SlideShare a Scribd company logo
Review of Foundation
LESSON 1
Network Administration and
Maintenance
 Administrator
 sometimes abbreviated admin.
 is the one who is responsible for software
installation, management, information and
maintenance of a computer or network.
Network Administration and
Maintenance
Network Administration and
Maintenance
 Network Administrator
 is an individual that is responsible for the
maintenance of computer hardware and
software systems that make up a computer
network including the maintenance and
monitoring of active data network or converged
infrastructure and related network equipment.
Network Administration and
Maintenance
 Network Administrator
 Network Administrators are generally “mid-level
support staff” within an organization and don't
typically get involved directly with users.
Network Administration and
Maintenance
 Network Administrator
 Network Administrators focus upon network
components within a company's LAN/WAN
infrastructure ensuring integrity.
 Depending on the company and its size, the
Network Administrator may also design and
deploy networks.
Sneak Peak
 What is that packet tracer?
 Packet Tracer is a powerful network simulation
program that allows students to experiment with
network behavior and ask “what if” questions.
 Packet Tracer provides simulation, visualization,
authoring, assessment, and collaboration capabilities
and facilitates the teaching and learning of complex
technology concepts.
Network Administration and
Maintenance
 Network Administrator
 The actual role of the network administrator will vary
from place to place, but will commonly include
activities and tasks such as network address
assignment, management and implementation of
routing protocols such as RIPv2, HSRP, routing table
configurations and certain implementations of
authentication (eg: challenge response, etc).
 It can also include maintenance of certain network
servers: file servers, VPN gateways, intrusion detection
systems, etc.
Network Administration and
Maintenance
 Network Administrators are often involved in
proactive work. This type of work will often include:
 Network monitoring
 Testing the network for weakness
 Keeping an eye out for needed updates
 Installing and implementing security programs
 In many cases, E-mail and Internet filters
 Evaluating implementing network management
software
Data Communications and
Computers
 Data
 are the quantities, characters, or symbols on which
operations are performed by a computer, being
stored and transmitted in the form of electrical signals
and recorded on magnetic, optical, or mechanical
recording media.
Data Communications and
Computers
 Data vs information
 Data
Data is raw, unorganized facts that need to be
processed. Data can be something simple and
seemingly random and useless until it is organized.
 Information
When data is processed, organized, structured or
presented in a given context so as to make it useful, it is
called Information.
Data Communications and
Computers
 Communication
 meaning to share
 is the activity of conveying information through the
exchange of thoughts, messages, or information, as by
speech, visuals, signals, writing, or behavior. It is the
meaningful exchange of information between two or a
group of person.
Looking Back
 Morse code
 Morse code is represented by
On and Off tones, lights or
clicked that can be
understand by a skilled
listener or observer w/out
special equipment.
 It was standardized as dashes
and dots or dits and dash.
Data Communications and
Computers
 Communications can take many forms and
occurs in many different environments:
Spoken language
Body language and facial expressions
Pictures and written word
Data Communications and
Computers
 In communication we establish rules, or
protocols, for communicating with each other:
Identify the sender and receiver.
Agree on the method.
Common language.
Speed and delivery of the message.
Confirmation that the message was received.
Data Communications and
Computers
 Communications between individuals is
successful if the meaning of the received
message is the same as the meaning of the
message that was sent.
Data Communications and
Computers
 For data networks, we use the same basic
criteria to judge successful communication.
 identify the sender and the receiver
IP and MAC address
 Agree on the method.
Network Protocols. Ex. TCP,UDP
 Common language
OSI, TCP/IP models and binaries
Data Communications and
Computers
 For data networks, we use the same
basic criteria to judge successful
communication.
 Speed and delivery of the message
Bandwidth, Delays, Bottleneck
 Confirmation that the message
received.
TCP protocols acknowledgement.
Data Communications and
Computers
 Also in data communication, it is also important
that if the message was successfully sent and
received.
 A successful message is when you received the
correct packets and their numbers.
Looking Back
 What is a packet?
 A packet is one unit of binary data capable of being
routed through a computer network.
 To improve communication performance and
reliability, each message sent between two network
devices is often subdivided into packets by the
underlying hardware and software.
Looking Back
 Depending on the protocol(s) they need to
support, packets are constructed in some
standard packet format.
Looking Back
Looking Back
 The receiving device is responsible for re-
assembling individual packets into the original
message, by stripping off the headers and
footers and concatenating packets in the
correct sequence.
Looking Back
 However, there are external factors that can
affect the message.
 The quality of the pathway between the sender and
the recipient.
 The number of times the message has to change form
or be redirected or re-addressed.
 The number of other messages being transmitted
simultaneously on the communication network.
 The amount of time allotted for successful
communication.

