• Aucun résultat trouvé

Mobile computing

Dans le document and System Administration (Page 86-90)

System components

2.9 IPv6 networks

2.9.4 Mobile computing

IPv6 includes support for mobile routing. If a computing device belonging to a particular routing domain finds itself connected via a different routing environ-ment, it first attempts to connect to its home router and establish a forwarding address. This allows packets sent to its fixed IP address to be forwarded to the new location, as well as establishing a direct route for all self-initiated communication.

The forwarding addresses are called ‘care of’ (i.e. c/o) addresses.

Exercises

Self-test objectives

1. Describe the main hardware components in a human–computer system.

2. What rules of thumb would you use for handling the different hardware components.

3. What effect does temperature have on computer systems?

4. What is the function of an operating system? (Hint: how do you define an operating system?)

5. Why is it important to distinguish between single and multiuser operating systems?

6. What is meant by a securable operating system?

7. What is meant by a shell?

8. What is the role of a privileged account? Do non-securable operating systems have such accounts?

9. Summarize the similarities between Unix and Windows.

10. What do the DOS/Windows drive letters A:, B:, etc. correspond to in Unix-like operating systems?

11. What is an Access Control List?

12. How are files shared between users in Unix/Windows?

13. How are files shared between computers in Unix/Windows?

14. What is meant by a process or task?

15. How are processes started and stopped?

16. Name and describe the layers of the OSI model.

17. Describe the main local area networking technologies and how they differ.

18. What are the following?: i) repeater, ii) hub, iii) switch, iv) bridge, v) router.

19. How is a network packet from a single host computer prevented from spread-ing randomly all over the planet? How is such a packet still able to reach a specified location on the other side of the planet?

20. What does it mean to say that a computer is big-endian?

21. What is an IP address and what does it look like?

22. Do class A,B,C IP addresses have any meaning today?

23. What IPv4 addresses are reserved and why?

24. What is a loopback address?

25. What is meant by a broadcast address?

26. Describe the purpose of a subnet and its netmask.

27. What is a default route?

28. What are ARP and RARP? Are they needed in IPv6? Why/why not?

29. Explain the concept of an Autonomous System.

30. What is meant by Network Address Translation, and what is its main pur-pose?

31. Describe how IPv6 addresses differ from IPv4 addresses.

32. Can IPv6 completely replace IPv4?

Problems

1. Compare and contrast Windows with Unix-like operating systems. If you need a refresher about Unix, consider the online textbook at Oslo University College [40].

2. Under what circumstances is it desirable to use a graphical user interface (GUI), and when is it better to use a command language to address a computer? (If you answerneverto either of these, you are not thinking hard enough.)

3. The purpose of this exercise is to make yourself familiar with a few Unix tools which you will need to use to analyze networks later. Remember that the aim of this course is to make you self-sufficient, not to force feed you information.

This exercise assumes that you have access to a Unix-like operating system.

(a) Use thesshcommand to log onto a host in your domain.

(b) Use the command unamewith all of its options to find out what type of host it is.

(c) Familiarize yourself with the commands df, nslookup,mount, finger .clients(GNU finger). What do these commands do and how can you use them?

(d) Start the programnslookup. This starts a special shell. Assuming that your local domain is called domain.country, try typing

> ls domain.country

If you get an error, you should ask your administrator why. The ability to list a domain’s contents can be restricted for security reasons. Then try this and explain what you find:

> set q=any

> domain.country

(e) Thenslookup command is now deprecated, according to some Unices, and is replaced with dig and host. Use the dig command to look up host names:

dig www.gnu.org dig -x 199.232.41.10

Now do the same using the host command with IPv4 and IPv6 host nexus.iu.hio.no

nexus.iu.hio.no has address 128.39.89.10 host -t aaaa nexus.iu.hio.no

nexus.iu.hio.no has AAAA address 2001:700:700:3:a00:20ff:fe9b:dd4a

host -n 2001:700:700:3:a00:20ff:fe9b:dd4a

a.4.d.d.b.9.e.f.f.f.0.2.0.0.a.0.3.0.0.0.0.0.7.0.0.0.7.0.

1.0.0.2.ip6.int domain name pointer nexus.iu.hio.no.

4. Review the principal components in a computer. Are there any differences between an electronic calculator and a PC? Which parts of a computer require maintenance?

5. Deconstruct and recontruct a PC from basic components. Make sure that it works. Document the process as you go, so that you could build another computer from scratch.

6. Review the concept ofvirtual memory. If you do not have access to a textbook on operating systems, see my online textbook [40]. What is swapping and what is paging? Why is paging to a file less efficient than paging to a raw partition?

7. Explain how a filesystem solves the problem of storing and retrieving files from a storage medium, such as a disk. Explain how files can be identified as entities on the magnetic surface. Finally, explain how the concept of a filesystem can hide the details of the storage medium, and allow abstractions like network disk sharing.

8. Locate the important log files on your most important operating systems.

How do you access them, and what information do they contain? You will need this bird’s eye view of the system error messages when things go wrong.

(Hint: there are log files for system messages, services like WWW and FTP and for mail traffic. Try usingtail -f logfileon Unix-like hosts to follow the changes in a log file. If you don’t know what it does, look it up in the manual pages.)

9. Explain what an access control list is. Compare the functionality of the Unix file permission model with that of access control lists. Given that ACLs take up space and have many entries, what problems do you foresee in administering file security using ACLs?

10. Explain why the following are invalid IPv4 host addresses:

(a) 10.1.0.0 (b) 10.1.0.255 (c) 0.12.16.89 (d) 255.9.56.45 (e) 192.34.255.255

Chapter 3

Dans le document and System Administration (Page 86-90)