IBM IT Support Professional Certificate

1. Introduction to Technical Support

This is the IBM version of introduction to IT Support. But it also gives information about different ticketing systems and service level agreements. It provides details about job opportunities and different skill levels in the field.

It has following sub-modules…

2. Introduction to Hardware and Operating Systems

This course is all about building computers and installing different operating systems on them. It also explains about computer connectors and their types, and peripheral devices. In the end, it gives details about how to troubleshoot a system step by step.

It has been divided into following modules…

3. Introduction to Software, Programming, and Databases

It goes into details about different computing platforms and types of software applications. It also lists down the available web-browsers, types of cloud computing, basics of programming and types of database queries.

It has following 4 sub-modules…

4. Introduction to Networking and Storage

It teaches about the types of networks, like LAN, WAN etc. It lists down the storage types and also goes into the details of troubleshooting common networking problems like DNS issues etc.

This course has following sub-topics…

5. Introduction to Cybersecurity Essentials

This courses teaches about:

  • Everyday digital threats like viruses, malware, social engineering etc.
  • How to remain safe online and how to use password management techniques to remain protected.
  • While surfing the web, how to avoid phishing and other threats.

and more…

It has 4 sub-modules…

6. Introduction to Cloud Computing

Learning opportunities are:

  • PaaS, IaaS, SaaS
  • Private, public and hybrid cloud models
  • Types virtual machines, hypervisors etc

and more…

This course talks about these topics…

Subsections of IBM IT Support

Subsections of Introduction

Industry Professional's Guide to Technical Support

Becoming a Technical Support Professional

Customer Service vs. Technical Support

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Why do companies use technical support?

  • Troubleshooting technical issues
  • Setting up accounts
  • Repairing and replacing
  • Assisting with network security
  • Training on hardware and software
  • Logging and tracking
  • Fostering positive relationships

Who uses technical support?

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Why is technical support important?

  • Companies provide solutions to customers
  • Positive experiences = increase in business
  • More trustworthy
  • Customer retention
  • Troubleshooting help
  • Product improvement
  • More desirable products

Why choose technical support?

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Why should you pick technical support?

  • Learn more about technology
  • Learn techniques for solving
  • Develop your professional skills
  • Build transferrable skills
  • Learn how to network to seek out
  • Open the door to many more careers

Career Opportunities in Technical Support

Technical support work environment

  • On-site at offices or call centers
  • Business offices and professional spaces
  • Remote working
  • Supporting clients and customers
  • Answering questions
  • Resolving technical issues

Technical support paths

  • Entry-level jobs
  • On-the-job training
  • Experience
  • Tiered approaches
    • Lower-tier
    • Mid-tier
    • Upper-tier

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Current jobs in technical support

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Technical support career advantages:

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Technical Support Roles and Responsibilities

Many names of technical support

  • Technical Support Representative
  • Computer Support Representative
  • Technical/IT Support Technician
  • Desktop Support Technician
  • IT Help Desk Support Specialist
  • Desktop/IT Support Analyst

Roles of technical support

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Help Desk & Support Technicians

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Technical Support Specialists & Engineers

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

IT Support Analysts & Specialists

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Service Desk Technicians & Analysts

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

A day of Technical Support

Industry Professional’s Guide to Technical Support Industry Professional’s Guide to Technical Support

Introduction to IT Infrastructure

  • Hardware
    • PCs
    • Mobile devices
    • Servers
    • Data centers
    • Hubs
    • Routers
    • Switches
  • Software
    • CMS
    • CRM
    • ERP
    • Collaboration, productivity, and business-specific apps
    • Web servers
    • Operating systems
  • Network
    • Routers
    • Data centers
    • Hubs
    • Switches
    • Security Software

Types of IT infrastructure

  • Traditional IT infrastructure
  • Cloud IT infrastructure

Troubleshooting IT Infrastructure

  • Troubleshooting within the IT infrastructure
  • A customer’s computer isn’t working
  • The client needs password reset
  • Customers are unable to access
  • A cyber threat is identified and neutralized
  • Communication allows working quickly to identify issues and implement solutions

Technical Support Skills and Opportunities

Technical Support Soft Skills

What are soft skills?