More Related Content

What's hot

Networking
NetworkingNetworking
Networking
kameeradissanayake
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
Faraz Ahmed
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
Kak Yong
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
Asmita Singh
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
Mehar Arslan
 
network
networknetwork
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
Bijay Bista
 
Computer Networks
Computer Networks Computer Networks
Computer Networks
Rayhanul Islam Sayket
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
rhaymarck
 
What is networking?
What is networking?What is networking?
What is networking?
KeithMorris47
 
Networks
NetworksNetworks
Networks
Edward Blurock
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
sree kanth
 
Ie20303week1
Ie20303week1Ie20303week1
Ie20303week1
Mohd Yusak
 
Computer networks
Computer networksComputer networks
Computer networks
Shamima Akther
 
Unit2.1
Unit2.1Unit2.1

What's hot (20)

Networking
NetworkingNetworking
Networking
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
 
network
networknetwork
network
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Computer Networks
Computer Networks Computer Networks
Computer Networks
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
What is networking?
What is networking?What is networking?
What is networking?
 
Networks
NetworksNetworks
Networks
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Ie20303week1
Ie20303week1Ie20303week1
Ie20303week1
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer networks
Computer networksComputer networks
Computer networks
 
Unit2.1
Unit2.1Unit2.1
Unit2.1
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 

Viewers also liked

Contributing to ansible
Contributing  to ansibleContributing  to ansible
Contributing to ansible
hellodk
 
Bill martin how to get started on paid search
Bill martin how to get started on paid searchBill martin how to get started on paid search
Bill martin how to get started on paid search
Kyle Elrod
 
PDF SM LDS Employment October 2015
PDF SM LDS Employment October 2015PDF SM LDS Employment October 2015
PDF SM LDS Employment October 2015Kelly Marie Hamon
 
Meridian technologies social media advertising presentation
Meridian technologies social media advertising presentationMeridian technologies social media advertising presentation
Meridian technologies social media advertising presentation
Kyle Elrod
 
WWYD D PP
WWYD D PPWWYD D PP
WWYD D PP
guest2764f287
 
How to generate leads using linkedin
How to generate leads using linkedinHow to generate leads using linkedin
How to generate leads using linkedin
Harsha Chandrashekar
 
Disadvantages Of Scaling Content: A Slideshow
Disadvantages Of Scaling Content: A SlideshowDisadvantages Of Scaling Content: A Slideshow
Disadvantages Of Scaling Content: A Slideshow
designs.codes
 
Crazy Marketing Ideas To Leverage Your Business Visibility
Crazy Marketing Ideas To Leverage Your Business VisibilityCrazy Marketing Ideas To Leverage Your Business Visibility
Crazy Marketing Ideas To Leverage Your Business Visibility
designs.codes
 

Viewers also liked (9)

Contributing to ansible
Contributing  to ansibleContributing  to ansible
Contributing to ansible
 
Bill martin how to get started on paid search
Bill martin how to get started on paid searchBill martin how to get started on paid search
Bill martin how to get started on paid search
 
PDF SM LDS Employment October 2015
PDF SM LDS Employment October 2015PDF SM LDS Employment October 2015
PDF SM LDS Employment October 2015
 
Meridian technologies social media advertising presentation
Meridian technologies social media advertising presentationMeridian technologies social media advertising presentation
Meridian technologies social media advertising presentation
 
CV artistico
CV artisticoCV artistico
CV artistico
 
WWYD D PP
WWYD D PPWWYD D PP
WWYD D PP
 
How to generate leads using linkedin
How to generate leads using linkedinHow to generate leads using linkedin
How to generate leads using linkedin
 
