Slipstreaming an install CD has the following steps
Acronym for system development life cycle. SDLC is the process of developing information systems through investigation, analysis, design, implementation and maintenance. SDLC is also known as information systems development or application development. SDLC is a systems approach to problem solving and is made up of five phases, each comprised of multiple steps and extending over several years of the systems life: (note there are many variations though all consist of these basic five steps)
1) Analysis - Conceiving the idea, surveys, expertise, studies, a general feeling of change. 2) Design - Contractors, company experts, motivated personnel, professional attitude. 3) Implementation - Overtime, reliability, working with contractors, plenty of training, pilot systems. 4) Testing - Maintaining two systems, wide range of faults, experience, demanding, training and development. 5) Maintenance - Routine, customer service, practical experience, providing training.
Consider that these processes extend over many years and that depending where in the SDLC a company is currently operating at there are different opportunities for the engineer's career.
To be actively involved in the early stages of a SDLC the person should have the following skills.
What are Tangible Costs and Benefits?
Tangible costs and benefits are those which are guaranteed.
Examples of cost would be contracts, quotes and tenders. Examples of benefits might be improved productivity, better information.
What are Intangible Costs and Benefits?
Intangible costs and benefits are those which cannot be easily measured.
Examples of cost might be hourly price contracts e.g. hourly maintenance, ongoing training, staffing. Examples of benefits might be staff morale and customer satisfaction.
These must be estimated using models, surveys and case studies.
Being aware of the Cost versus Benefit process enables the employee to be realistic when pressing for change or at least understanding of the effect on such a study on their working conditions.
LAN - Local Area Network
WAN - Wide Area Network
RFC - Request For Comments - White papers on the standards that make networking work. Every aspect of networking, and computer electronics for that matter, is documented in an RFC somewhere. E.g. RFC 802.3 is the standard for Ethernet wired networking
An excellent resource from Michael Harris of Delmar College. Networking primer 7
Application
layer A ll
The end application that either started or receives
the data.
6 Presentation
layer P EOPLE
Encryption, Data Types
5 Session
layer S EEM
Ports & Sockets, Communication sessions
4 Transport
layer T O TCP, Control, Error Checking, Sequencing of Packets
3 Network
layer N EED Packets, IP Addressing, Network Addressing.
2 Data link
layer D ATA Frames, MAC addressing, Network hops.
1
Physical
layer P ROCESSING Cables or any media, connectors, hubs
Or as Jon from a previous year => All People Should Thoroughly Network Digital Parsnips !!!!
Consider how data is ENCAPSULATED (data is framed with header and trailer information at each layer in the process) into IP PACKETS (layer 3) and then ETHERNET FRAMES (Layer 2) in preparation for sending bits on the physical layer.
An IP Address is a 32 Bit ( 4 Byte ) number usually represented in what is known as Dotted Decimal Notation, or 192.168.100.100, each section representing 1 Byte (range 0-255).
IP Addresses are standardised in layers 3 and 4 of the OSI model and are embedded in the IP Packet with the data. They represent the final destination NETWORK for the data.
Media Access Control (MAC) is a 48 Bit (12 digit Hexadecimal or 6 Byte) number allocated to every device that is attached to the physical layer of a network, in the world!
Typically the first 6 digits of the MAC address is allocated to a manufacturer, so with knowledge of these numbers you can identify the manufacturer of the device. The last 6 digits represents the serial number of the network card.
The MAC address is standardised at the Data Link layer of the OSI model. Ethernet frames are addressed with the MAC address of the the next networking device the data must travel through on its path to the final destination (Usually a router, gateway, proxy or switch). In fact the very last hop to the destination node is addressed to the MAC address of that device. The IP address is only used to located the network where this node resides.
Network devices (Routers, Switches) unpack the Ethernet Frame to inspect the IP Packet to determine which network to send it to next. Once this is determined (Often it isn't really known so the device just hands it up-one-level to a higher level of authority over networks) the IP Packet is packed into a new Ethernet Frame and re-addressed to the next MAC address on the way. Networked devices always 'know' the MAC address of directly connected nodes as they communicate using broadcasts and build a table known as an ARP table (Address Resolution Protocol)
You may begin to see how the OSI model becomes an illustrative tool for how networking occurs and how different tasks, protocols and instructions are performed in each defined layer.
Ethernet is the term used to collectively name the protocols, hardware and services used in modern networks. Often referred to as 802.3 which is the RFC that defines it.
CSMA/CD stands for Carrier Sense Multiple Access / Collision Detection.
This basically means that all nodes can 'hear' each others signals, sense a collision and respond by waiting a random amount of time to retransmit. This enables effective communication in relatively congested networks. The carrier sense is a voltage that all nodes can detect and interpret as a busy signal.
ping
Ping is a DOS command, the parameters are either the IP address or URL of the node you wish to test communication with. This tests confirms the media (Layer 1). If you use an IP Address the TCP/IP protocol (Layers 3&4) on both devices are OK and if you use a URL it also confirms DNS is working.
ping 127.0.0.1
The IP address 127.0.0.1 is known as the loopback address. It is a special address all IP networked devices have that is used for testing the TCP/IP protocol of the local machine and for internal data networking between applications on your PC. This test, if successful, confirms the machine's TCP/IP protocol. It doesn't mean though that the machine is correctly set up! Other settings such as the workgroup, IP Network & Address, Subnet mask could still be incorrectly specified preventing networking. Pinging the loopback address only confirms the protocol & adaptor (NIC) are installed and working. This test also doesn't test the NetBUI protocol responsible for file and printer sharing.
netstat
This report shows the OSI Layer 5 sessions. Ports and sockets
Displays current network sessions. Using the -a switch shows the sockets as PCNAME:PORT. Using the -n switch shows the sockets as IPADDRESS:PORT
Local connections that are well-known-ports indicate your PC is serving a service to another PC. Foreign connections with well-known-ports indicate your PCis a client to a service from a remote PC.
Some well-known ports are: 80 HTTP (Connection to web servers) 25 SMTP (Email transfer) 110 POP3 (Email authorisation) 23 TELNET (Insecure remote administration) 139 NetBIOS (File or printer sharing)
There is 16 Bit of system memory allocated to registering ports for networking sessions. This means there are apprx. 65536 ports on a PC. The first 1025 are reserved and are called well-known ports. These ports are documented and regulated by the IANA to ensure network security for specified processes like email, Telnet and web hosting.
Shields Up is a site that probes your networking ports for breaches in security. Well-known ports should be reported as Stealthy or Closed to external probing.
In networking file paths, two backslashes (or two forward in Linux and the web) means that the following name in the path is a PC acting as a server offering files or services.
To see all workstations on the LAN try
net view
net is a DOS command with a suite of uses Used in conjunction with view it will show all named PCs on your workgroup. Used with share (net share) it will show what shares your PC is making available to the network.
To find what shares a computer on the LAN is offering try
net view \\network_pc_name
tracert
The parameter would be either an IP address or a URL
Reports each hop the packet goes through on its way to a destination and shows the time in milliseconds. Good for diagnosing a faulty/congested switch, router or gateway. Some firewalls block these ICMP packets preventing this tool from reporting correctly, though not usually a problem within a LAN.
To 'watch' a packet travel to Australia. Examine the time when it first reaches Sydney. Note, the time is a round trip time! Using a DOS command prompt try ... tracert www.yahoo.com.au > c:\mytrace.txt Some organisations for you to lookup on Google or Webopedia. IEEE = Institute of Electrical & Electronic Engineers IANA = Internet Assigned Numbers Authority W3C = World Wide Web Consortium