How to create new users on the linux lite system

Assignment Help Other Subject
Reference no: EM132275272

Lab 1 - Networking and Security Lab

Task 1

1. Open Windows Explorer
2. Navigate to C:\VBoxImages\
3. Double click RefreshImages.bat
4. Double click vb.bat

You should see the VirtualBox interface on screen as attached below.

The left hand pane shows the LinuxLite Virtual Operating system.

The Right hand pane show the Virtual Hardware settings of the currently selected Virtual Machine.

Click the Start (Green Arrow) to run the Linux Lite Virtual Machine.

You should see the Linux Lite GUI display as shown below.

The password for user1 is user1pw

(The password for user2 (later) it is user2pw )

Enter the password for user 1 to login to Linux Lite.

The top Left Hand corner has an icon to the Linux Lite Help manual.

Double click the Help manual icon.

This will run Firefox and display the Linux Lite manual.

This web site will be invaluable for learning how to configure and use Linux Lite.

In the bottom Left Hand corner of the screen are a set of icons primarily used to run applications.

The three icons on the right run the following programs:
• FireFox
• Thunar (which is a File Manger much like Windows Explorer)
• Terminal

The Menu icon invokes the screen shown below. As you can see the Office category of applications has Office productivity tools for word-processing, spread sheeting and presentations.

These are the LibreOffice free equivalents to Microsoft Office.

Other categories of applications can be selected in the left hand pane.

Try selecting System to observe the applications associated with the System category, then select multimedia then Internet etc.

You should now have a good feel for the GUI applications that are part of the basic Linux Lite distribution.

In the bottom Right Hand corner of the screen are a few more icons.

These allow the following:
• Multiple Desktop workspaces to be setup (Great productivity tool)
• Observe network settings
• Change speaker volume and Microphone level
• Observe the time and date

To configure extra Desktop workspaces do the following:
• Right click on one of the two workspace boxes (in the Bottom Right Hand Corner of screen)
• Select Workspace Settings
• Change the number of workspaces to 6

Task 2 - Gain some familiarity with Linux applications

The Linux calculator allows conversions between the four (4) number systems discussed in Topic 1.

Run the Calculator
Menu > Accessories > Calculator > View > Scientific Mode

Enter the hexadecimal number 0x2A then convert it to the other three number systems.

Determine the control sequences to do each conversion from the keyboard.

Run the Text Editor
Menu > Accessories > Text Editor
(This program is similar to Notepad on Windows.)

Create a file with 4 or 5 lines of text. (Determine how to display line numbers)

Run LibreOffice Writer
Create a file with different types of formatting including different fonts, different sized fonts bold, Italic etc.
You should realise the similarities to the Microsoft equivalent products.

Now copy the text to the Text Editor program to erase all formatting.

LibreOffice Impress &LibreOfficeCalc
Try the other two Office Products to create a 3 slide presentation and a small spreadsheet.
Take note of the Microsoft formats with which you can save both types of documents.

Configuring your Desktop

Changing your Desktop on Workspace #1

Click on the First WorkSpace icon (left most icon) in the Linux Panel (equivalent to Windows Taskbar) along the bottom of the Linux Lite interface.

Right click the desktop > select the Background Tab > Choose a Background that you like > Uncheck "Apply to all workspaces"

While on this Workspace run LibreOffice Writer and the LeafPad Text editor.

Changing your Desktop on Workspace #2

Now click the second workspace and apply a different Background to that Workspace.

Run FireFox on this Desktop.

Desktop URL Links

While on this Desktop Create a URL link to Google Maps.

To do this Open your Browser to Google Maps. And copy the URL.

Right the Linux Desktop > Create URL Link > Give it a name and paste the URL.

Double click the URL Link and determine the Time it takes to fly from Beijing to Xian, China.

The tasks above a just a small sample of working with the Linux Lite GUI interface.