Disadvantages Of Scaling Content: A Slideshow
Disadvantages Of Scaling Content: A SlideshowDisadvantages Of Scaling Content: A Slideshow
Disadvantages Of Scaling Content: A Slideshow
 
Crazy Marketing Ideas To Leverage Your Business Visibility
Crazy Marketing Ideas To Leverage Your Business VisibilityCrazy Marketing Ideas To Leverage Your Business Visibility
Crazy Marketing Ideas To Leverage Your Business Visibility
 

Similar to Lesson 1 review of foundation- 2bup

Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
AnneilynLeal
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
ammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
Rodel Morales
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
Ravi Rajput
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
BOXLIGHT Inc
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
AkshayIngole17
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
Sehrish Rafiq
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
sairakesh41
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
Deepak John
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
paolo374233
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 

Similar to Lesson 1 review of foundation- 2bup (20)

Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Modules1
Modules1Modules1
Modules1
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Ch02
Ch02Ch02
Ch02
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Module 1 computer networks imtroduction,data link layer
Module 1  computer networks imtroduction,data link layerModule 1  computer networks imtroduction,data link layer
Module 1 computer networks imtroduction,data link layer
 
Notacd051
Notacd051Notacd051
Notacd051
 
Notacd05
Notacd05Notacd05
Notacd05
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
La3 compnet notes
La3 compnet notesLa3 compnet notes
La3 compnet notes
 

More from Ma Cecilla Vergara

Central nervous system
Central nervous systemCentral nervous system
Central nervous system
Ma Cecilla Vergara
 
Introduction to psychology ch 8
Introduction to psychology ch 8Introduction to psychology ch 8
Introduction to psychology ch 8
Ma Cecilla Vergara
 
Freud & psychoanalysis
Freud & psychoanalysisFreud & psychoanalysis
Freud & psychoanalysis
Ma Cecilla Vergara
 
Erikson and bronfenbrenner
Erikson and bronfenbrennerErikson and bronfenbrenner
Erikson and bronfenbrenner
Ma Cecilla Vergara
 

More from Ma Cecilla Vergara (14)

Work motivation
Work motivationWork motivation
Work motivation
 
Theories of learning
Theories of learningTheories of learning
Theories of learning
 
Personality2
Personality2Personality2
Personality2
 
Personality
PersonalityPersonality
Personality
 
Motivation
MotivationMotivation
Motivation
 
Memory
MemoryMemory
Memory
 
Maslow
MaslowMaslow
Maslow
 
Endocrine system
Endocrine systemEndocrine system
Endocrine system
 
Central nervous system
Central nervous systemCentral nervous system
Central nervous system
 
Introduction to psychology ch 8
Introduction to psychology ch 8Introduction to psychology ch 8
Introduction to psychology ch 8
 
Freud & psychoanalysis
Freud & psychoanalysisFreud & psychoanalysis
Freud & psychoanalysis
 
Erikson and bronfenbrenner
Erikson and bronfenbrennerErikson and bronfenbrenner
Erikson and bronfenbrenner
 
Endocrine
EndocrineEndocrine
Endocrine
 
Branches of psychology
Branches of psychologyBranches of psychology
Branches of psychology
 

