SlideShare a Scribd company logo
1 of 18
Networking Essentials 
Class Intro & 
Chapter 1 
Intro to Networking
Your Professor 
 Masters Degree 
 Many Certifications: 
MCT, MCSE, MCDBA, MCSA, MCDST, 
CWSP, CWNA, CCNA, CNST, CWST, CST, 
CIW, A+, Network+, iNet+, Security+, Project 
Management (2000), Systems Analysis 
 Lead professor in the CNT department 
 Author 
 Your teacher ;-)
Class Content 
 Network+ preparation 
 Class meets at the following times: 
 AM class: 9:00-2:00 
 PM class: 6:00-11:00 
 Each class gets two 10 min breaks and one 
30 min lunch. (breaks may be aggregated 
for a longer lunch on some occasions) 
 Field trips are desired but not guaranteed.
Syllabus 
 Textbook: Network+ Guide to Networks by Tamara 
Dean 
Course Requirements Possible 
Points 
Group Participation 75 
Attendance 125 
Review Questions (Total) 150 
Labs (Total) 225 
Acronym Quizzes (Total) 50 
Chapter Tests (Total) 400 
Final Project (Total) 100 
Total Points 1125
Course Outline 
Week Topic Reading & Tests 
Week 1 Networking, OSI Chapters 1-2, Form Groups 
Week 2 Media & Protocols Chapters 3-4 
Week 3 Hardware & Topologies Exam 1, Chapters 5-6 
Week 4 WANs Chapter 7 
Week 5 NOS & Server 2003 Chapter 8 
Week 6 UNIX & Linux Midterm Exam, Chapter 9 
Begin Final Project 
Week 7 Linux & Netware Continue chapter 9, begin chapter 10 
Week 8 Netware & TCP/IP Continue chapters 10-11 
Week 9 Troubleshooting Exam 3 (ch 9-11), Chapter 12 
Week 10 Integrity & Availability Chapter 13 
Week 11 Security & Management Chapters 14-15, 
Week 12 Projects & Exam Final Exam (ch 13-15 ), Final Projects
Chapter 1 Intro to 
Networking 
 Beginnings of networking 
 Stand alone computers 
 Sneakernet 
 Why network? 
 Reduce Redundancy 
 Enhance Capabilities 
 Share Resources 
• Data 
• Devices 
• Internet 
 Communicate
Types of networks 
 P2P (Peer-to-Peer) 
 Client-Server 
Client – a computer that requests 
resources from another computer 
Server – a computer that provides 
resources to other computers and 
manages those resources.
Peer to Peer 
 Advantages 
 Easy to install 
 No server needed 
 Each user has control 
 No administrators 
needed 
 Less expensive 
 Disadvantages 
 Security & backups 
must be applied 
individually 
 Many passwords 
needed 
 Reduced password 
security 
 Reduced machine 
performance 
 No central control 
 Not flexible (hard to 
change things)
Client Server 
 Advantages 
 Centralized 
security & 
backups 
 Faster access 
 Single password 
 Better password 
security 
 Disadvantages 
 Central point of 
failure 
 Administrator 
required 
 Server and server 
software required 
More expensive
NOS (Network Operating 
System) 
 Controls user and application access 
to resources 
 Restricts user access times and 
locations 
 Controls communication between 
networked computers 
 Lets name a few…
NOS (Network Operating 
System) 
 Microsoft Windows 
 Novell Netware 
 UNIX 
 Linux 
 BSD (Berkley Software Distribution) 
 Sun Solaris 
 IBM OS/2 
 Mac OS
Network Scope 
 LAN (Local Area Network) – group of 
machines in one or many closely 
located buildings that are all 
connected together with high speed 
links. 
 MAN (Metropolitan Area Network) 
 WAN (Wide Area Network)
Terms 
 NIC (Network Interface Card) 
 Node – A device that can communicate with 
a network. Identified by a unique number. 
 Segment – part of a network consisting of a 
number of nodes that all use the same 
communication type 
 Backbone – connects segments together. 
 Protocol – the standard for communications 
 Topology – the layout of the network
Types of Servers 
 DC (Domain Controller) 
 File & Print Server 
 Communication Server 
 Mail Server 
 Web Server 
 Network Management Server 
 Name server (DNS, WINS) 
 Addressing server (DHCP) 
 Licensing server 
 Software distribution server (SMS) 
 Backup server 
 Patch Management server (SUS)
Skills of the Network 
Professional 
 Basic Technical skills 
 Software & hardware installation & 
configuration 
 Network design 
 Protocols, topologies, media types 
 Other Technical skills 
 Security 
 Voice & Data integration 
 NOS’s indepth 
 Network device configuration (Routers…) 
 Data warehousing
Skills of the network 
professional 
 Soft skills 
 Patience 
 Empathy 
 Listening 
 Critical thinking 
 Communication (oral & written) 
 Dependability 
 Teamwork 
 Leadership (especially change mgmt)
Certification 
 Vendor Neutral Certifications 
CompTIA (Computing Technology 
Industry Association) 
ETA (Electronics Technicians 
Association) 
CWNP (Certified Wireless Network 
Professional) program 
 Vendor Certifications 
Microsoft, Novell, Oracle, Sun, Cisco
Acronyms 
 DC, Domain Controller 
 CompTIA, Computing Technology Industry Association 
 LAN, Local Area Network 
 MAN, Metropolitan Area Network 
 WAN, Wide Area Network 
 MCSE, Microsoft Certified Systems Engineer 
 NIC, Network Interface Card 
 NOS, Network Operating System 
 P2P, Peer to Peer