If you want to fiddle more, read the Linux Lite documentation in conjunction with a running sessions of Linux Lite.

Assessment demonstrate the following to your tutor:
• 6 Desktop workspaces
• Different backgrounds on 3 of the workspaces
• A workspace with a URL link to Google Maps
• A Google Map showing Beijing and Dalian

File Management on Linux Lite

The Thunar File Manager can be run from the Beige Icon in the Panel (at the bottom of the screen)

When you click on the icon the File Manager will display your Home Directory. Your home directory is at /home/user1/ as can be seen at the top of the File Manager in the Location selector.

Using Thunar File Manager you are able to navigate your way around the Linux Lite file system. Note - The file system on Linux Lite is standardized across Linux distributions and so understanding this file system holds you in good stead when working on other Linux distributions.

The Root (Start) of the Linux File System

The start ( or root ) of the Linux File System is designated using a forward slash /

If you click on the "File System" icon in the left hand pane the root of the file system and all directories in it will display.

Directories in Linux have specific functionality. Some important ones are mentioned below.

User Management

Linux is a Multiuser system. Currently our system has two users named user1 and user2.

Note - user1 has administrative privilege whereas user2 is just a normal Linux Lite users. This means the user1 has the required authority on the system to undertake administrative tasks like creating new users.

Under normal circumstances, user1's login operates at normal user privilege, however when user1 tries to undertake privileged tasks (like create new users on the system) he/she is asked to enter the user1 password prior to completing the privileged task.

This helps maintain security on the Linux System by not allowing the user1 user to work at a high privileged state all the time.

Creating new users

The Linux manual describes how to create new users on the Linux Lite system.

• Using the documentation determine how to create a new user.
• Login as the new user
• Navigate to his/her home directory.
• Create a text file in the home directory

Lab 2 - The Application Layer

Task 1: Categories of user applications

Use the Internet to determine the name of at least two user applications that fit into each of the following categories of network application. Feel free to mention quite obscure applications if you can find them.

Category 1: Email

Category 2: Social Media

Category 3: Audio streaming

Category 4: Video streaming

Category 5: File Transfer

Category 6: VoIP

Category 7: Video conferencing

Category 8: Web searching

Category 9: Your choice

Category 10: Your choice

Task 2: Market Capitalization of Internet based enterprises

The development of Internet based services have led to the development of companies that have gained phenomenal growth and market capitalization. (Example Facebook)

Use the Internet to determine 3 of the top 25 Internet companies by market capitalization.

Choose one company and determine how many days it would take you to earn the Market value of that company if you worked 8 hours per day and were paid $1000 per hour.

How many years does this equate to?

Task 3: - Common Web Server Programs

In client server computing, web clients (user applications) include FireFox, Chrome, Safari, Internet Explorer and others.

What are the most popular web server platforms used on the following platforms:
• Linux
• Windows

What is the current market share of each platform?

Task 4: - Common Email Server Programs

What platforms does Exchange run on?

Name 3 Mail Server programs that have versions that will run on Linux and Windows but not on Mac.

Task 5: - Investigate Application Layer protocols of the Internet Model

Some Application Layer protocols that were discussed in the week 3 lecture slides were:
• HTTP (Hypertext Transfer Protocol)
• FTP (File Transfer Protocol)
• BitTorrent
• NTP (Network Time Protocol)
Others.

The Wikipedia Application Layer page lists around 60 Application Layer protocols.

Choose two such protocols and briefly describe what each protocol is used for. Your description must be written with Linux Lite LibreOffice Writer and should be sufficiently detailed so you can describe its operation to your lab tutor (online students should include a screenshot of their 1 or 2 paragraph description in their first lab tasks report).

Task 5 is worth 1 mark towards ITECH1102 assessment (Demo to Tutor)

Lab 3 - Introduction to Wireshark

Wireshark exercises

(i) Capture some network traffic

If you have not already done so run Wireshark.

