Local Area Network Operating Systems and Remote Access

Total Page:16

File Type:pdf, Size:1020Kb

Local Area Network Operating Systems and Remote Access CHAPTER 9 LOCAL AREA NETWORK OPERATING SYSTEMS AND REMOTE ACCESS Concepts Reinforced OSI model Top-down model Protocols and standards Hardware/software compatibility Network architectures Concepts Introduced Network operating system Functional network analysis functionality Client/server network operating Peer-to-peer network operating systems systems Network operating systems Network technology analysis architectures Client network operating systems Server network operating systems Remote access Remote control Mobile computing Remote access security OBJECTIVES After mastering the material in this chapter you should: 1. Understand the compatibility issues involved with implementing LAN software. 2. Understand the basics of network operating system functionality. 3. Understand the important differences between peer-to-peer and client/ server network operating systems architectures. 4. Understand the emerging role of the client network operating system and the universal client. 5. Understand how to analyze functional networking requirements and match those requirements to available technology. Network Operating Systems Overview 337 ■ INTRODUCTION Network operating systems, like most other aspects of data communications, are undergoing tremendous change. As a result, before examining the operational char- acteristics of a particular network operating system, it is important to gain an overall perspective of network operating systems in general. In particular, network operat- ing systems architectures are in a state of transition from closed environments in which only clients and servers running the same network operating system could interact, to open environments in which universal clients are able to inter-operate with servers running any network operating system. In this chapter network operating system functionality is examined for both client and server network operating systems. This functionality is representative of current network operating systems in general rather than any particular product. With the evolution of portable computers and the Internet users need to gain access to an organization’s data from a variety of locations other than the traditional office setting. One of the most important things to understand about such remote access is the relatively limited bandwidth of the wide area network links that individ- uals will use to connect to the main office information resources. Although the goal of remote access may be to offer transparent remote connectivity, decreases in bandwidth by a factor of 100 on WAN links as compared to LAN links cannot be ignored. The overall goal of the second half of this chapter is to outline a methodology for the proper design of remote access solutions based on a thorough understanding of user needs, network architecture alternatives, and available technology. ■ NETWORK OPERATING SYSTEMS OVERVIEW Traditionally, there were two major product categories of network operating sys- tems: peer-to-peer and client/server. In a peer-to-peer network operating system, individual workstations can be configured as a service requester (client), a service provider (server), or both. The terms client and server in this case describe the work- station’s functional role in the network. The installed network operating system is still considered a peer-to-peer network operating system, because all workstations in the network use the same networking software. Designed as a low cost, workgroup solution, peer-to-peer network operating systems lacked the ability to offer central- ized authentication and authorization and suffered from exponential performance decreases as the number of users increased. As a result, peer-to-peer network operat- ing systems were often characterized as lacking scalability. In contrast to the homogeneous, peer-to-peer software environment, traditional client/server network operating systems require two distinct software products for client and server computers. The specialized client software required less memory and disk space, and was less expensive than the more complicated and expensive server software. The client software was made to interact with the corresponding server soft- ware. As a result, although traditional client/server network operating systems over- came the scalability limitation of peer-to-peer network operating systems, they did not necessarily overcome the interoperability limitation. Functionally, client/server net- work operating systems offered faster, more reliable performance than peer-to-peer LANs and well as improved administration, scalability, and security. 338 Chapter Nine/Local Area Network Operating Systems and Remote Access Functional Requirements of Today’s Network Operating Systems Although traditional peer-to-peer and client/server network operating systems suc- cessfully met the functional requirements for workgroup and departmental comput- ing, as these departmental LANs needed to be integrated into a single, cohesive, interoperable, enterprise-wide information system, the limitations of these tradi- tional NOS (network operating system) architectures became evident. In order to understand the architectural specifications of today’s network oper- ating systems, it is first necessary to understand the functional requirements that these network operating systems must deliver. In taking a top-down approach to network operating system requirements analysis, one might ask, “What are users of an enterprise-wide information system demanding of a network operating system in terms of services?” The answer to this question lies in