viernes, 10 de junio de 2011

PRÁCTICA FINAL 1º ASIR

Tareas realizadas:
- Esquema de direccionamiento IP
- Configuración de las interfaces virtuales y físicas de los Routers
- Enrutamiento OSPF
- Seguridad de puerto en el Switch

Como Rubén y yo teníamos ambos Routers, prácticamente hemos realizado las mismas tareas pero en los distintos Routers. En mi caso, como yo no tengo la asignatura de ISO, me he centrado  más en la parte de Redes. Pero hemos participado en grupo la mayoria del tiempo.

viernes, 6 de mayo de 2011

1) What are the main security measures showed by the video when accessing the building?
Access to facilities is blocked by a restricted barrier.
Exists security personnel are on duty 24 hours a day, 7 days to week
Access control with badging and biometric identification.

2) What is the security techonology related to "sight" that Google uses for accessing the core part of the facility?
They use biometric cameras to verify the identity

3) According to the video, what type of device is indispensable to Google's usual day-to-day activity?
The hard drives, because in there are store their business data
 
4) What two actions do Google's techinicians do when a hard drive fails?
Google's techinicians do reformatted and retested the hard drives
If the hard drive does not pass these test, it's removed from the rotation

5) What two actions do Google's techinicians do when those hard drive that have ended their "life cycle"?
When one hard drive have ended their life cycle, this is destroyed and recycling.
 
6) How does Google manages to have permanent conectivity to the internet backbone?, what is the concept that is referred to in the video?
Google data centers are connected to the internet via high speed fiber-optic cable.

7) How does Google manages to guarantee the safety of stored data?
Google data centers are equipped with emergency backup generators

8) How does Google manages to guarantee the continous power supply?

 
9) What does Google want specifically to check by using video cameras?

10) What kind of "raw material" is Google commited to not to use?
 
 
Vocabulary
approaches = enfoques
facilities = instalaciones
deploy = implementar
tightly = bien
ensure = garantizar
although = aunque
badges = insignia
paramount = primordial
grounds = motivos
on duty = en servicio

viernes, 1 de abril de 2011

TEXT OF UNIT 6

Spanning Tree Protocol (STP) provides a mechanism for (1) shut down redundant links in a switched network. STP provides the redundancy required for (2) reliabity without creating switching loops. STP is an open standard protocol, used in a switched environment to create a loop-free logical (3) trunking. STP is relatively self-sufficient and requires little configuration. When switches are first powered up with STP enabled, they check the switched network for the existence of loops. Switches detecting a potential loop block some of the connecting ports, while leaving other ports active to forward frames.

As a switch powers on, each port cycles through a series of four states: blocking, listening, learning, and (5) flashing . A fifth state, disabled, indicates that the administrator has (6) disabled the switch port. As the port cycles through these states, the LEDs on the switch change from (7) forwarding orange to steady green. It can take as long as 50 seconds for a port to cycle through all of these states and be ready to forward frames.

When a switch powers on, it first goes into a blocking state to immediately prevent the formation of a (8) topology . It then changes to listening mode, so that it receives BPDUs from neighbor switches. After processing this information the switch determines which ports can forward frames without creating a loop. If the port can forward frames, it changes to learning mode, and then to forwarding mode. Access ports do not create loops in a switched network and always transition to forwarding if they have a host attached. (9) loop ports potentially create a looped network and transition to either a forwarding or blocking state.



Words: reliability, forwarding, shut down, flashing, topology, disabled, loop, check, trunking

viernes, 4 de marzo de 2011

TEXT OF UNIT 5

"Why people attack WLANs:

Additionally, it is important to change the default (1) SETTINGS. (2) WIRELESS devices are shipped preconfigured with settings such as SSIDs, (3)PASSWORDS, and IP addresses in place. These defaults make it easy for an attacker to (4) IDENTIFY and infiltrate a network. Even with SSID broadcasting disabled, it is possible for someone to get into your network using the well-known default SSID. Additionally, if other default settings, such as passwords and IP addresses are not changed, attackers can (5) CONNECT an AP and make changes themselves. Default information should be changed to something more secure and unique. These changes, by themselves, will not (6) PROTECT your network. For example, SSIDs are transmitted in (7) CLEAR text. There are devices that will intercept wireless signals and read clear text messages. Even with SSID broadcast (8) TURNED OFF and default values changed, attackers can learn the name of a wireless network through the use of these devices that intercept wireless signals. This information will be used to (9) ACCESS to the network. It takes a combination of several methods to protect your WLAN".

