Download presentation
Presentation is loading. Please wait.
1
Review End of Semester
2
Review First Half of Semester
3
First Half What is infrastructure Computer Basics Number systems
Data storage Numbers Characters
4
First Half Networks MAC addresses IP TCP/UDP ARP
Only way one computer can connect to another Unique addresses for all NICs IP Unique addresses for computers Within a network IPv4 ~4 billion addresses in 5 Classes IPv6 ~3.4x1038 addresses TCP/UDP Ways to transmit data Assured delivery (TCP) Low overhead (UDP) ARP Find the MAC address of a computer Local network
5
First Half Networks Switches allow connections between computers
In a local network Only computers in their (logical) network are allowed to directly communicate Routers Transmit data from one network to another NAT DHCP
6
First Half DNS Gives "human" names to computer addresses
Is not "really" needed Makes the Internet human friendly Arguably the most important service on the Internet
7
First Half HTTP HTML Allows retrieving of "HyperText" material
Language of the HyperText Formatting Referencing other docs
8
Second Half of Semester
9
Last Half Web Servers Mail Servers Apache IIS HTTP server NGINX
Many others… Mail Servers SMTP POP and IMAP
10
Last Half Telenet, et. Al. SSH Remote control over network
rsh, rlogin Remote file access rcp, ftp Typically unsecure But not entirely obsolete! SSH Secure network protocols ssh, scp, sftp, etc…
11
Last Half Storage How a disk works RAID LVM Operational parameters
0 – striped Bigger, faster Single failure complete data loss 1 – duplicated Wasted space No loss if drive failure 5,6 – redundancy though parity Can survive one or more drive losses LVM Can manage drives
12
Last Half Distributed Files Systems NAS/SAN Access other systems data
NFS, AFS, SMB NAS/SAN File access (NAS) Multiple access by various users/systems By files Block access (SAN) Only one system may access Like an unformatted hard drive
13
Last Half SNMP LDAP SPAM Monitor/Control Network resources
Client/server Monitors are the clients Network devices are the servers LDAP Directory Protocol SPAM Indirectly impacts Infrastructure
14
Last Half Network Computing Backup VNC VPN
Remote access to a computer Accesses the GUI VPN Extending a secure network to remote locations Accesses the resource Backup Critical to ensure data is kept “safe” Often overlooked or ignored
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.