
Change your adapter's IP address. Check
the graphic redhat-config-network application and see if the change carries over.
Stop and restart the network using the Service [servicename] command.
After making sure that your Sendmail server
is disabled, change the hostname of
your computer, in preparation for the next set of exercises.
Review network mask settings (see Jang, p. 629).
7. Linux Practical Application Exercises