it 101 j.j. ekstrom, ph.d. networking, information management, information assurance and security,...

29
IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum Development

Upload: brandon-skinner

Post on 11-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

IT 101

J.J. Ekstrom, Ph.D.

Networking, Information Management,Information Assurance and Security,Software Development, Systems EngineeringIT Curriculum Development

Page 2: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

2

Education and Academia

BS BYU 1974MS BYU 1976Ph.D. BYU 1992BYU PT faculty 1979-1987, 2000Associate Professor, EIT 2001BYU Continuing Status 2007IT Program Chair 2007Programmer since 1966

Page 3: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

3

System Software

Operating SystemsCompilersLinkers/LoadersObject-oriented Design and Programming Systems

Page 4: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

4

Embedded Systems

Automatic Storage and Retrieval SystemsMilitary applicationsMicroprocessor Control ROMs

Page 5: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

5

Application Areas

MedicalBankingInventory and material managementInformation retrieval and indexingNetwork managementLAN switch software designEmail archiving and management

Page 6: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

6

Business

6-8 Startups (Depending on how you count)4 Large CompaniesVPDirectorCTOConsulting EngineerMTS

Page 7: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

7

What you should remember:

You will probably do a lot of different things during your lifeYou will have to learn continuously or become obsoleteThe only physical constant in life is changeStay close to the Spirit, He gives you glimpses of what is over the horizon.

Page 8: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

8

Networking and Buzzwords

OSI ModelInternet ModelDevices: Hosts, Hubs, Switches, RoutersNetwork DesignNetwork DeploymentNetwork Management

Page 9: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

9

Alphabet Soup:OSI 7 layer modelInternet/internetISPIPTCPIETFIEEEpingtracerouteSNMPSMTPIMAPPOPFTPSCPSSH

802.11g802.1Q802.1DHTTPHTMLURLRIPOSPFBGP4JavaScriptJ2EEPHPPerlPythonRubyVBVPscript…

Page 10: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

10

There ain’t no magic!

All of the acronyms have simple meaningsYou can figure out anything in IT if you are willing to dig a bitThere is a world of information at your fingertips, don’t be afraid to Google for answers.A college education can only prepare you to learnThe details will be obsolete within a few years of graduationI don’t use a language that was available when I got my Master’s Degree! (except English ;-)

Page 11: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

11

Details for those who care:

Credits: Data Communications and

Networking, 2nd Edition. Behrouz A. Forouzan, McGraw-Hill, ©2001, 1998

Website associated with text.

Some slides for digging:

Page 12: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

12

Figure 3-1

WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998

OSI Model

Page 13: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

13

Figure 3-2

WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998

OSI Layers

Page 14: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

27

Figure 3-14

WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998

Summary of Layer Functions

Page 15: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

28

Figure 24-1

An Internet According to TCP/IP

Page 16: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

29

Different Standards Bodies:

OSI – Open Systems InterconnectIEEE 802 – Physical -> Data Link Divide DL into

Logical Link Control (LLC) Media Access Control (MAC)

802.11 wirelessIETF – Internet ProtocolsOMG – Middleware DMTF – Management Models… many others

Page 17: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

30

Figure 12-1

WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998

OSI Model and Project 802

Page 18: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

31

Figure 24-2TCP/IP and the OSI Model

Page 19: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

32

Physical / Data Link

Remember that IP rides on something else, PPP, PPPOE, Ethernet, Token ring, ATM…The following discussion takes the lower layers for granted.The only time you have to think about the physical and Data Link is when they don’t work.80% of the time when a network doesn’t work it’s the cables!

Page 20: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

33

Troubleshooting: Ping fails

Ping tests layers 1,2,3Start at the physical layer and work up. Cables NIC – do you have a link light?

MAC layer self configures, see if you can sniff (carry a laptop and a

hub) Almost never the problem!

If you have link, problem is probably setup of addressing.

Page 21: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

34

Figure 24-3

IP Datagram

Page 22: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

35

Figure 24-4

Internet Address

Page 23: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

36

Figure 24-5

Internet Classes

Page 24: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

37

Figure 24-6

IP Addresses in Decimal Notation

Page 25: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

38

Figure 24-7

Class Ranges of Internet Addresses

Page 26: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

39

Figure 24-8Network and Host Addresses

Page 27: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

40

Figure 24-9

A Network with Two Levels of Hierarchy

Page 28: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

41

Figure 24-10

A Network with Three Levels of Hierarchy

Page 29: IT 101 J.J. Ekstrom, Ph.D. Networking, Information Management, Information Assurance and Security, Software Development, Systems Engineering IT Curriculum

42

Figure 24-11

Addresses with and without Subnetting