Words: connect, passwords, access, turned off, setting, identify, clear, wireless, protect

viernes, 25 de febrero de 2011

TEXT OF UNIT 4

Text:
"All hosts that (1) CONNECT directly to the Internet require a unique (2) PUBLIC IP address. Because of the finite number of 32-bit addresses available, there is a risk of running out of IP addresses. One solution to this problem was to reserve some private addresses for use exclusively inside an organization. This allows hosts within an organization to communicate with one another without the need of a unique public IP address. RFC 1918 is a (3) STANDARD that reserves several ranges of addresses within each of the classes A, B and C. As shown in the table, these private address ranges consist of a single Class A network, 16 Class B networks and 256 Class C networks. This gives a network (4) ADMINISTRATOR considerable (5) FLEXIBILITY in assigning internal addresses. A very large network can use the Class A private network, which allows for over 16 million private addresses. On medium size networks, a Class B private network could be used, which (6) PROVIDES over 65,000 addresses. Home and small business networks typically use a single class C (7) PRIVATE address, which allows up to 254 hosts. The Class A network, the 16 Class B networks, or the 256 Class C networks can be used within any size organization. Typically many organizations use the Class A private network".


Words: standard, administrator, connect, private, public, provides, flexibility

viernes, 18 de febrero de 2011

TEXT OF UNIT 3

Text:
"There are two parts to every IP (1) ADDRESS . How do hosts know which portion is the network and which is the host? This is the job of the (2) SUBNET mask. When an IP host is configured, a subnet mask is assigned along with an IP address. Like the IP address, the subnet mask is 32 bits long. The subnet mask signifies which part of the IP address is (3) NETWORK and which part is host. The subnet mask is compared to the IP address from left to right, bit for bit. The 1s in the subnet mask represent the network portion; the 0s represent the host portion. In the example shown, the first three octets are network, and the last octet represents the (4) HOST . When a host sends a packet, it compares its subnet (5) MASK  to its own IP address and the destination IP address. If the network bits match, both the source and destination host are on the same network and the (6) PACKET can be delivered locally. If they do not match, the sending host (7) FORWARDS the packet to the local router interface to be sent on to the other network".



Words: network, host, mask, address, packet, subnet, forwards

viernes, 4 de febrero de 2011

READING FOR UNIT 2

Text 1:


"The Ethernet protocol standards define many aspects of network communication including frame format, frame size, timing and (1) ENCODING . On Ethernet networks, a similar method exists for identifying (2) SOURCE and destination hosts. Each (3) HOST connected to an Ethernet network is assigned a physical (4)ADDRESS which serves to identify the host on the network".

Words: address, source, encoding, host


Text 2:

“Fiber optic cables are made of glass or (1) PLASTIC . They have a very high (2) BANDWIDTH , which enables them to carry very large amounts of data. Fiber is used in (3)  BACKBONE networks, large enterprise environments and large data centers. It is also used extensively by telephone companies. Unlike TP and coax, fiber optic cables transmit data using pulses of light. Although not normally found in home or small business environments, fiber optic (4) CABLING is widely used in enterprise environments and large data centers. Fiber optic cable is constructed of either (5) GLASS or plastic, neither of which conducts electricity. This means that it is immune to EMI and is (6) SUITABLE for installation in environments where interference is a problem. In addition to its resistance to EMI, fiber optic cables support a large amount of (7) DATA making them ideally suited for high-speed data backbones. Fiber optic backbones are found in many corporations and are also used to connect ISPs on the Internet. Each fiber optic circuit is actually two fiber cables. One is used to transmit data; the other is used to (8) RECEIVE data”.

Words: suitable, plastic, backbone, bandwidth, cabling, glass, receive