Presentation is loading. Please wait.

Presentation is loading. Please wait.

Review End of Semester.

Similar presentations


Presentation on theme: "Review End of Semester."— Presentation transcript:

1 Review End of Semester

2 Review First Half of Semester

3 First Half What is infrastructure Computer Basics Number systems
Data storage Numbers Characters

4 First Half Networks MAC addresses IP TCP/UDP ARP
Only way one computer can connect to another Unique addresses for all NICs IP Unique addresses for computers Within a network IPv4 ~4 billion addresses in 5 Classes IPv6 ~3.4x1038 addresses TCP/UDP Ways to transmit data Assured delivery (TCP) Low overhead (UDP) ARP Find the MAC address of a computer Local network

5 First Half Networks Switches allow connections between computers
In a local network Only computers in their (logical) network are allowed to directly communicate Routers Transmit data from one network to another NAT DHCP

6 First Half DNS Gives "human" names to computer addresses
Is not "really" needed Makes the Internet human friendly Arguably the most important service on the Internet

7 First Half HTTP HTML Allows retrieving of "HyperText" material
Language of the HyperText Formatting Referencing other docs

8 Second Half of Semester

9 Last Half Web Servers Mail Servers Apache IIS HTTP server NGINX
Many others… Mail Servers SMTP POP and IMAP

10 Last Half Telenet, et. Al. SSH Remote control over network
rsh, rlogin Remote file access rcp, ftp Typically unsecure But not entirely obsolete! SSH Secure network protocols ssh, scp, sftp, etc…

11 Last Half Storage How a disk works RAID LVM Operational parameters
0 – striped Bigger, faster Single failure complete data loss 1 – duplicated Wasted space No loss if drive failure 5,6 – redundancy though parity Can survive one or more drive losses LVM Can manage drives

12 Last Half Distributed Files Systems NAS/SAN Access other systems data
NFS, AFS, SMB NAS/SAN File access (NAS) Multiple access by various users/systems By files Block access (SAN) Only one system may access Like an unformatted hard drive

13 Last Half SNMP LDAP SPAM Monitor/Control Network resources
Client/server Monitors are the clients Network devices are the servers LDAP Directory Protocol SPAM Indirectly impacts Infrastructure

14 Last Half Network Computing Backup VNC VPN
Remote access to a computer Accesses the GUI VPN Extending a secure network to remote locations Accesses the resource Backup Critical to ensure data is kept “safe” Often overlooked or ignored


Download ppt "Review End of Semester."

Similar presentations


Ads by Google