it 101 j.j. ekstrom, ph.d. networking, information management, information assurance and security,...
TRANSCRIPT
![Page 1: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/1.jpg)
IT 101
J.J. Ekstrom, Ph.D.
Networking, Information Management,Information Assurance and Security,Software Development, Systems EngineeringIT Curriculum Development
![Page 2: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/2.jpg)
2
Education and Academia
BS BYU 1974MS BYU 1976Ph.D. BYU 1992BYU PT faculty 1979-1987, 2000Associate Professor, EIT 2001BYU Continuing Status 2007IT Program Chair 2007Programmer since 1966
![Page 3: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/3.jpg)
3
System Software
Operating SystemsCompilersLinkers/LoadersObject-oriented Design and Programming Systems
![Page 4: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/4.jpg)
4
Embedded Systems
Automatic Storage and Retrieval SystemsMilitary applicationsMicroprocessor Control ROMs
![Page 5: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/5.jpg)
5
Application Areas
MedicalBankingInventory and material managementInformation retrieval and indexingNetwork managementLAN switch software designEmail archiving and management
![Page 6: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/6.jpg)
6
Business
6-8 Startups (Depending on how you count)4 Large CompaniesVPDirectorCTOConsulting EngineerMTS
![Page 7: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/7.jpg)
7
What you should remember:
You will probably do a lot of different things during your lifeYou will have to learn continuously or become obsoleteThe only physical constant in life is changeStay close to the Spirit, He gives you glimpses of what is over the horizon.
![Page 8: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/8.jpg)
8
Networking and Buzzwords
OSI ModelInternet ModelDevices: Hosts, Hubs, Switches, RoutersNetwork DesignNetwork DeploymentNetwork Management
![Page 9: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/9.jpg)
9
Alphabet Soup:OSI 7 layer modelInternet/internetISPIPTCPIETFIEEEpingtracerouteSNMPSMTPIMAPPOPFTPSCPSSH
802.11g802.1Q802.1DHTTPHTMLURLRIPOSPFBGP4JavaScriptJ2EEPHPPerlPythonRubyVBVPscript…
![Page 10: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/10.jpg)
10
There ain’t no magic!
All of the acronyms have simple meaningsYou can figure out anything in IT if you are willing to dig a bitThere is a world of information at your fingertips, don’t be afraid to Google for answers.A college education can only prepare you to learnThe details will be obsolete within a few years of graduationI don’t use a language that was available when I got my Master’s Degree! (except English ;-)
![Page 11: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/11.jpg)
11
Details for those who care:
Credits: Data Communications and
Networking, 2nd Edition. Behrouz A. Forouzan, McGraw-Hill, ©2001, 1998
Website associated with text.
Some slides for digging:
![Page 12: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/12.jpg)
12
Figure 3-1
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
OSI Model
![Page 13: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/13.jpg)
13
Figure 3-2
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
OSI Layers
![Page 14: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/14.jpg)
27
Figure 3-14
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
Summary of Layer Functions
![Page 15: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/15.jpg)
28
Figure 24-1
An Internet According to TCP/IP
![Page 16: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/16.jpg)
29
Different Standards Bodies:
OSI – Open Systems InterconnectIEEE 802 – Physical -> Data Link Divide DL into
Logical Link Control (LLC) Media Access Control (MAC)
802.11 wirelessIETF – Internet ProtocolsOMG – Middleware DMTF – Management Models… many others
![Page 17: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/17.jpg)
30
Figure 12-1
WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998
OSI Model and Project 802
![Page 18: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/18.jpg)
31
Figure 24-2TCP/IP and the OSI Model
![Page 19: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/19.jpg)
32
Physical / Data Link
Remember that IP rides on something else, PPP, PPPOE, Ethernet, Token ring, ATM…The following discussion takes the lower layers for granted.The only time you have to think about the physical and Data Link is when they don’t work.80% of the time when a network doesn’t work it’s the cables!
![Page 20: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/20.jpg)
33
Troubleshooting: Ping fails
Ping tests layers 1,2,3Start at the physical layer and work up. Cables NIC – do you have a link light?
MAC layer self configures, see if you can sniff (carry a laptop and a
hub) Almost never the problem!
If you have link, problem is probably setup of addressing.
![Page 21: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/21.jpg)
34
Figure 24-3
IP Datagram
![Page 22: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/22.jpg)
35
Figure 24-4
Internet Address
![Page 23: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/23.jpg)
36
Figure 24-5
Internet Classes
![Page 24: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/24.jpg)
37
Figure 24-6
IP Addresses in Decimal Notation
![Page 25: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/25.jpg)
38
Figure 24-7
Class Ranges of Internet Addresses
![Page 26: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/26.jpg)
39
Figure 24-8Network and Host Addresses
![Page 27: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/27.jpg)
40
Figure 24-9
A Network with Two Levels of Hierarchy
![Page 28: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/28.jpg)
41
Figure 24-10
A Network with Three Levels of Hierarchy
![Page 29: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum](https://reader036.vdocument.in/reader036/viewer/2022070406/56649e055503460f94af1f35/html5/thumbnails/29.jpg)
42
Figure 24-11
Addresses with and without Subnetting