32
UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING IT5501 Systems & Network Administration DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY

UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING

  • Upload
    diep

  • View
    33

  • Download
    3

Embed Size (px)

DESCRIPTION

UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING. IT5501 Systems & Network Administration. DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY. Host Management. - PowerPoint PPT Presentation

Citation preview

Page 1: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

UNIVERSITY OF COLOMBO

SCHOOL OF COMPUTING

IT5501

Systems & Network Administration

DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY

Page 2: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Host Management

Files and file systems are the very basis of what system administration is about. Almost every task in host administration or network configuration involves making changes to files.

Page 3: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Windows 2000 File Systems

FAT16

FAT32

NTFSv5

Page 4: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

FAT16

When a FAT16 volume is formatted the size of the volume determines the default cluster size.

The cluster number cannot exceed a value that can be represented by 16bits and must be a power of 2.

Page 5: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

FAT16 Default Cluster Sizes

Volume Size (MB) Cluster Size

0 – 32 512 bytes

33 – 64 1KB

65 – 128 2KB

129 – 256 4KB

257 – 512 8KB

513 - 1024 16KB

1025 – 2048 32KB

2049 - 4096 54KB

Page 6: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

FAT32

Microsoft introduced FAT32 with Windows 95. They implemented FAT32 with few changes to the existing FAT16 architecture in order to remain compatible.

Windows 2000 will format FAT32 volumes only up to 32GB in size.

One of the significant changes was the use of 4 bytes to store cluster values as opposed to 2 bytes in FAT16.

Page 7: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

FAT 32 Default Cluster Sizes

Volume Size Default cluster Size

Less than 8 GB 4KB

Between 8 and 16GB 8KB

Between 16 and 32GB

16KB

Greater than 32GB 32KB

Page 8: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

In Windows 2000 to see the cluster size of a volume we have to get the Windows 2000 Defragmentation report.

Otherwise on the command prompt CHKDSK command can be used.

Page 9: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

NTFS

NTFS is used solely by Windows NT and Windows 2000.

It uses relational database, transaction processing and object technologies to provide such features as data security and file system reliability.

File system recovery, large storage media and support for object oriented applications are the other features.

Page 10: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Host Management (Unix)

Unix has a hierarchical file system – directories and sub-directories form a tree.

Based on a system of inodes, in which every file has an index entry. inode is a pointer to the actual disk blocks which are associated with the file.

Top or the start of the Unix file tree is called the root file system and is denoted by “/”.

Page 11: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Host Management (Unix)

File locations will differ for different versions of Unix, but the basic features are the same./bin - executable programs/usr - application s/w lives here + basic libs/sbin - statically linked system binaries/etc - misc. programs + config files/dev - place where all logical devices are in/var - for spooling + logging/home- each user has a separate login

directory to keep their file.

Page 12: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Host Management (Unix)

File access control1. To restrict privilege to files on the FS2. To create the illusion of a virtual host for

every logged-on user.In Unix a files contents are classified by

“magic nos” – kept in the file inodeE.g.. A file belongs to user Saman is owned

by that person. Saman can decide whether or not other users can read, write or execute the file by setting the “protection bits”. (chmod)

Page 13: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Host Management (Unix)

There are 16 protection bits for a Unix file, but only 12 of them can be changed by users.

Type of file

owner

group

Anyone (world)

drw-r-x--x 2 root wheel 2345 Oct 28 myfile

1 --x 5 r-w

2 -w- 6 rw-

3 -wx 7 rwx

4 r--

Page 14: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Network Management

Page 15: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

IP Addressing

IP address classes: A, B, C, …..

Page 16: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Subnetting• A subnet is a physical segment in a TCP/IP

environment that uses IP addresses derived from a single network ID.

• By partitioning the bits in the host ID into two parts, Subnet ID and the Host ID, a single Network Address can be used to uniquely define a set of subnets.

• The number of hosts available for the Network address will be distributed among the subnets.

Page 17: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Subnet Mask and IP• A subnet mask is a 32-bit address used to

block or “mask” a portion of the IP address to distinguish the network ID from the host ID.

• Each host on a TCP/IP network requires a subnet mask, either a default subnet mask or a custom subnet mask.

• A default subnet mask is used on TCP/IP networks that are not divided into subnets.

• In the subnet mask, all bits that correspond to the network ID are set to 1. All bits that correspond to the host ID are set to 0.

Page 18: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING
Page 19: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Subnetting Example

Divide 196.200.150.0 into 15 sub-networks.

Needs to borrow 5-bits from the host part to have 15 sub -networks.

196 200 150 5-bits 3-bits

Subnet mask: 11111111.11111111.11111111.11111000

ie., 255.255.255.248 or we can write it as

196.200.150.0 / 29

Page 20: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING
Page 21: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING
Page 22: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING
Page 23: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

is the process by which we take a major network address and use different subnet masks at different points.

If we have to keep the subnet mask the same we encounter severe problems concerning addressing space.

Page 24: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

Consider a class “C” IP address : 200.10.15.xDefault (subnet) mask (SM): 255.255.255.0

SM 255.255.255.192 /26 2 subnets @ 62 hostsSM 255.255.255.224 /27 6 subnets @ 30 hostsSM 255.255.255.240 /28 14 subnets @ 14 hostsSM 255.255.255.248 /29 30 subnets @ 6 hosts SM 255.255.255.252 /30 62 subnets @ 2 hosts

When do we need to use different subnet masks?

Page 25: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

E1 E2

R R

ColomboHead Office

50 hosts

KandyBranch Office

25 hosts

Leased Line

Page 26: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

E1 E2

R R

ColomboHead Office

50 hosts

KandyBranch Office

25 hosts

Subnet 1

Subnet 2

Subnet 3

Page 27: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

E1 E2

R R

ColomboHead Office

50 hosts

KandyBranch Office

25 hosts

No of IP Addresses Required

50+25+1+1+1+1 = 79

1 11 1

2550

Page 28: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

For the serial link – needs only 2 IPs SM – 255.255.255.252

IPs – 200.10.15.5 /30 and 200.10.15.6 /30

For Kandy subnet – needs 26 IPs SM – 255.255.255.224

IPs – 200.10.15.33 /27 E2 and200.10.15.34 /27 to 200.10.15.58 /27 (m/c)

For Colombo subnet – needs 51 IPs SM – 255.255.255.192

IPs – 200.10.15.65 /26 E1 and200.10.15.66 /26 to 200.10.15.115 /26 (m/c)

Page 29: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

E1 E2

R R

ColomboHead Office

50 hosts

KandyBranch Office

25 hosts

200

.10.1

5.5

/30 200

.10.1

5.6

/30

200

.10.1

5.3

3/2

7200

.10.1

5.6

5/

26

200.10.15.66 – 200.10.15.115/26

200.10.15.34 – 200.10.15.58 /27

Page 30: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Variable Length Subnet Masking (VLSM)

When can VLSM be used?

VLSM can only be used with a classless routing protocol.

Classless routing protocols:

RIP Version 2

OSPF

Page 31: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Routing Protocols

All routing protocols perform the same basic function – determine the best route to each destination and distribute these info among the systems.Routing protocols: interior (within AS) & exterior (between ASs)

RIP (hop count), Hello (delay), OSPF (link-state)BGP, EGP

Page 32: UNIVERSITY OF COLOMBO           SCHOOL OF COMPUTING

Further Informationwww.bit.lk

• Detailed Syllabus & Topic Objectives Information Course Structure Semester 5

• Queries [email protected]