More Related Content

What's hot

Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)NYversity
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scopeSanat Maharjan
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)sarmad ali
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsCarlo Fonda
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks Basma Gamal
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking NetworkJGrace Johnny
 
Computer networks
Computer networksComputer networks
Computer networksTej Kiran
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network DeviceRubal Sagwal
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7suddenven
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networkingabhinav2727
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsAndriy Berestovskyy
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

What's hot (20)

Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Viewers also liked

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9APSU
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11APSU
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4APSU
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6APSU
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2APSU
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 

Viewers also liked (10)

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 

Similar to Networking Essentials Lesson 01 - Eric Vanderburg

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networkingRaja Waseem Akhtar
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Conceptsaritasingh19866
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network. PushpendraSingh483
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppthome107
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.pptImXaib
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking ComptiaMarco Cruz
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzadkhurrak_shahzad
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2webhostingguy
 
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptxliya7122
 
Client server technology main
Client server technology mainClient server technology main
Client server technology mainAnwar Kamal
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)Tuan Yang
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networkinghadiyaahmed2
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 

Similar to Networking Essentials Lesson 01 - Eric Vanderburg (20)

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Lecture1
Lecture1Lecture1
Lecture1
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
Networking
NetworkingNetworking
Networking
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
 
networking
networking networking
networking
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Networking Essentials Lesson 01 - Eric Vanderburg

