SlideShare a Scribd company logo
Networking Essentials 
Class Intro & 
Chapter 1 
Intro to Networking
Your Professor 
 Masters Degree 
 Many Certifications: 
MCT, MCSE, MCDBA, MCSA, MCDST, 
CWSP, CWNA, CCNA, CNST, CWST, CST, 
CIW, A+, Network+, iNet+, Security+, Project 
Management (2000), Systems Analysis 
 Lead professor in the CNT department 
 Author 
 Your teacher ;-)
Class Content 
 Network+ preparation 
 Class meets at the following times: 
 AM class: 9:00-2:00 
 PM class: 6:00-11:00 
 Each class gets two 10 min breaks and one 
30 min lunch. (breaks may be aggregated 
for a longer lunch on some occasions) 
 Field trips are desired but not guaranteed.
Syllabus 
 Textbook: Network+ Guide to Networks by Tamara 
Dean 
Course Requirements Possible 
Points 
Group Participation 75 
Attendance 125 
Review Questions (Total) 150 
Labs (Total) 225 
Acronym Quizzes (Total) 50 
Chapter Tests (Total) 400 
Final Project (Total) 100 
Total Points 1125
Course Outline 
Week Topic Reading & Tests 
Week 1 Networking, OSI Chapters 1-2, Form Groups 
Week 2 Media & Protocols Chapters 3-4 
Week 3 Hardware & Topologies Exam 1, Chapters 5-6 
Week 4 WANs Chapter 7 
Week 5 NOS & Server 2003 Chapter 8 
Week 6 UNIX & Linux Midterm Exam, Chapter 9 
Begin Final Project 
Week 7 Linux & Netware Continue chapter 9, begin chapter 10 
Week 8 Netware & TCP/IP Continue chapters 10-11 
Week 9 Troubleshooting Exam 3 (ch 9-11), Chapter 12 
Week 10 Integrity & Availability Chapter 13 
Week 11 Security & Management Chapters 14-15, 
Week 12 Projects & Exam Final Exam (ch 13-15 ), Final Projects
Chapter 1 Intro to 
Networking 
 Beginnings of networking 
 Stand alone computers 
 Sneakernet 
 Why network? 
 Reduce Redundancy 
 Enhance Capabilities 
 Share Resources 
• Data 
• Devices 
• Internet 
 Communicate
Types of networks 
 P2P (Peer-to-Peer) 
 Client-Server 
Client – a computer that requests 
resources from another computer 
Server – a computer that provides 
resources to other computers and 
manages those resources.
Peer to Peer 
 Advantages 
 Easy to install 
 No server needed 
 Each user has control 
 No administrators 
needed 
 Less expensive 
 Disadvantages 
 Security & backups 
must be applied 
individually 
 Many passwords 
needed 
 Reduced password 
security 
 Reduced machine 
performance 
 No central control 
 Not flexible (hard to 
change things)
Client Server 
 Advantages 
 Centralized 
security & 
backups 
 Faster access 
 Single password 
 Better password 
security 
 Disadvantages 
 Central point of 
failure 
 Administrator 
required 
 Server and server 
software required 
More expensive
NOS (Network Operating 
System) 
 Controls user and application access 
to resources 
 Restricts user access times and 
locations 
 Controls communication between 
networked computers 
 Lets name a few…
NOS (Network Operating 
System) 
 Microsoft Windows 
 Novell Netware 
 UNIX 
 Linux 
 BSD (Berkley Software Distribution) 
 Sun Solaris 
 IBM OS/2 
 Mac OS
Network Scope 
 LAN (Local Area Network) – group of 
machines in one or many closely 
located buildings that are all 
connected together with high speed 
links. 
 MAN (Metropolitan Area Network) 
 WAN (Wide Area Network)
Terms 
 NIC (Network Interface Card) 
 Node – A device that can communicate with 
a network. Identified by a unique number. 
 Segment – part of a network consisting of a 
number of nodes that all use the same 
communication type 
 Backbone – connects segments together. 
 Protocol – the standard for communications 
 Topology – the layout of the network
Types of Servers 
 DC (Domain Controller) 
 File & Print Server 
 Communication Server 
 Mail Server 
 Web Server 
 Network Management Server 
 Name server (DNS, WINS) 
 Addressing server (DHCP) 
 Licensing server 
 Software distribution server (SMS) 
 Backup server 
 Patch Management server (SUS)
Skills of the Network 
Professional 
 Basic Technical skills 
 Software & hardware installation & 
configuration 
 Network design 
 Protocols, topologies, media types 
 Other Technical skills 
 Security 
 Voice & Data integration 
 NOS’s indepth 
 Network device configuration (Routers…) 
 Data warehousing
Skills of the network 
professional 
 Soft skills 
 Patience 
 Empathy 
 Listening 
 Critical thinking 
 Communication (oral & written) 
 Dependability 
 Teamwork 
 Leadership (especially change mgmt)
Certification 
 Vendor Neutral Certifications 
CompTIA (Computing Technology 
Industry Association) 
ETA (Electronics Technicians 
Association) 
CWNP (Certified Wireless Network 
Professional) program 
 Vendor Certifications 
Microsoft, Novell, Oracle, Sun, Cisco
Acronyms 
 DC, Domain Controller 
 CompTIA, Computing Technology Industry Association 
 LAN, Local Area Network 
 MAN, Metropolitan Area Network 
 WAN, Wide Area Network 
 MCSE, Microsoft Certified Systems Engineer 
 NIC, Network Interface Card 
 NOS, Network Operating System 
 P2P, Peer to Peer
Ad