the application layer of the top-down model. Given that it is distributed applications that will enable enterprise- wide productivity and decision making, the underlying network operating systems must support these distributed applications by supplying the message services and global directory services required to execute these applications in an enterprise- wide, multiple server environment. Figure 9-1 illustrates these functional requirements and contrasts them with the requirements traditionally demanded of client/server and peer-to-peer network operating systems. As illustrated in Figure 9-1, the new or emerging demands being put on network operating systems are application services, directory services, and integration and migration services. In order to successfully meet these functional requirements, net- work operating system architectures have shifted from integrated, single-vendor client/server network operating systems to independent, distinct, multivendor, client and server network operating systems. The functional characteristics of these distinct client and server network operating systems are described in detail later in this chapter. Figure 9-2 illustrates this architectural shift in network operating system development. All services delivered seamlessly across multiple server platforms regardless of installed network operating system Traditional Requirements Emerging Requirements FILE PRINTER APPLICATION DIRECTORY INTEGRATION/MIGRATION SERVICES SERVICES SERVICES SERVICES SERVICES Database back-end Global directory or Allow multiple different client engines naming services network operating systems to Messaging and All network objects transparently interoperate with communication defined in single multiple, different server back-end engines location and shared network operating systems by all applications Provide easy-to-implement SUPPORT FOR: Directory information paths for upgrades to more 32 bit symmetrical is stored in replicated, recent versions or migration to multi-processing distributed databases different network operating Pre-emptive multi- for reliability, systems tasking redundancy, fault Applications run in tolerance protected memory mode Multithreading Figure 9-1 Required Network Operating System Services: Traditional vs. Current Network Operating Systems Overview 339 Client/Server Network Operating System NOS-specific communication servers. workstations. server software installed on client software installed on Network operating system specific Network operating system specific Client-portion, Departmental solution Server-portion, same NOS same NOS Clients and servers of same network operating system are able to easily communicate Client Network Operating System —and— Server Network Operating System NOS-independent communication network operating system operating system desired. install whatever client network Client workstations are able to client software or other server’s Network operating system server software can vary independently of Client NOS Enterprise solution Server NOS Independently installed client Universal and server network operating Multi-Protocol systems provide enterprise- Clients wide transparent client-to- Servers server interoperability Figure 9-2 Client/Server NOS vs. Client and Server NOS Client Network Operating Systems: The Universal Client Client network operating sys- tems, as illustrated in Figure 9-2, integrate traditional operating system functionality with highly configurable networking features to enable communication with a vari- ety of network operating system servers. The client workstation’s ability to interop- erate transparently with a number of different network operating system servers without the need for additional products or configurations breaks the traditional hard linkage between client and server NOS. This ability is commonly referred to as universal client capability. Server Network Operating Systems Because the client and server platforms
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Network Services
    Network Services Module 6 Objectives Skills/Concepts Objective Domain Objective Domain Description Number Setting up common Understanding network 3.5 networking services services Defining more network Understanding network 3.5 services services Defining Name Understand Name 3.4 Resolution Techniques Resolution DHCP • Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that enables configured client computers to obtain IP addresses automatically • The IP information obtained might include the following: • IP addresses • Subnet masks • Gateway addresses • DNS server addresses • Other advanced options • The DHCP Server service provides the following benefits: •Reliable IP address configuration •Reduced network administration DHCP Server • Before a DHCP server can start leasing IP addresses to client computers, the following steps must be performed: 1. Install the DHCP service 2. Configure an IP scope 3. Activate the scope 4. Authorize the server 5. Configure advanced IP options (optional) DEMO: Install and view the DHCP Service (and console) DORA • DHCP sessions use a four-step process known as DORA. • Discovery: The client sends a broadcast to the network to find a DHCP server • Offer: The DHCP server sends a unicast “offering” of an IP address to the client • Request: The client broadcasts to all servers that it has accepted the offer • Acknowledge: The DHCP server sends a final unicast to the client that includes the IP information the client will use • DHCP utilizes ports 67 and 68 Hey, are there any DHCP Servers here? (DHCPDiscover) Yes, I am a DHCP Server, and here is an IP Address for you (DHCPOffer) Thanks, I like that IP and I will take it (DHCPRequest) Ok, it s yours.