  • Positive behaviors and attitudes
  • Effectively communicate, collaborate, and manage
  • Actively listen to clients
  • Work with others to resolve problems
  • Diffuse stressful situations

Soft skills

  • Customer service mindset
  • Communication
  • Organization
  • Leadership
  • Problem-solving
  • Flexible and adaptable

Positive behaviors and attitudes

  • Knowledge of technology is one part
  • Work with others and manage social situations
  • Positive behaviors and attitudes
  • Effectively communicate, collaborate, and manage conflict

Set yourself up for success

  • Use your soft skills
  • Ask questions
  • Take good notes
  • Stay organized
  • Say “I don’t know” and “I’ll find out”

Customer Support mindset

  • Empathetic
  • Customer-centered
  • Patient

Learn to improve

  • Document your notes as you work
  • Read suggestions and notes from supervisors
  • Learn techniques to help you withstand pressure and reduce stress

Experienced background

  • Lack of work experience does not mean that you lack interest in technology
  • Use your passion for technology to boost your self-confidence
  • Positive behaviors and attitudes
  • Be willing to level-up your soft skills

Soft-skills tune-up

  • Additional online courses
  • Podcasts, audiobooks
  • Peers and social groups

Basics of Technical Skills

The job interview

Technical Support Skills and Opportunities Technical Support Skills and Opportunities

Basic programming and coding

  • Machine code and source code
  • Compiled programming and interpreted programming languages
  • Programming languages like C, Java, HTML, Python, and JavaScript
  • Basic-level coding

Computers and operating systems

  • Basic knowledge of android, iOS, Windows, Linux, macOS is necessary.

SQL and NoSQL basics

  • Basic knowledge of both
  • Differences of SQL and NoSQL
  • SQL queries retrieve information
  • NoSQL databases are nonrelational databases with unstructured data
  • Technical support services for databases
  • Database application services, management, security, backups, updates, and optimization

Analyze application logs

  • View information about events that have occurred in an application
  • Read and analyze application logs
  • Track information about the application
  • Includes timestamps for tracking issues
  • Logs levels of issues with labels

Server knowledge

  • Understand servers
  • Settings up and configuring servers
  • Updating server software
  • Monitoring and maintaining servers
  • Maximizing uptime
  • Managing virtual servers

Support ticket workflow

  • Track and manage client questions and issues
  • Zendesk, Jira, and LiveAgent
  • Similar workflow for most ticketing systems

Using knowledge base

  • Knowledge base skills
  • A collection of a group’s knowledge
    • Search
    • Read
    • Understand

New hardware and applications

  • Trying new hardware and applications
  • Interest in emerging technology

Additional technical tools

  • VMs
  • VPNs
  • Network security
  • IT infrastructure monitoring software
  • Enterprise hardware

Performance Evaluation of Technical Support Professionals

Performance evaluations

What is the purpose of a performance evaluation?

Technical Support Skills and Opportunities Technical Support Skills and Opportunities

What you should expect?

  • Accomplishing responsibilities
    • Possess technical knowledge and skills necessary to perform your job
    • Understand company policies and procedures
    • Complete required records, documents, and tickets
  • Decision-making
    • Evaluate issues
    • Work on your own
    • Recognize problems
    • Make decisions
  • Productivity
    • Complete tasks in a timely and efficient manner
    • Work according to instructions
    • Ask for help, when needed
  • Customer service
    • Strong commitment to customers
    • Work towards a solution
    • Call recordings
    • Customer ratings
    • Time-to-resolve measurements
    • First-contact resolution and contacts per customer
    • Average number of tickets handled
  • Work attitude
    • Positive attitude for work and responsibilities
    • Effective working relationships with others
    • Positive attitude toward suggestions
  • Communication skills
    • You write clearly, and effectively
    • You understand written and spoken communication
  • Goal achievements
    • Your new certifications and skills
    • Achievement of professional goals
    • How you have improved

