lesson 1 review of foundation- 2bup

24
Review of Foundation LESSON 1

Upload: ma-cecilla-vergara

Post on 15-Feb-2017

202 views

Category:

Education


5 download

TRANSCRIPT

Page 1: Lesson 1   review of foundation- 2bup

Review of FoundationLESSON 1

Page 2: Lesson 1   review of foundation- 2bup

Network Administration and Maintenance

Administrator sometimes abbreviated admin. is the one who is responsible for software

installation, management, information and maintenance of a computer or network.

Page 3: Lesson 1   review of foundation- 2bup

Network Administration and Maintenance

Page 4: Lesson 1   review of foundation- 2bup

Network Administration and Maintenance

Network Administrator is an individual that is responsible for the

maintenance of computer hardware and software systems that make up a computer network including the maintenance and monitoring of active data network or converged infrastructure and related network equipment.

Page 5: Lesson 1   review of foundation- 2bup

Network Administration and Maintenance

Network AdministratorNetwork Administrators are generally “mid-

level support staff” within an organization and don't typically get involved directly with users.

Page 6: Lesson 1   review of foundation- 2bup

Network Administration and Maintenance

Network AdministratorNetwork Administrators focus upon network

components within a company's LAN/WAN infrastructure ensuring integrity.

Depending on the company and its size, the Network Administrator may also design and deploy networks.

Page 7: Lesson 1   review of foundation- 2bup

Sneak Peak

What is that packet tracer? Packet Tracer is a powerful network simulation

program that allows students to experiment with network behavior and ask “what if” questions.

Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts.

Page 8: Lesson 1   review of foundation- 2bup

Network Administration and Maintenance

Network Administrator The actual role of the network administrator will vary

from place to place, but will commonly include activities and tasks such as network address assignment, management and implementation of routing protocols such as RIPv2, HSRP, routing table configurations and certain implementations of authentication (eg: challenge response, etc).

It can also include maintenance of certain network servers: file servers, VPN gateways, intrusion detection systems, etc.

Page 9: Lesson 1   review of foundation- 2bup

Network Administration and Maintenance

Network Administrators are often involved in proactive work. This type of work will often include: Network monitoring Testing the network for weakness Keeping an eye out for needed updates Installing and implementing security programs In many cases, E-mail and Internet filters Evaluating implementing network management

software

Page 10: Lesson 1   review of foundation- 2bup

Data Communications and Computers

Data are the quantities, characters, or symbols on which

operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.

Page 11: Lesson 1   review of foundation- 2bup

Data Communications and Computers

Data vs information Data

Data is raw, unorganized facts that need to be processed. Data can be something simple and seemingly random and useless until it is organized.

InformationWhen data is processed, organized, structured or

presented in a given context so as to make it useful, it is called Information.

Page 12: Lesson 1   review of foundation- 2bup

Data Communications and Computers

Communication meaning to share is the activity of conveying information through the

exchange of thoughts, messages, or information, as by speech, visuals, signals, writing, or behavior. It is the meaningful exchange of information between two or a group of person.

Page 13: Lesson 1   review of foundation- 2bup

Looking Back

Morse codeMorse code is represented by

On and Off tones, lights or clicked that can be understand by a skilled listener or observer w/out special equipment.

It was standardized as dashes and dots or dits and dash.

Page 14: Lesson 1   review of foundation- 2bup

Data Communications and Computers

Communications can take many forms and occurs in many different environments:

Spoken language

Body language and facial expressions

Pictures and written word

Page 15: Lesson 1   review of foundation- 2bup

Data Communications and Computers

In communication we establish rules, or protocols, for communicating with each other:Identify the sender and receiver.Agree on the method.Common language.Speed and delivery of the message.Confirmation that the message was

received.

Page 16: Lesson 1   review of foundation- 2bup

Data Communications and Computers

Communications between individuals is successful if the meaning of the received message is the same as the meaning of the message that was sent.

Page 17: Lesson 1   review of foundation- 2bup

Data Communications and Computers

For data networks, we use the same basic criteria to judge successful communication. identify the sender and the receiver

IP and MAC addressAgree on the method.

Network Protocols. Ex. TCP,UDP Common language

OSI, TCP/IP models and binaries

Page 18: Lesson 1   review of foundation- 2bup

Data Communications and Computers

For data networks, we use the same basic criteria to judge successful communication.Speed and delivery of the message

Bandwidth, Delays, BottleneckConfirmation that the message

received.TCP protocols acknowledgement.

Page 19: Lesson 1   review of foundation- 2bup

Data Communications and Computers

Also in data communication, it is also important that if the message was successfully sent and received.

A successful message is when you received the correct packets and their numbers.

Page 20: Lesson 1   review of foundation- 2bup

Looking Back

What is a packet? A packet is one unit of binary data capable of

being routed through a computer network. To improve communication performance and

reliability, each message sent between two network devices is often subdivided into packets by the underlying hardware and software.

Page 21: Lesson 1   review of foundation- 2bup

Looking Back

Depending on the protocol(s) they need to support, packets are constructed in some standard packet format.

Page 22: Lesson 1   review of foundation- 2bup

Looking Back

Page 23: Lesson 1   review of foundation- 2bup

Looking Back

The receiving device is responsible for re-assembling individual packets into the original message, by stripping off the headers and footers and concatenating packets in the correct sequence.

Page 24: Lesson 1   review of foundation- 2bup

Looking Back

However, there are external factors that can affect the message. The quality of the pathway between the sender and

the recipient. The number of times the message has to change

form or be redirected or re-addressed. The number of other messages being transmitted

simultaneously on the communication network. The amount of time allotted for successful

communication.