Posts

BSIT 220 Week 10 Final Blog Post

 In this last week of our class. We have focused on the Monitoring and Troubleshooting of a Network. These would be entrusted and only performed by a company's Network Admin. The Network Admin, can use monitoring tools like SMNP to monitor managed IP Devices on the Network and modify any device information to change the device's behavior. Looking Glass Sites are used to show network routing information and are usually managed by an ISP. These are both tools use that a Network Admin can use to troubleshoot  and monitor their Networks.

BSIT 220 Wk 9 Network Protection

This week we focused on protecting the network. Which included having updated documentation on the network. Contingency Planning to test for flaws and thwart attackers from accessing private information. Having control of certain physical elements such as keeping the Network Room locked and only allowing for authorized personnel to have a key to the room or closet. Also having video surveillance and firewalls to keep attackers at bay. These are all important pieced when it comes to hardening a network.

BSIT 220 Wk 8 blog - Network Segmentation

Network Segmentation is done for security and also to manage the network. Keeping the network from being congested with traffic . Which allows the network to optimize it's performance.

BSIT-220- Wk 7 WIMAX and LTE

WIMAX was created as alternative internet to DSL and Cable. However LTE was chosen by all of the Cellular Long Distance Carriers. Making WIMAX obsolete.   WIMAX is still being used in Africa, Alaska, Canada , Australia. WIMAX because of it being wireless by nature . The further away away from the source that a client would get . The slower their connection to the network would become.  LTE devices like a smartphone can be miles away from the source. LTE works better for a Mobile Network because of this.

R Palma BSIT Wk 6 - IPv6

Ipv6 was created to solve the problem of Ipv4 running out of IP addresses. Ipv6 was created for being able to allow the use of mobile devices such as laptops, Tablets and Phones.

R. Palma week 5 BSIT 220 Post

This week we read about DNS, Net Bios, Https and other applications that we use on a daily basis when accessing the internet. I tend to see a lot of issues with both the DNS being not available or not correct when I am assisting my clients that are unable to get to a certain website that they usually will have no problems pulling on their store's Back Of The House PC/ However over time,the url's and information becomes outdated or corrupted. Causing the user to pull up the website and get a DNS Server error or even sometimes getting the wrong site altogether due to be a letter or number off in the https:. This can cause the user to goto a web site that is both harmful and dangerous and was set up to steal user's personal info or in this case to gain access to a a corporate network. Often times this issue of the DNS error can be resolved by flushing the DNS. The other issue, I will often walk the user through making sure that the web sites they are trying to access  are both...

R. Palma BSIT220 Wk4 whois and tracert

This week we learned about the Whois and tracert commands. Using the whois command and choosing 5 random corporations  gave us the information on who hosts the domain, where to log complaints of abuse on the domain and information on the owner of the domain as well. Using the tracert command gave us an idea as to what kind of Network Connection these sites have.  Which ones were getting packets faster than another or which ones were losing packets when performing this command. While accessing as much information for some sites and very little for others made it seem like the ones that gave the most information about the site owners and hosts. Might also be at risk for Security issues. I would have to say the sites that gave us the least amount of information or did not allow us to perform certain commands were that way because they are pretty well secured.