Recently uploaded

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

Lesson 1 review of foundation- 2bup

  • 2. Network Administration and Maintenance  Administrator  sometimes abbreviated admin.  is the one who is responsible for software installation, management, information and maintenance of a computer or network.
  • 4. Network Administration and Maintenance  Network Administrator  is an individual that is responsible for the maintenance of computer hardware and software systems that make up a computer network including the maintenance and monitoring of active data network or converged infrastructure and related network equipment.
  • 5. Network Administration and Maintenance  Network Administrator  Network Administrators are generally “mid-level support staff” within an organization and don't typically get involved directly with users.
  • 6. Network Administration and Maintenance  Network Administrator  Network Administrators focus upon network components within a company's LAN/WAN infrastructure ensuring integrity.  Depending on the company and its size, the Network Administrator may also design and deploy networks.
  • 7. Sneak Peak  What is that packet tracer?  Packet Tracer is a powerful network simulation program that allows students to experiment with network behavior and ask “what if” questions.  Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration capabilities and facilitates the teaching and learning of complex technology concepts.
  • 8. Network Administration and Maintenance  Network Administrator  The actual role of the network administrator will vary from place to place, but will commonly include activities and tasks such as network address assignment, management and implementation of routing protocols such as RIPv2, HSRP, routing table configurations and certain implementations of authentication (eg: challenge response, etc).  It can also include maintenance of certain network servers: file servers, VPN gateways, intrusion detection systems, etc.
  • 9. Network Administration and Maintenance  Network Administrators are often involved in proactive work. This type of work will often include:  Network monitoring  Testing the network for weakness  Keeping an eye out for needed updates  Installing and implementing security programs  In many cases, E-mail and Internet filters  Evaluating implementing network management software
  • 10. Data Communications and Computers  Data  are the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
  • 11. Data Communications and Computers  Data vs information  Data Data is raw, unorganized facts that need to be processed. Data can be something simple and seemingly random and useless until it is organized.  Information When data is processed, organized, structured or presented in a given context so as to make it useful, it is called Information.
  • 12. Data Communications and Computers  Communication  meaning to share  is the activity of conveying information through the exchange of thoughts, messages, or information, as by speech, visuals, signals, writing, or behavior. It is the meaningful exchange of information between two or a group of person.
  • 13. Looking Back  Morse code  Morse code is represented by On and Off tones, lights or clicked that can be understand by a skilled listener or observer w/out special equipment.  It was standardized as dashes and dots or dits and dash.
  • 14. Data Communications and Computers  Communications can take many forms and occurs in many different environments: Spoken language Body language and facial expressions Pictures and written word
  • 15. Data Communications and Computers  In communication we establish rules, or protocols, for communicating with each other: Identify the sender and receiver. Agree on the method. Common language. Speed and delivery of the message. Confirmation that the message was received.
  • 16. Data Communications and Computers  Communications between individuals is successful if the meaning of the received message is the same as the meaning of the message that was sent.
  • 17. Data Communications and Computers  For data networks, we use the same basic criteria to judge successful communication.  identify the sender and the receiver IP and MAC address  Agree on the method. Network Protocols. Ex. TCP,UDP  Common language OSI, TCP/IP models and binaries
  • 18. Data Communications and Computers  For data networks, we use the same basic criteria to judge successful communication.  Speed and delivery of the message Bandwidth, Delays, Bottleneck  Confirmation that the message received. TCP protocols acknowledgement.
  • 19. Data Communications and Computers  Also in data communication, it is also important that if the message was successfully sent and received.  A successful message is when you received the correct packets and their numbers.
  • 20. Looking Back  What is a packet?  A packet is one unit of binary data capable of being routed through a computer network.  To improve communication performance and reliability, each message sent between two network devices is often subdivided into packets by the underlying hardware and software.
  • 21. Looking Back  Depending on the protocol(s) they need to support, packets are constructed in some standard packet format.
  • 23. Looking Back  The receiving device is responsible for re- assembling individual packets into the original message, by stripping off the headers and footers and concatenating packets in the correct sequence.
  • 24. Looking Back  However, there are external factors that can affect the message.  The quality of the pathway between the sender and the recipient.  The number of times the message has to change form or be redirected or re-addressed.  The number of other messages being transmitted simultaneously on the communication network.  The amount of time allotted for successful communication.

