Skip to main content

Posts

Showing posts from April, 2023

Week7_Authorization

  How authentication is used: Since a large part of the entire networking process involves one computer requesting something from another computer. A Web page client might ask for a Web page, for example, or a Common Internet File System (CIFS) client might ask a file server for access to a folder. A computer far away might ask another computer for access to a private network. Whatever the case, it is important to carefully assign levels of access to your resources, this process is known as authorization, and an access control list can help define how to assign levels of access.

Week 6_NMI

  Name resolution is essential in converting hostnames and IP addresses for network communications. The process resolves hostnames, queries servers, and finds IP addresses by associating names and IP addresses which is one of the most essential services on a network. Name resolution enables a host to be recognized by either its hostname or IP address since people are most comfortable working with descriptive names such as opopsITconsulting.com. Name resolution is very important in networking because a webserver that houses a company’s domain name might host more domain names and if someone tries to access the website by IP address, the webserver won’t know which domain is being requested so modern websites don’t really function well without DNS.

Week 5_NMgt

  Configuring Dynamic protocol has rules that are straightforward as dynamic protocols are tied to individual NICs and not the entire router. When configuring two routers together, it is important to make sure those two NICs are configured to use the same dynamic routing protocol. Dynamic routing protocols might not be needed when using two or more routers, it is easy to set up and, in most cases, you just have to turn it on and it just starts working. It is important to know what your router is supposed to do and keep in mind that routers don’t fail that often so it is good to know how to use basic tools that can help you check the router.

Week 4_NKMgmt

Solid core and stranded core cables are types of UTP cables, with solid core UTP each wire uses a single solid wire while with stranded core each wire is a bundle of tinny wire strands. Solid core is a better conductor but will break if handled too often or too roughly because it is stiff. A stranded core is not quite a good conductor, but it will not break if handled roughly or too often. They are made using a collection of thin wires that are bound together to function as a single line. It is more expensive to make, and they are ideal for cramped spaces and areas like vibrating machinery. The stranded cable also has higher attenuation which makes it better for short-distance runs and it is vulnerable to electrical interference because it has multiple wires instead of a single line. I think solid is more common than stranded because it is less expensive.

Week 3_NWKMGT

Spanning Tree Protocol is a layer 2 network protocol used to prevent looping within a network topology, it was created to avoid the problems that arise when computers exchange data on a local network (LAN) that contains paths. It helps prevent loops in a network of switches or bridges that have multiple paths to each other. STP builds a loop-free logical topology for Ethernet networks, the basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree allows a network design to include backup links providing fault tolerance if an active link fails. STP creates a spanning tree that characterizes the relationship of nodes within a network of connected layer 2 bridges, and it disables those links that are not part of the spanning tree leaving a single active path between any two network nodes.