    [Show full text]
  • Migrating from Netware to OES 2 Linux
    Best Practice Guide www.novell.com Migrating from NetWare to OES 2 prepared for Novell OES 2 User Community Published: November, 2007 Disclaimer Novell, Inc. makes no representations or warranties with respect to the contents or use of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Trademarks Novell is a registered trademark of Novell, Inc. in the United States and other countries. * All third-party trademarks are property of their respective owner. Copyright 2007 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of Novell, Inc. Novell, Inc. 404 Wyman Suite 500 Waltham Massachusetts 02451 USA Prepared By Novell Services and User Community Migrating from NetWare to OES 2—Best Practice Guide November, 2007 Novell OES 2 User Community The latest version of this document, along with other OES 2 Linux Best Practice Guides, can be found with the NetWare to Linux Migration Resources at: http://www.novell.com/products/openenterpriseserver/netwaretolinux/view/all/-9/tle/all Contents Acknowledgments.................................................................................. iv Getting Started...................................................................................... 1 Why OES 2?..............................................................................................1 Which Services Are Right for OES 2? ................................................................4
    [Show full text]
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • NFS Gateway for Netware 6 Administration Guide October 22, 2003
    Novell Confidential Manual (99a) 11 September 2003 Novell * NFS Gateway for NetWare® 6 www.novell.com ADMINISTRATION GUIDE October 22, 2003 Novell Confidential Manual (99a) 11 September 2003 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. You may not export or re-export this product in violation of any applicable laws or regulations including, without limitation, U.S. export regulations or the laws of the country in which you reside. Copyright © 2003 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. U.S. Patent No. 5,157,663; 5,349,642; 5,455,932; 5,553,139; 5,553,143; 5,572,528; 5,594,863; 5,608,903;5,633,931; 5,652,859; 5,671,414;
    [Show full text]
  • Print Xchange System Administration and Operations Guide for Windows NT (PDF, 3.8
    System Administration and Operations Guide for Windows NT Version 1.2 Pub# 613P07290 July 1998 Xerox Corporation 701 South Aviation Boulevard El Segundo, CA 90245 Publication #613P07290 Copyright 1997-1998 Xerox Corporation. All rights reserved. Portions of this software also include copywritten software modules from Sun Microsystems, Digital Equipment Corporation, and Raima Corporation. Copyright protection claimed includes all forms and matters of copyrightable material and information now allowed by statutory or judicial law or hereinafter granted, including without limitation, material generated from the software programs which are displayed on the screen, such as icons, screen displays, looks, etc. Xerox, The Document Company, the stylized X, and all Xerox product names mentioned in this publication are trademarks of Xerox Corporation. Sun, SPARCstation, NIS, NIS+, OpenWindows, and Solaris are registered trademarks of Sun Microsystems, Inc. Microsoft, Windows NT, Windows 95, and LAN Manager are registered trademarks of Microsoft Corporation. IBM is a registered trademark of International Business Machines Corporation. Digital is a registered trademark of Digital Equipment Corporation. Apple and Macintosh are registered trademarks of Adobe Systems Incorporated. NetWare is a registered trademark of Novell, Incorporated. Common Desktop Environment is a copyright of the Common Operating System Environment. Other product names used herein are trademarks of their respective owners. Changes are periodically made to this document. Changes, technical inaccuracies, and typographic errors will be corrected in subsequent editions. Printed in the United States of America. Table of contents 1. About this guide 1-1 Audience 1-1 Conventions used in this manual 1-1 Related publications 1-2 2. PrintXchange overview 2-1 Concepts and terminology 2-1 PrintXchange features and benefits 2-3 PrintXchange printing system components 2-15 Interoperability 2-22 Multinational considerations 2-24 3.
