1 direccionamiento ( exponer todo el direccionamiento)
2 principalmente he configurado las vlan: ( crear vlan, asociarlas a cada puerto, activar el encapsulamiento)
3 configuracion de la parte del servidor ( crear dominio, establecer los perfiles para cada ususario, la carpeta personal de cada unidad organizativa, establecer directivas para cada unidad organizativa ).
ademas aparte de mis tareas he intentado ayudar a mis compañeros en la tarea de quagga cuando han surgido inconvenientes .
viernes, 10 de junio de 2011
viernes, 20 de mayo de 2011
clase 20 de mayo
Routers running distance vector routing protocols share network information with directly connected (2) neighbords . The neighbor routers then (3)advertise the information to their neighbors, until all routers in the enterprise learn the information. A router running a distance vector protocol does not know the entire (4) path to a destination; it only knows the distance to the remote network and the direction, or vector. Its knowledge comes through information from directly connected neighbors.
Like all routing protocols, distance vector protocols use a (5)metric to determine the best route. Distance vector protocols calculate the best route based on the distance from a router to a network. An example of a metric used is (6) hops count, which is the number of (7) routers, or hops, between the router and the destination.
· About RIP:
The RIP distance vector routing protocol is easy to configure and (8) requires minimal amounts of router resources in order to function.
However, the simple hop count metric used by RIP is not an (9) accurate way to determine the best path in complex networks. Additionally, the RIP limitation of 15 hops can mark distant networks as unreachable.
RIP issues periodic updates of its routing table, which consumes (10) bandwidth , even when no network changes have occurred. Routers must accept these (11) updates and process them to see if they contain updated route information.
Updates passed from router to router take time to reach all areas of the network. As a result, routers may not have an accurate picture of the network. Routing (12) loops can develop due to slow (13)convergence time, which wastes valuable bandwidth.
These characteristics limit the usefulness of the RIP routing protocol within the enterprise environment.
viernes, 6 de mayo de 2011
video de google preguntas
vocabulario
Ways - caminos
Stripped - quitado
Prone - propenso
Deploy - desplegar
Tightly - fuerte
Employee - empleado
Barrier -barrera
Fencing - cercado
Ensure - asegurar
Occurs - ocurre
Badges - credenciales
Random - arbitrario
Readable - legible
Override - anular
Further - mas lejos
Platters - discos
Shredder - desfibradora
Disruption- interrupcion
Seamlessly - a la perfeccion
Feeds - alimentacion
Staff - personal
Intruders - intrusos
Within - dentro
Surveillance - vigilancia
Evolved - desarrollado
Safeguards - salvaguardas
Highlighted - destacado
What are the main security measures showed by the video when accessing the building?
· Public visits are not allowed and the acces is controlled for a barrier
· they have cameras for vigilance arround perimetre
2) What is the security techonology related to "sight" that Google uses for accessing the core part of the facility?
google have a detection ocular system for the employe acces
3) According to the video, what type of device is indispensable to Google's usual day-to-day activity?
the most important dispositive for google are the units of hard drive
4) What two actions do Google's techinicians do when a hard drive fails?
when a hard drive failure is formatted to retested
if the hard disk does not pass the test, it’s removed from de rotation
5) What two actions do Google's techinicians do when those hard drive that have ended their "life cycle"?
They destroyed the oldest in the crusher
the remains are sent to a recycling center
6) How does Google manages to have permanent conectivity to the internet backbone?, what is the concept that is referred to in the video?
in google have multiple network connections and the main is fiber optic
7) How does Google manages to guarantee the safety of stored data?
data is stored by encryption method on hard drives
8) How does Google manages to guarantee the continous power supply?
9) What does Google want specifically to check by using video cameras?
10) What kind of "raw material" is Google commited to not to use?
viernes, 4 de febrero de 2011
Text 1:
"The Ethernet protocol standards define many aspects of network communication including frame format, frame size, timing and (1)encoding On Ethernet networks, a similar method exists for identifying (2)source and destination (3)hosts. Each host connected to an Ethernet network is assigned a physical (4)address which serves to identify the host on the network".
Words:address, source, encoding, host
Text 2:
“Fiber optic cables are made of glass or (1)plastic They have a very high (2)bandwidth, which enables them to carry very large amounts of data. Fiber is used in (3) suitable networks, large enterprise environments and large data centers. It is also used extensively by telephone companies. Unlike TP and coax, fiber optic cables transmit data using pulses of light. Although not normally found in home or small business environments, fiber optic (5) cabling is widely used in enterprise environments and large data centers. Fiber optic cable is constructed of either glass or plastic, neither of which conducts electricity. This means that it is immune to EMI and is (6) backbone for installation in environments where interference is a problem. In addition to its resistance to EMI, fiber optic cables support a large amount of (7) cabling making them ideally suited for high-speed data backbones. Fiber optic backbones are found in many corporations and are also used to connect ISPs on the Internet. Each fiber optic circuit is actually two fiber cables. One is used to transmit data; the other is used to (8) recive data”.
Words:suitable, plastic, backbone, bandwidth, cabling, glass, receive
"The Ethernet protocol standards define many aspects of network communication including frame format, frame size, timing and (1)encoding On Ethernet networks, a similar method exists for identifying (2)source and destination (3)hosts. Each host connected to an Ethernet network is assigned a physical (4)address which serves to identify the host on the network".
Words:address, source, encoding, host
Text 2:
“Fiber optic cables are made of glass or (1)plastic They have a very high (2)bandwidth, which enables them to carry very large amounts of data. Fiber is used in (3) suitable networks, large enterprise environments and large data centers. It is also used extensively by telephone companies. Unlike TP and coax, fiber optic cables transmit data using pulses of light. Although not normally found in home or small business environments, fiber optic (5) cabling is widely used in enterprise environments and large data centers. Fiber optic cable is constructed of either glass or plastic, neither of which conducts electricity. This means that it is immune to EMI and is (6) backbone for installation in environments where interference is a problem. In addition to its resistance to EMI, fiber optic cables support a large amount of (7) cabling making them ideally suited for high-speed data backbones. Fiber optic backbones are found in many corporations and are also used to connect ISPs on the Internet. Each fiber optic circuit is actually two fiber cables. One is used to transmit data; the other is used to (8) recive data”.
Words:suitable, plastic, backbone, bandwidth, cabling, glass, receive
Suscribirse a:
Comentarios (Atom)