viernes, 20 de mayo de 2011

clase 20 de mayo

Dynamic routing protocols are classified into two major categories: (1) distance vector protocols and link-state protocols.

Routers running distance vector routing protocols share network information with directly connected (2) neighbords  . The neighbor routers then (3)advertise the information to their neighbors, until all routers in the enterprise learn the information. A router running a distance vector protocol does not know the entire (4)  path to a destination; it only knows the distance to the remote network and the direction, or vector. Its knowledge comes through information from directly connected neighbors.

Like all routing protocols, distance vector protocols use a (5)metric to determine the best route. Distance vector protocols calculate the best route based on the distance from a router to a network. An example of a metric used is (6) hops count, which is the number of (7)  routers, or hops, between the router and the destination.


· About RIP:

The RIP distance vector routing protocol is easy to configure and (8) requires minimal amounts of router resources in order to function.

However, the simple hop count metric used by RIP is not an (9) accurate way to determine the best path in complex networks. Additionally, the RIP limitation of 15 hops can mark distant networks as unreachable.

RIP issues periodic updates of its routing table, which consumes (10) bandwidth , even when no network changes have occurred. Routers must accept these (11) updates and process them to see if they contain updated route information.

Updates passed from router to router take time to reach all areas of the network. As a result, routers may not have an accurate picture of the network. Routing (12) loops can develop due to slow (13)convergence time, which wastes valuable bandwidth.

These characteristics limit the usefulness of the RIP routing protocol within the enterprise environment.

viernes, 6 de mayo de 2011

video de google preguntas

vocabulario
Ways - caminos
Stripped - quitado
Prone - propenso
Deploy - desplegar
Tightly - fuerte
Employee - empleado
Barrier -barrera
Fencing - cercado
Ensure - asegurar
Occurs - ocurre
Badges - credenciales
Random - arbitrario
Readable - legible
Override - anular
Further - mas lejos
Platters - discos
Shredder - desfibradora
Disruption- interrupcion
Seamlessly - a la perfeccion
Feeds - alimentacion
Staff - personal
Intruders - intrusos
Within - dentro
Surveillance - vigilancia
Evolved - desarrollado
Safeguards - salvaguardas
Highlighted - destacado


What are the main security measures showed by the video when accessing the building?

·         Public visits are not allowed and the acces is controlled for a barrier
·         they have  cameras for vigilance arround perimetre


2) What is the security techonology related to "sight" that Google uses for accessing the core part of the facility?

google have a detection ocular system for  the employe  acces

3) According to the video, what type of device is indispensable to Google's usual day-to-day activity?

the most important dispositive for google  are the units of hard drive

4) What two actions do Google's techinicians do when a hard drive fails?

when a hard drive failure is formatted to retested
if the hard disk does not pass the test, it’s removed from de rotation

5) What two actions do Google's techinicians do when those hard drive that have ended their "life cycle"?

They destroyed the oldest in the crusher
the remains are sent to a recycling center

6) How does Google manages to have permanent conectivity to the internet backbone?, what is the concept that is referred to in the video?
in google have multiple network connections and the main is fiber optic

7) How does Google manages to guarantee the safety of stored data?

data is stored by encryption method on hard drives

8) How does Google manages to guarantee the continous power supply?

9) What does Google want specifically to check by using video cameras?

10) What kind of "raw material" is Google commited to not to use?