    [Show full text]
  • IT Acronyms.Docx
    List of computing and IT abbreviations /.—Slashdot 1GL—First-Generation Programming Language 1NF—First Normal Form 10B2—10BASE-2 10B5—10BASE-5 10B-F—10BASE-F 10B-FB—10BASE-FB 10B-FL—10BASE-FL 10B-FP—10BASE-FP 10B-T—10BASE-T 100B-FX—100BASE-FX 100B-T—100BASE-T 100B-TX—100BASE-TX 100BVG—100BASE-VG 286—Intel 80286 processor 2B1Q—2 Binary 1 Quaternary 2GL—Second-Generation Programming Language 2NF—Second Normal Form 3GL—Third-Generation Programming Language 3NF—Third Normal Form 386—Intel 80386 processor 1 486—Intel 80486 processor 4B5BLF—4 Byte 5 Byte Local Fiber 4GL—Fourth-Generation Programming Language 4NF—Fourth Normal Form 5GL—Fifth-Generation Programming Language 5NF—Fifth Normal Form 6NF—Sixth Normal Form 8B10BLF—8 Byte 10 Byte Local Fiber A AAT—Average Access Time AA—Anti-Aliasing AAA—Authentication Authorization, Accounting AABB—Axis Aligned Bounding Box AAC—Advanced Audio Coding AAL—ATM Adaptation Layer AALC—ATM Adaptation Layer Connection AARP—AppleTalk Address Resolution Protocol ABCL—Actor-Based Concurrent Language ABI—Application Binary Interface ABM—Asynchronous Balanced Mode ABR—Area Border Router ABR—Auto Baud-Rate detection ABR—Available Bitrate 2 ABR—Average Bitrate AC—Acoustic Coupler AC—Alternating Current ACD—Automatic Call Distributor ACE—Advanced Computing Environment ACF NCP—Advanced Communications Function—Network Control Program ACID—Atomicity Consistency Isolation Durability ACK—ACKnowledgement ACK—Amsterdam Compiler Kit ACL—Access Control List ACL—Active Current
    [Show full text]
  • The Networker's Guide to Appletalk, IPX, and Netbios
    03 9777 CH03 5/21/01 3:42 PM Page 85 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS UNTIL THE EARLY 1990S,TCP/IP WAS REALLY ONLY PREVALENT in large govern- ment and research facilities where UNIX and other supercomputing operating systems used it as a common network communications protocol.When PCs came into the picture, they were not networked. Rather, they were used either as front-ends to big micro or mainframe systems (IBM was a big fan of this approach) or as standalone sys- tems. In the early 1980s, as PCs grew in number and in performance, three strategies emerged to provide PCs with networking services:AppleTalk, Novell NetWare, and IBM’s NetBIOS. The goal of this chapter is to give you an understanding of the various protocols that make up the protocol suites and the roles they perform. It is not intended to explain how to design, set up, and manage a network. Chapter 7,“Introduction to Cisco Routers,” and Chapter 10,“Configuring IP Routing Protocols on Cisco Routers,” discuss configuration issues for these protocols. Because NetBIOS is a ses- sion layer protocol rather than a protocol suite, it will be described in the context of its operational behaviors at the end of this chapter. 03 9777 CH03 5/21/01 3:42 PM Page 86 86 Chapter 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS AppleTalk AppleTalk was an outgrowth of the Apple Macintosh computing platform. First intro- duced in 1984 and updated in 1989, it was designed to provide the Macintosh with a cohesive distributed client/server networking environment.AppleTalk,
    [Show full text]
  • Courier V.Everything External Modem: Getting Started
    Courier V.Everything External Modem: Getting Started FINAL 4/96 p/n 1.024.492 1996 U.S. Robotics Access Corp. 8100 North McCormick Blvd. Skokie, IL 60076-2999 All Rights Reserved U.S. Robotics and the U.S. Robotics logo are registered trademarks of U.S. Robotics Access Corp. V.Fast Class and V.FC are trademarks of Rockwell International. Any trademarks, tradenames, service marks or service names owned or registered by any other company and used in this manual are the property of their respective companies. 