From the main menu select Capture then Interfaces
Choose the interface that is connected to the Network.
Click Start to begin the capture.

If you are not capturing traffic you may have selected an interface that is not connected to the network.
If you are on a low traffic network you can generate network traffic by running any network enabled program, Firefox for instance. The number of packets generated from basic web sites will be significant.

Wait for about 20seconds then click the Stop button to stop the capture.

Confirmation that we are dealing with a packet switched network.

In Topic 2 we described the differences between circuit switched and packet switched networks.
Starting with Packet # 1 in the Packet List pane determine the size of the packet.
The Frame summary at the top of the packet decode lists the size.
You could also confirm the size by counting the raw bytes in the packet dump pane at the bottom of the screen.

Now look at the sizes of more packets in the capture. The sizes are likely to vary considerably.

Although quite obvious you have just confirmed that the information we are looking at with Wireshark is in fact 10's 100's or 1000's of packets of data. Confirming we are working with Packet Switched network traffic.

(ii) Saving captured traffic

From the file menu select Save As and save the captured traffic to your desktop.

What is the size of the saved file? ........................
What extension does Wireshark use to save such traffic? ........................

Saved files can be loaded into Wireshark from the File Menu for subsequent analysis.

(iii) Analysis of captured traffic

At the top of the packet list pane are 7 headings that give us a brief description of each packet in the packet list.

On busy networks the number of packets in the packet list can grow very quickly.

The Time column indicates the time between subsequent packets. Take a look at this column and determine the number of millionths of a second between any two packets. Try to find a few packets that were sent within a very short time period of one another.

(iv) Sorting traffic

The protocol column is extremely important as it allow us to focus in on specific traffic for close observation.

Click on the Protocol column to sort traffic according to its type.

You will probably see TCP traffic, UDP traffic and hopefully numerous other types of traffic.

(v) Ethernet (MAC addresses)

Arrange the three panes so that the packet list pane (top pane) only shows 3 or 4 packets. This will give you room to display most of (or all of) the packet dump (raw data) pane at the bottom of the screen.

In the Packet Decode pane (middle pane) click on the word Frame. You should see the entire packet dump pane display in blue to indicate the entire transmission constitutes a frame.

Now try clicking on word Ethernet II. You should see the first 14 bytes highlighted in the packet dump pane. This indicates the Ethernet II data constitutes the first 14 bytes of the frame.

Now try clicking the solid triangle next to the Ethernet II. From here you should be able to determine where in the frame the Ethernet Destination address (MAC address) is located. Where the Ethernet source address in located and where the Ethernet type is located in the packet.

How many bytes are used to store the Ethernet Source or destination address? ..............

How many binary bits are required to store the Ethernet destination address? ...............

(vi) Observing captured traffic

There is aWireshark traffic capture (namedRandomTraffic-1.pcapng) included in the topic 4 files stored on Moodle.

Download it to Linux Lite so we can inspect it in the context of the material we have covered so far in lectures.

This file was captured from the Mt Helen networking lab using no capture filter.
The traffic captured is simply background traffic typical of moderately sized networks.
Protocol column

The protocol column tells us the network protocol in this packet.

How many different types of protocol have been captured?
What are the size range of the packets captured?

Encapsulation

In this exercise we want to find the Protocols used at each layer of the Internet Model and the size of the associated layer header.

This information can be found by selecting a packet in the packet list pane then inspecting the packet in the decode pane.

For example packet 1 (TCP packet) is 66 bytes in length.
The first 14 byte are the Ethernet Header
The next 20 bytes are the IP header and the last 32 bytes are the TCP header.

The second byte is an OSPF packet.
It is 94 bytes in length.
It has an IP header associated with it (again 20 bytes) followed by the OSPF information.

OSPF is a Network layer protocol and as such does not require any layers of encapsulation further up the Internet Model so we do not see a TCP header.