  • 1. Networking Essentials Class Intro & Chapter 1 Intro to Networking
  • 2. Your Professor  Masters Degree  Many Certifications: MCT, MCSE, MCDBA, MCSA, MCDST, CWSP, CWNA, CCNA, CNST, CWST, CST, CIW, A+, Network+, iNet+, Security+, Project Management (2000), Systems Analysis  Lead professor in the CNT department  Author  Your teacher ;-)
  • 3. Class Content  Network+ preparation  Class meets at the following times:  AM class: 9:00-2:00  PM class: 6:00-11:00  Each class gets two 10 min breaks and one 30 min lunch. (breaks may be aggregated for a longer lunch on some occasions)  Field trips are desired but not guaranteed.
  • 4. Syllabus  Textbook: Network+ Guide to Networks by Tamara Dean Course Requirements Possible Points Group Participation 75 Attendance 125 Review Questions (Total) 150 Labs (Total) 225 Acronym Quizzes (Total) 50 Chapter Tests (Total) 400 Final Project (Total) 100 Total Points 1125
  • 5. Course Outline Week Topic Reading & Tests Week 1 Networking, OSI Chapters 1-2, Form Groups Week 2 Media & Protocols Chapters 3-4 Week 3 Hardware & Topologies Exam 1, Chapters 5-6 Week 4 WANs Chapter 7 Week 5 NOS & Server 2003 Chapter 8 Week 6 UNIX & Linux Midterm Exam, Chapter 9 Begin Final Project Week 7 Linux & Netware Continue chapter 9, begin chapter 10 Week 8 Netware & TCP/IP Continue chapters 10-11 Week 9 Troubleshooting Exam 3 (ch 9-11), Chapter 12 Week 10 Integrity & Availability Chapter 13 Week 11 Security & Management Chapters 14-15, Week 12 Projects & Exam Final Exam (ch 13-15 ), Final Projects
  • 6. Chapter 1 Intro to Networking  Beginnings of networking  Stand alone computers  Sneakernet  Why network?  Reduce Redundancy  Enhance Capabilities  Share Resources • Data • Devices • Internet  Communicate
  • 7. Types of networks  P2P (Peer-to-Peer)  Client-Server Client – a computer that requests resources from another computer Server – a computer that provides resources to other computers and manages those resources.
  • 8. Peer to Peer  Advantages  Easy to install  No server needed  Each user has control  No administrators needed  Less expensive  Disadvantages  Security & backups must be applied individually  Many passwords needed  Reduced password security  Reduced machine performance  No central control  Not flexible (hard to change things)
  • 9. Client Server  Advantages  Centralized security & backups  Faster access  Single password  Better password security  Disadvantages  Central point of failure  Administrator required  Server and server software required More expensive
  • 10. NOS (Network Operating System)  Controls user and application access to resources  Restricts user access times and locations  Controls communication between networked computers  Lets name a few…
  • 11. NOS (Network Operating System)  Microsoft Windows  Novell Netware  UNIX  Linux  BSD (Berkley Software Distribution)  Sun Solaris  IBM OS/2  Mac OS
  • 12. Network Scope  LAN (Local Area Network) – group of machines in one or many closely located buildings that are all connected together with high speed links.  MAN (Metropolitan Area Network)  WAN (Wide Area Network)
  • 13. Terms  NIC (Network Interface Card)  Node – A device that can communicate with a network. Identified by a unique number.  Segment – part of a network consisting of a number of nodes that all use the same communication type  Backbone – connects segments together.  Protocol – the standard for communications  Topology – the layout of the network
  • 14. Types of Servers  DC (Domain Controller)  File & Print Server  Communication Server  Mail Server  Web Server  Network Management Server  Name server (DNS, WINS)  Addressing server (DHCP)  Licensing server  Software distribution server (SMS)  Backup server  Patch Management server (SUS)
  • 15. Skills of the Network Professional  Basic Technical skills  Software & hardware installation & configuration  Network design  Protocols, topologies, media types  Other Technical skills  Security  Voice & Data integration  NOS’s indepth  Network device configuration (Routers…)  Data warehousing
  • 16. Skills of the network professional  Soft skills  Patience  Empathy  Listening  Critical thinking  Communication (oral & written)  Dependability  Teamwork  Leadership (especially change mgmt)
  • 17. Certification  Vendor Neutral Certifications CompTIA (Computing Technology Industry Association) ETA (Electronics Technicians Association) CWNP (Certified Wireless Network Professional) program  Vendor Certifications Microsoft, Novell, Oracle, Sun, Cisco
  • 18. Acronyms  DC, Domain Controller  CompTIA, Computing Technology Industry Association  LAN, Local Area Network  MAN, Metropolitan Area Network  WAN, Wide Area Network  MCSE, Microsoft Certified Systems Engineer  NIC, Network Interface Card  NOS, Network Operating System  P2P, Peer to Peer