1996 U.S. Robotics Access Corp. 8100 N. McCormick Blvd. Skokie, IL 60076-2999 USA Table of Contents About This Manual iii We Welcome Your Suggestions.............................................................iii Chapter 1 The Courier 1-1 Courier Controls, Displays, and Connectors.....................................1-3 Status Indicators ....................................................................................1-4 Features...................................................................................................1-5 Chapter 2 Installing the Courier 2-1 What You Need......................................................................................2-1 Package Contents...................................................................................2-3 Installing the Courier ............................................................................2-4 Setting the DIP Switches.......................................................................2-4 Powering On the Courier .....................................................................2-6
    [Show full text]
  • Netware 6 Installation C4882-4 Ch01.F 2/4/02 9:53 AM Page 4
    c4882-4 Ch01.F 2/4/02 9:53 AM Page 3 CHAPTER 1 NetWare 6 Installation c4882-4 Ch01.F 2/4/02 9:53 AM Page 4 Instant Access ● Preparing to install There are four recommended tasks to prepare your network for NetWare 6: ᮣ Back up your data ᮣ Update eDirectory (if necessary) ᮣ Update eDirectory schema (if necessary) ᮣ Update Certificate Authority object in eDirectory Installing ᮣ To install a new server, run INSTALL from the root of the NetWare 6 Operating System CD-ROM. Upgrading ᮣ NetWare 4.x or 5.x — To upgrade to NetWare 6 choose one of these options: • Perform an Accelerated Upgrade by running ACCUPG.exe from the root of the NetWare 6 Operating System CD-ROM. This requires that you first copy the entire NetWare 6 Operating System CD-ROM to a NetWare server that will function as the Staging server. • Perform an In-Place upgrade by running INSTALL from the root of the NetWare 6 Operating System CD-ROM. • Perform a server migration by installing and running NetWare Migration Wizard from a client workstation. This utility is available on the NetWare 6 Operating System CD-ROM (\PRODUCTS\MIGRTWZD.EXE). ᮣ NetWare 3 — To upgrade to NetWare 6, perform a server migration by installing and running NetWare Migration Wizard from a client workstation. This utility is available on the NetWare 6 Operating System CD-ROM (\PRODUCTS\MIGRTWZD.EXE). ᮣ NT v3.51 or v4 — To upgrade to NetWare 6, perform a server migration by installing and running NetWare Migration Wizard from a client workstation.
    [Show full text]
  • Netware 6 Server Management CHAPTER 3
    04 9814 ch03.qxd 8/19/04 9:32 AM Page 165 CHAPTER 3 NetWare 6 Server Management CHAPTER 3 This chapter covers the following testing objectives for Novell Course 3004: Novell Network Management: . Use NetWare Remote Manager . Identify What iMonitor Is and How to Use It . Use iMonitor to Diagnose and Repair eDirectory Problems . Set Up and Configure NSS . Monitor, Manage, and Rebuild NSS Storage Space . Set Up SMS for SBCON and NWBACK32 . Back Up Data with SBCON and NWBACK32 . Restore Data with SBCON and NWBACK32 Novell is directing the construction of the world’s central information super- highway with the help of you, me, and thousands of other electronic transit workers (orange vest optional). NetWare 6 further revolutionizes Novell’s oneNet strategy with the introduction of Web-enabled administration tools, highly scalable networking protocols, and multiprocessor support. Implementing these components makes your job easier and provides your users with more reliable network access. Welcome to anytime, anywhere advanced administration via NetWare 6. As a network administrator, it’s your responsibility to focus on the NetWare 6 network to ensure that it stays fine-tuned and in peak condition. In Chapter 1, “NetWare 6 Installation,” and Chapter 2, “NetWare 6 Upgrade and Migration,” we began our NetWare 6 CNE journey by building the cor- nerstone of your network—the NetWare 6 server. Now it’s time to super- charge the network. 04 9814 ch03.qxd 8/19/04 9:32 AM Page 166 166 PART I Novell Network Management for NetWare 6 This chapter focuses on three key areas related to managing your NetWare 6 server: .
    [Show full text]