Editor's Notes

  1. Average salary is around $75000 annually, which is almost 300000 pesos. The average pay for a Network Administrator is PHP 208,913 per year. Most people with this job move on to other positions after 20 years in this career.
  2. “Basically ang Network Administrator” ay ung tinatawag nating tagapamahala or tagapanatili ng mga bagay-bagay sa isang network.” “So ano ung mga bagay-bagay na yon? Yun ung mga Computer Hardwares within a network (but lets just give that work to the technicians since that’s what they were hired for. Sakali lang na wala sila dun eh atleast may knowledge ang Network Administrator sa hardwares.) ung hardware lang naman na dapat mong masterin or matutunan as net admin ay ung mga bagay-bagay na related lang sa Computer Network. (network devices). So pag nasira ba ung processor eh would you consider that as network administrator job? – (!?) Pero if nasira ang LAN Card? Or if nginatngat ng daga ung UTP cable. Sila din ang namamahala ng mga Software systems na bumubuo sa isang network like Servers OS, Database servers (but not in maintain database but ung pag sesetup or tagapanatili ng database software such as MySql) and mga applications that involved in a network. Sila din ang nag mamaintain at nag momonitor ng mga “Data” na pinapasa sa isang network.
  3. So kayo rin a tinatawag na support. So aun nga support kayo pero d kayo involved sa interaction sa users, but rather you are involved at the back end ng isang organization. When we say mid level… of course there are what you call the low level and the high level. So ung low level… typically, they are the one who accepts calls, or received the problem from the client or within the organization. -we call them often as a help desk. -if the problem is at the network. they will file a ticket to the mid level support. That ticket contains the whole information about the problem. -if they alone can solve the problem, then they don’t need to escalate it to the mid level support. Then what is the high level support then? -let us say that the ticket was escalated to you as a mid level support, then it means that the low level support cant handle the problem alone. -when you received the ticket, then its now your job to fix the problem with your expertise. -the problem is, not all of the this ticket can be solved alone with network administrator. Sometimes… you require a help by much higher level… -and there will the high level support came in… mostly they are what we call the network engineers, or sometimes the network programmer.
  4. So ayan na ang LAN / WAN. Dyan na kayo nakafocus. Iyan na talaga ang pinakamamasterin ninyo kasi lahat ng involved dyan ay work na ninyo. Dapat ninyong panatilihin na gumagana at secured ang isang network. Depende daw sa company, pero actually its really your job to design and deploy a network. (panu kayo nag design ng network dati? – (!?) Using cisco packet tracer, dun ka mag dedesign ng isang network.)
  5. So jan papasok ung mga Scripting na tinatawag natin. Simpleng drag and drop pero lalagyan ng script para masetup ung tamang configuration ng routers, range ng mga ips, etc. within a network. So madugong computation tayo jan.
  6. *Data - Data ung mga characters, symbols or electrical signals on your computer. Ung mga data na un eh pwedeng marecord or masave sa magnetic disk, optical or mechanical recording media. So baka nag tataka kayo kung pano sila nasasave, jan pumapasok ung binaray which is 101010101. Nasasave yan as high and low out put tpos iyon lang ung binabasa ng computer mo. So high is 1 and low is 0. this binary files (which are not human-readable, 1010101) are sometimes called "data" as distinguished from human-readable "text". So yang mga binary nay an 10101010 ay may katumbas na text para maintindihan nating mga human. Kc hindi talaga nakakabasa ng text ang ating mga computer but rather they can read this 1 and 0 by sequence. Its just translated to us like ascii. American Standard Code for Information Interchange So w/out data, walang computer since our computer is based on data to run. (ung machine language natin, ung nakikita ninyong 1010101 etc also known as binary which is what our computer really understand.
  7. So napakaimportante ng morsecode na yan dahil it was mainly used as distressed signal before. So if may lulubog na barko. They are sending what you call the universal distressed signal which is the 3 dots, 3 dashes and 3 dots. SOS. Save our soul. •Trivia: did you know that nokias ringtones got a hidden morsecodes? So the Standard. Or tootootoot toootooo tootootoot. Means SMS Ascending means “connecting people”
  8. •So a successful communication means an intact message. •So sample ng failed communication is ung sa text. Some message is missing. •Or ung pag naguusap kau sa phone eh nagiging choppy ung signal.
  9. So yang mga rules na yan ay implemented din sa Data networks.
  10. So yang mga rules na yan ay implemented din sa Data networks.
  11. oThe quality of the pathway between the sender and the recipient. So along the way that your message has been transported. Iba2x ang dadaan nyan. So may chance na hindi n makarating ung packets sayo due to pathway. oThe number of other messages being transmitted simultaneously on the communication network. Maaring magkaruon ng bottle neck in which your packet get destroyed.