Review End of Semester.

Slides:



Advertisements
Similar presentations
Instructor & Todd Lammle
Advertisements

1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Storage Networking. Storage Trends Storage growth Need for storage flexibility Simplify and automate management Continuous availability is required.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
CNT-150VT. Question #1 Your name Question #2 Your computer number ##
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Data Communications and Networks
TCP/IP MODEL   Short overview for OSI model;  What is TCP/IP model?;  How is divided;  The TCP/IP structure;  The Application Layer;  The Transport.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Chapter 1.  Upon completion of this chapter, you should be able to:  Define & identify different types of networks  Describe the advantages & disadvantages.
Getting Connected Overview Getting Connected Overview.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
Lecture 4 : Network Architectures (cont..) 1. 2 Summary of OSI Layers.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 8: Applied Networking IT Essentials v6.0.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
The OSI Model & TCP/IP model
Application Layer Functionality and Protocols
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 10: Application Layer
Level 2 Diploma Unit 10 Setting up an IT Network
v3 JEOPARDY CCNA 1 Module 11 CCNA1 v3 Module 11 Galo Valencia
Application layer 1 Principles of network applications 2 Web and HTTP
Chapter 3 Understanding the OSI Model
Implementing TCP/IP.
Network Wiring and Reference
Storage Networking.
Some bits on how it works
Networking for Home and Small Businesses – Chapter 6
Data Networking Fundamentals
Chapter 10: Application Layer
Teaching Computing to GCSE
Web Development & Design Chapter 1, Sections 4, 5 & 6
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
2018 Valid Cisco Exam Dumps IT-Dumps
Storage Networking.
Chapter 4 Core TCP/IP Protocols
Introduction to TCP/IP
Topic 5: Communication and the Internet
I. Basic Network Concepts
1 Introduction to the Internet.
An Introduction to Computer Networking
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
TCP/IP Protocol Suite: Review
ICT Computing Lesson 4: Computing Network.
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Protocols 2 Key Revision Points.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 2: TCP/IP Architecture.
Prepared by: Adeel Ahmad
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
Chapter 7 Network Applications
Instructor Materials Chapter 8: Applied Networking
Chapter 2.1: Introduction to TCP/IP
Computer Networks Protocols
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Review End of Semester

Review First Half of Semester

First Half What is infrastructure Computer Basics Number systems Data storage Numbers Characters

First Half Networks MAC addresses IP TCP/UDP ARP Only way one computer can connect to another Unique addresses for all NICs IP Unique addresses for computers Within a network IPv4 ~4 billion addresses in 5 Classes IPv6 ~3.4x1038 addresses TCP/UDP Ways to transmit data Assured delivery (TCP) Low overhead (UDP) ARP Find the MAC address of a computer Local network

First Half Networks Switches allow connections between computers In a local network Only computers in their (logical) network are allowed to directly communicate Routers Transmit data from one network to another NAT DHCP

First Half DNS Gives "human" names to computer addresses Is not "really" needed Makes the Internet human friendly Arguably the most important service on the Internet

First Half HTTP HTML Allows retrieving of "HyperText" material Language of the HyperText Formatting Referencing other docs

Second Half of Semester

Last Half Web Servers Mail Servers Apache IIS HTTP server NGINX Many others… Mail Servers SMTP POP and IMAP

Last Half Telenet, et. Al. SSH Remote control over network rsh, rlogin Remote file access rcp, ftp Typically unsecure But not entirely obsolete! SSH Secure network protocols ssh, scp, sftp, etc…

Last Half Storage How a disk works RAID LVM Operational parameters 0 – striped Bigger, faster Single failure complete data loss 1 – duplicated Wasted space No loss if drive failure 5,6 – redundancy though parity Can survive one or more drive losses LVM Can manage drives

Last Half Distributed Files Systems NAS/SAN Access other systems data NFS, AFS, SMB NAS/SAN File access (NAS) Multiple access by various users/systems By files Block access (SAN) Only one system may access Like an unformatted hard drive

Last Half SNMP LDAP SPAM Monitor/Control Network resources Client/server Monitors are the clients Network devices are the servers LDAP Directory Protocol SPAM Indirectly impacts Infrastructure

Last Half Network Computing Backup VNC VPN Remote access to a computer Accesses the GUI VPN Extending a secure network to remote locations Accesses the resource Backup Critical to ensure data is kept “safe” Often overlooked or ignored