Have a look on the Internet to determine a little more information about the role of OSPF in computer networking.
Have a look at the encapsulation of the STP protocol.

Try to determine the encapsulation from the network traffic. (Hint - If you can't see a Network layer protocol header or a Transport Layer protocol then interactions are taking place at a the Data Link layer.

Confirm this by looking on the Internet for information about the particular protocol in question.

Also have a look at the Ethernet Type field of the Ethernet header for STP, note that it is different to all TCP packets.

(vii) Confirmation that Ethernet only requires source and destination MAC addresses to communicate.

Ethernet is only concerned withlocal communications, that is communications between two network interface cards on a common network.
An important point concerning local Ethernet communication is that communications between the two machines only requires the source and destination MAC addresses for communications to take place.

To demonstrate this fact we have developed a program that can run on Linux Lite that creates an Ethernet packet containing the MAC address of your machine (the source) and a destination machine. (You enter the destination machine's MAC address by hand).

The Type field of this particular Ethernet frame is one of the reserved Ethernet types. This was chosen so that Wireshark does not have issues decoding the frame content. It will simply interpret any information beyond the 14 bytes of the Ethernet header as Data.

Machine 1: Any machine that can run Wireshark

You will need to determine the MAC address of this machine so the packet can be formatted correctly on machine 2.

Machine 2: Linux Lite

This machine will be used to format the Ethernet frame and send it.

1. Open Firefox.
2. Enter the URL
3. Click on the file SendEthernet.tar.gz
4. Save the file to the Home directory of user1 ( /home/user1/ )
5. Double click the file SendEthernet.tar.gz file then extract it to user1's home directory.
6. Open a terminal screen
7. Type ls (ls is the list command and should show the contents of your
home directory You should see the file run.sh)
8. Then type sudo ./run.sh and enter the user1 password when prompted.
9. You should see an interface similar to the one on the next page.
10. Make sure you have Wireshark running on the receiving machine and if you like on the Linux Lite machine.
11. Send the packet
12. Stop each instance of Wireshark from capturing more packets.

Attachment:- Lab Sheet.zip

Reference no: EM132275272

Questions Cloud

Discuss an organization that is well known : Discuss an organization that is well known for its competitive advantage.
How you can help ensure training programs are relevant : Training staff internally can be just of beneficial to staff development, as training with a consultant if the same processes of development are adhered to.
Describe the common characteristics of an entrepreneur : Describe the common management challenges that entrepreneurs might have to face and manage effectively to be successful.
Strategically appropriate investment project : Describe in two or three sentences a strategically appropriate investment project that the organization might be evaluating
How to create new users on the linux lite system : ITECH1102 Networking and Security - describes how to create new users on the Linux Lite system - Gain some familiarity with Linux applications
Need for risk management : There are four (4) critical success factors that are important for effective risk management: supportive organization; competent people
Decision for shawnee technology company : If you had to make a business decision for Shawnee Technology Company and only had access to one of the financial statements
Explain development of classical organizational theory : Classical Organizational Theory deals with the "systematic processes necessary to make bureaucracy more efficient and effective." Two scholars.
Audit a healthcare organization : What steps should be taken to mitigate exposure and liability when the federal government shows up to audit a healthcare organization?

Reviews

len2275272

4/4/2019 10:21:31 PM

To gain the first mark in this lab complete the table above and answer selected questions about the encapsulation you have seen to your tutor. Online students should provide a brief summary in your first lab tasks report. For the second mark for this lab show the captured packet to your tutor. The capture can be on your Linux Lite machine or the destination machine. Online students should include a screencapture of the captured packet in their first lab tasks report.

len2275272

4/4/2019 10:20:11 PM

Extra things some students may like to do: • There are numerous Videos on the Internet that discuss using Linux Lite, have a look at some of them and try out some of the configuration processes you observe. • By referring to the Linux Lite Manual test out other configuration options with Linux Lite.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd