Chabot College Chapter 8 Review Semester IIIELEC 99.09 Semester III ELEC 99.09.

Slides:



Advertisements
Similar presentations
Peer-to-Peer vs. Client/Server Network Operating Systems Instructor: Dr. Najla Al-Nabhan
Advertisements

WHAT IS RAID? Christopher J Dutra Seton Hall University.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Chapter Thirteen Maintaining and Upgrading a Network.
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Institute of Technology, Sligo Dept of Computing Network Management Semester 3, Chapter 8.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
CHAPTER Network Reliability: Fault Tolerance and Other Issues.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Enterprise Network Security Accessing the WAN Lecture week 4.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Working with Workgroups and Domains
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
SYSTEM ADMINISTRATION Chapter 15 Network Integrity.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Chapter 2 Chapter 2: Planning for Server Hardware.
Installing Microsoft Windows Server 2008 Lesson 2.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
CIS 191 – Lesson 2 System Administration. CIS 191 – Lesson 2 System Architecture Component Architecture –The OS provides the simple components from which.
Basic Network Concepts Introduction to Computing Lecture#28.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
IT Infrastructure Chap 1: Definition
Network Operating Systems versus Operating Systems Computer Networks.
Operating Systems JEOPARDY Computer Repair NetworkOS OS Tasks ConceptsComponentsMisc
Chapter 8 Selecting and Maintaining Digital Resources.
Ch. 8 StudyCast SarahBeth Walker. Software Selection  Software does the critical work in the classroom.  Mindtools  Support for conversation/community.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
1/28/2010 Network Plus Malware and Ensuring Availability.
FIT03.05 Explain features of network maintenance.
Communications & Networks National 4 & 5 Computing Science.
Cisco S3C8 Network Management. Documentation diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable;
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Storage Networking. Storage Trends Storage grows %/year, gets more complicated It’s necessary to pool storage for flexibility Intelligent storage.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 8/Cisco 3 - Module 8 Network Management, Part 1.
UNIX/AIX COURSE OUTLINES AND SYLLABUS Document Version: 1.0 Created on: 09/19/2014 Author: Walter Takang Confirmed by: Walter Takang.
1 Chapter Overview Understanding Shared Folders Planning, Sharing, and Connecting to Shared Folders Combining Shared Folder Permissions and NTFS Permissions.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
3.Data Communications 3.3Network Operating Systems.
2: Operating Systems Networking for Home & Small Business.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
1INTRODUCTION TO NETWORKING. Objective Introduction to networks. Need for networks. Classification of networks. 2INTRODUCTION TO NETWORKING.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
CHAPTER Network Operating System Concepts. Chapter Objectives Provide an overview of network operating systems and its functions Explain the concept of.
Linux Systems Administration 101 National Computer Institute Sep
Network Management Chapter 8 Semester 3 By Roger Lewis.
Chapter Objectives In this chapter, you will learn:
Answer to Summary Questions
Securing Network Servers
CompTIA Security+ Study Guide (SY0-401)
AS ICT Module 2 Objectives: Security of Data
Installing OS.
DEPLOYING SECURITY CONFIGURATION
Presentation transcript:

Chabot College Chapter 8 Review Semester IIIELEC Semester III ELEC 99.09

Documentation Documentation is the most critical component of good network administration. Documentation is the least implemented component of network administration. A maintenance record is used to keep a list of equipment repairs. Rack mount location is included in MDF and IDF documentation. Software listings would NOT be found on security documentation.

Documentation A software report would be used to determine what programs are installed on a particular computer. Network policy should be used to select network passwords. User policies refer to documentation that outlines what is and what is not permissible on the network. Configuration error is NOT used as a baseline measure.

Network Operating Systems Network operating system (NOS) controls the resources and management of a client- server network. The Unix network operating system supports multi-user, multitasking, primarily uses NFS security, and is kernel based.

Peer-to-Peer Networks The recommended maximum number of users in a peer-to-peer network is 10. A dedicated server is NOT associated with a peer-to-peer network. A peer-to-peer network is also known as a workgroup network.

Troubleshooting Network troubleshooting is defined as a systematic process. Your first step in the troubleshooting process is to gather data. A possible solution to the problem of EMI/RFI effecting performance on your network is using STP cable.

Troubleshooting The ping command will test the loopback function on the NIC. An isolating transformer controls voltage spikes and HF noise. A grounding strap reduces the static discharge risks associated with working on the inside of a computer.

Infections A worm is a program that spreads across computers and usually reproduces copies of itself in a computer's memory. A virus is a program that usually has a negative effect on executable programs.

Backup and Storage Incremental backup stores all files that have been created and modified since the last full backup. Magnetic tape is used to backup data because the tape is inexpensive. RAID 5 is a redundancy technique that uses disk striping with parity and requires a minimum of three disks.