More Related Content

What's hot (19)

Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
NYversity
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
scooby_doo
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
sarmad ali
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
Ehsan Ullah Kakar
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Carlo Fonda
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
Akmal Cikmat
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Basma Gamal
 
Computer networks
Computer networksComputer networks
Computer networks
Tej Kiran
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
Aram Mohammed
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
Atika Zaimi
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
Fabio Almeida- Oficina Eletrônica
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
abhinav2727
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
welcometofacebook
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
Andriy Berestovskyy
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
NYversity
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
scooby_doo
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
sarmad ali
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Carlo Fonda
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
Akmal Cikmat
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Basma Gamal
 
Computer networks
Computer networksComputer networks
Computer networks
Tej Kiran
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
Atika Zaimi
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
abhinav2727
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
welcometofacebook
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
Andriy Berestovskyy
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 

Viewers also liked (10)

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
APSU
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
APSU
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
APSU
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
APSU
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
APSU
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
APSU
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
APSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
APSU
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
APSU
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
APSU
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
APSU
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
APSU
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
APSU
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
APSU
 
Ad

Similar to Networking Essentials Lesson 01 - Eric Vanderburg (20)

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
Raja Waseem Akhtar
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Mike Qaissaunee
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
saritasingh19866
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
maruthi vardhan
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
PushpendraSingh483
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Mohd. ShahNawab
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Lecture1
Lecture1Lecture1
Lecture1
Vedpal Yadav
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
home107
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
ImXaib
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
Marco Cruz
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 
Networking
NetworkingNetworking
Networking
Remo Patel
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
webhostingguy
 
wireless lan security for their all details
wireless lan security for their all detailswireless lan security for their all details
wireless lan security for their all details
SatyamPrakash38
 
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
liya7122
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
Anwar Kamal
 
networking
networking networking
networking
AmanyaLaban
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
Tuan Yang
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
Raja Waseem Akhtar
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
saritasingh19866
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
PushpendraSingh483
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
home107
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
ImXaib
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
Marco Cruz
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
webhostingguy
 
wireless lan security for their all details
wireless lan security for their all detailswireless lan security for their all details
wireless lan security for their all details
SatyamPrakash38
 
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
liya7122
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
Anwar Kamal
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
Tuan Yang
 
