viernes, 10 de junio de 2011

Mi trabajo realizado en la practica final

Sobre mi trabajo realizado:

En un principio, entre todos los miembros del grupo, realizamos un direccionamiento IP, para todos los ordenadores e interfaces, estuvimos debatiéndolo y dejamos la mejor configuración posible. He de decir que tuvimos que hacer algunos cambios mas tarde pero de una pequeña importancia.

Después nos pusimos a repartir las tareas, a mí se me asignó la tarea de configurar el router con quagga que haría de enlace troncal de VLAN.

Lo primero que hice fue instalar quagga en el PC, cuando la tuve instalado fui al fichero ospfd.conf y lo configure adecuadamente para entrar mediante VTY al "router". Antes de entrar al la interfaz del router, arranque los servicios de zebra y quagga y pare el servicio de NetworkManager.

Antes de entrar al router a configurar al protocolo OSPF. Creamos 3 subinterfaces (con ayuda de mi compañero Héctor) en linux, fue sencillo, copias la interfaz eth1 y le cambiamos el nombre del dispositivo poniéndole así eth1.10, eth1.20 y eth1.30 para cada pata que íbamos a conectar y que venían del switch y agregamos la línea VLAN=Yes.

Cuando entre al router, configure el router para que direccionara con ospf y agregue las redes en el router para que pudiera direccionarlas. Cuando hice todo esto guardé para que se quedara también guardado en Linux.

También estuve ayudando a mis compañeros Antonio y Julio intentando aportar soluciones a fallos que les surgían y alguno que otro pude solucionar. Igual que ellos me dieron apoyo y también consiguieron ayudarme.
Respecto al trabajo en grupo me pareció muy bueno por parte de todos ya que cumplimos todos con nuestro trabajo y trabajamos todos por igual, estuvimos ayudándonos en lo que más falta nos hacía y no tuvimos ninguna discusión ni líos a la hora de hacer el trabajo, todo lo contrario.
.

viernes, 20 de mayo de 2011

· About routing:

Dynamic routing protocols are classified into two major categories: (1)distance vector protocols and link-state protocols.

Routers running distance vector routing protocols share network information with directly connected (2) neighbors. The neighbor routers then (3) advertise the information to their neighbors, until all routers in the enterprise learn the information. A router running a distance vector protocol does not know the entire (4) path to a destination; it only knows the distance to the remote network and the direction, or vector. Its knowledge comes through information from directly connected neighbors.

Like all routing protocols, distance vector protocols use a (5) metric to determine the best route. Distance vector protocols calculate the best route based on the distance from a router to a network. An example of a metric used is (6) hops count, which is the number of (7) routers, or hops, between the router and the destination.


· About RIP:

The RIP distance vector routing protocol is easy to configure and (8) requires minimal amounts of router resources in order to function.

However, the simple hop count metric used by RIP is not an (9) accurate way to determine the best path in complex networks. Additionally, the RIP limitation of 15 hops can mark distant networks as unreachable.

RIP issues periodic updates of its routing table, which consumes (10) bandwidth, even when no network changes have occurred. Routers must accept these (11) updates and process them to see if they contain updated route information.

Updates passed from router to router take time to reach all areas of the network. As a result, routers may not have an accurate picture of the network. Routing (12) loop can develop due to slow (13) convergence time, which wastes valuable bandwidth.

These characteristics limit the usefulness of the RIP routing protocol within the enterprise environment.

viernes, 6 de mayo de 2011

google


1)What are the main security measures showed by the video when accessing the building?

·         The vehicles access is restricted for a barrier and only people authorized can pass
·         Have security personal on 24 hours of a day
·         Have video cameras recording all time

2) What is the security technology related to "sight" that Google uses for accessing the core part of the facility?

Google have a scaners of iris to pass at core area

3) According to the video, what type of device is indispensable to Google's usual day-to-day activity?

The hard drives is a important element

4) What two actions do Google's techinicians do when a hard drive fails?

·         Save the data in multiple hard disks
·         The hard disk is reformatted and retested, if continues failing the hard disk are discarded


5) What two actions do Google's technicians do when those hard drive that have ended their "life cycle"?

First a piston is pushed the hard disk making the data being unreachable and after, a crusher crushes the hard disk

6) How does Google manages to have permanent connectivity to the internet backbone?, what is the concept that is referred to in the video?

Google have a multiple connection to internet

7) How does Google manages to guarantee the safety of stored data?

8) How does Google manages to guarantee the continous power supply?

9) What does Google want specifically to check by using video cameras?

10) What kind of "raw material" is Google commited to not to use?

viernes, 4 de febrero de 2011

unit 2


Text 1:

"The Ethernet protocol standards define many
aspects of network communication including frame format, frame size, timing and
(1)
encoding. On Ethernet networks, a similar method exists for identifying (2) source and destination hosts. Each (3) host connected to an Ethernet network is assigned a physical (4) address which serves to identify the host on the network".

Words: address,
source, encoding, host



Text 2:

“Fiber optic cables are made of glass or (1) plastic. They have a very high (2) bandwidth, which enables them to carry very large amounts of data. Fiber is used in (3) suitable networks, large enterprise environments and large data centers. It is also used extensively by telephone companies. Unlike TP and coax, fiber optic cables transmit data using pulses of light. Although not normally found in home or small business environments, fiber optic (4) cabling is widely used in enterprise environments and large data centers. Fiber optic cable is constructed of either (5) glass or plastic, neither of which conducts electricity. This means that it is immune to EMI and is (6) backbone for installation in environments where interference is a problem. In addition to its resistance to EMI, fiber optic cables support a large amount of (7) cabling making them ideally suited for high-speed data backbones. Fiber optic backbones are found in many corporations and are also used to connect ISPs on the Internet. Each fiber optic circuit is actually two fiber cables. One is used to transmit data; the other is used to (8) receive data”.

Words: suitable, plastic,
backbone, bandwidth, cabling, glass, receive
, data

viernes, 28 de enero de 2011



 1-“Coaxial
cable is usually constructed of either copper or aluminum, and
is used by cable television companies to provide service. It is also
used for connecting the various components which make up satellite
communication systems. Like twisted pair, coaxial cable (or
coax) also carries data in the form of electrical signal. It
provides improved shielding compared to UTP, so has a lower
signal-to-noise ratio and can therefore carry more data .
It is often used to connect a TV set to the signal source, be it a cable
TV outlet, satellite TV, or conventional antenna. It is also used at
NOCs to connect to the cable modem termination system (CMTS)
and to connect to some high-speed interfaces. Although coax has
improved data carrying characteristics, twisted pair cabling has replaced
coax in local area networking uses. Among the reasons for the
replacement is that - compared to UTP - coax is physically harder to
install, more expensive, and harder to troubleshot
  2-“To take advantage of all of the features provided by an operating system, additional hardware resources such as sound cards,NICs, modems, microphones, and speakers are generally required. Many of the OS developers test various hardware devices and certify that they are compatible with the features system. Always confirm that the hardware has been certified to work with the operating system before purchasing and installing it".