Ad

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 

Networking Essentials Lesson 01 - Eric Vanderburg

  • 1. Networking Essentials Class Intro & Chapter 1 Intro to Networking
  • 2. Your Professor  Masters Degree  Many Certifications: MCT, MCSE, MCDBA, MCSA, MCDST, CWSP, CWNA, CCNA, CNST, CWST, CST, CIW, A+, Network+, iNet+, Security+, Project Management (2000), Systems Analysis  Lead professor in the CNT department  Author  Your teacher ;-)
  • 3. Class Content  Network+ preparation  Class meets at the following times:  AM class: 9:00-2:00  PM class: 6:00-11:00  Each class gets two 10 min breaks and one 30 min lunch. (breaks may be aggregated for a longer lunch on some occasions)  Field trips are desired but not guaranteed.
  • 4. Syllabus  Textbook: Network+ Guide to Networks by Tamara Dean Course Requirements Possible Points Group Participation 75 Attendance 125 Review Questions (Total) 150 Labs (Total) 225 Acronym Quizzes (Total) 50 Chapter Tests (Total) 400 Final Project (Total) 100 Total Points 1125
  • 5. Course Outline Week Topic Reading & Tests Week 1 Networking, OSI Chapters 1-2, Form Groups Week 2 Media & Protocols Chapters 3-4 Week 3 Hardware & Topologies Exam 1, Chapters 5-6 Week 4 WANs Chapter 7 Week 5 NOS & Server 2003 Chapter 8 Week 6 UNIX & Linux Midterm Exam, Chapter 9 Begin Final Project Week 7 Linux & Netware Continue chapter 9, begin chapter 10 Week 8 Netware & TCP/IP Continue chapters 10-11 Week 9 Troubleshooting Exam 3 (ch 9-11), Chapter 12 Week 10 Integrity & Availability Chapter 13 Week 11 Security & Management Chapters 14-15, Week 12 Projects & Exam Final Exam (ch 13-15 ), Final Projects
  • 6. Chapter 1 Intro to Networking  Beginnings of networking  Stand alone computers  Sneakernet  Why network?  Reduce Redundancy  Enhance Capabilities  Share Resources • Data • Devices • Internet  Communicate
  • 7. Types of networks  P2P (Peer-to-Peer)  Client-Server Client – a computer that requests resources from another computer Server – a computer that provides resources to other computers and manages those resources.
  • 8. Peer to Peer  Advantages  Easy to install  No server needed  Each user has control  No administrators needed  Less expensive  Disadvantages  Security & backups must be applied individually  Many passwords needed  Reduced password security  Reduced machine performance  No central control  Not flexible (hard to change things)
  • 9. Client Server  Advantages  Centralized security & backups  Faster access  Single password  Better password security  Disadvantages  Central point of failure  Administrator required  Server and server software required More expensive
  • 10. NOS (Network Operating System)  Controls user and application access to resources  Restricts user access times and locations  Controls communication between networked computers  Lets name a few…
  • 11. NOS (Network Operating System)  Microsoft Windows  Novell Netware  UNIX  Linux  BSD (Berkley Software Distribution)  Sun Solaris  IBM OS/2  Mac OS
  • 12. Network Scope  LAN (Local Area Network) – group of machines in one or many closely located buildings that are all connected together with high speed links.  MAN (Metropolitan Area Network)  WAN (Wide Area Network)
  • 13. Terms  NIC (Network Interface Card)  Node – A device that can communicate with a network. Identified by a unique number.  Segment – part of a network consisting of a number of nodes that all use the same communication type  Backbone – connects segments together.  Protocol – the standard for communications  Topology – the layout of the network
  • 14. Types of Servers  DC (Domain Controller)  File & Print Server  Communication Server  Mail Server  Web Server  Network Management Server  Name server (DNS, WINS)  Addressing server (DHCP)  Licensing server  Software distribution server (SMS)  Backup server  Patch Management server (SUS)
  • 15. Skills of the Network Professional  Basic Technical skills  Software & hardware installation & configuration  Network design  Protocols, topologies, media types  Other Technical skills  Security  Voice & Data integration  NOS’s indepth  Network device configuration (Routers…)  Data warehousing
  • 16. Skills of the network professional  Soft skills  Patience  Empathy  Listening  Critical thinking  Communication (oral & written)  Dependability  Teamwork  Leadership (especially change mgmt)
  • 17. Certification  Vendor Neutral Certifications CompTIA (Computing Technology Industry Association) ETA (Electronics Technicians Association) CWNP (Certified Wireless Network Professional) program  Vendor Certifications Microsoft, Novell, Oracle, Sun, Cisco
  • 18. Acronyms  DC, Domain Controller  CompTIA, Computing Technology Industry Association  LAN, Local Area Network  MAN, Metropolitan Area Network  WAN, Wide Area Network  MCSE, Microsoft Certified Systems Engineer  NIC, Network Interface Card  NOS, Network Operating System  P2P, Peer to Peer