Benefits to performance evaluations

  • Your role performance
  • Recognition for your accomplishments
  • Share your “good job” moments
  • Discuss goals and ways to meet goals
  • Provide opportunities for advancement

Career Paths and Progression in Technical Support

Technical Support entry-level roles

  • IT support specialist
  • IT technician
  • Help Desk technician
  • Desktop Support Specialist
  • Field Service Technician

Skills for entry-level roles

  • Access data and share with those who need it
  • Actively listen to clients and their description of computer-related issues
  • Ask questions to determine the problem
  • Guide customers through steps to resolve problems
  • Train users on new computers and software
  • Note changes, updates, and issues
  • Share information with other team members and managers

Experience for entry-level roles

  • IT experience or a degree not required
  • Customer service experience is beneficial
  • Knowledge of technology is a plus
  • Increase your chances of getting a better job
  • Professional certificates
  • A computer science or related degree

Technical support mid-level roles

  • Help desk analyst
  • Technical support specialist
  • Tier II Support

Skills for mid-level roles

  • Test and maintain equipment and software
  • Try out new systems and programs
  • Communicate with clients about technology use
  • Train users on how to use new hardware and applications
  • Communicate on proper use of technology
  • Train new technical support team

Experience for mid-level roles

  • Technical support specialist level 2
  • 1 to 3 years of experience
  • With on-the-job training
  • Certifications, Cisco, Microsoft, and CompTIA, like A+, Network+, Security+
  • Technical support specialist level 3
    • 3 to 5 years of experience
    • Advanced on-the-job training
    • Certifications similar to level 2

Technical support upper-level roles

  • Technical support lead or manager
  • IT support team lead
  • Field engineer supervisor

Skills for upper-level roles

  • Manage systems and capabilities
  • Research and explore new systems, software, and processes
  • Train users on standard usage practices for hardware and software
  • Manage ongoing issues in projects
  • Communicate changes in policies to organization management
  • Manage and train teams

Experience for upper-level roles

  • On-the-job training in leadership
  • 5 or more years of experience
  • ITIL, SixSigma, and relevant certifications

Technical Support Paths

  • Use technical support experience to switch to other IT roles
  • Develop cross-skills you can apply to other roles
  • Consider tasks and responsibilities you enjoy
  • Interview for roles that want to know more about

Cross-skills and up-skill paths

  • Use cross-skills you learn on the job to move to better roles
  • Level-up skills to promote to more roles

Cross-skill and up-skill roles

  • Network Administrator
  • Network Security Analyst
  • Database Administrator
  • Cloud Developer
  • QA Engineer
  • Software Developer

Industry Certifications for Technical Support

What are industry certifications?

  • Certify skills meet industry standards
  • Confirm understanding of strategies and concepts
  • Validate knowledge about information technology (IT)
  • Certify that starting skill requirements are met
  • Show specialization in the field

Certifications

  • Certifications for starting a career in technical support
    • CompTIA, Microsoft, Apple, ITIL Foundation, and Cisco

CompTIA IT Fundamentals (ITF+)

  • For starting in IT
  • Demonstrates basic IT knowledge and skills

CompTIA A+ for progressing in technical support

Demonstrates mastery of:

  • Hardware
  • Software troubleshooting
  • Networking
  • Operating systems
  • Device and network troubleshooting
  • Security for devices and networks
  • Mobile devices Virtualization and Cloud computing
  • Operational procedures

CompTIA Network+

  • Networking path
  • Demonstrating skills for troubleshooting, configuring, and managing networks

Microsoft 365 Certified: Fundamentals

  • Microsoft role-based and specialty-based certifications

Apple Certified Support Professional (ACSP)

  • For technical support for Mac users
  • macOS, troubleshooting, and support

ITIL Foundation certifications

  • Start at support center courses
  • Develop skills in supporting customers, IT role functions, and troubleshooting methods

Cisco Certified Network Associate (CCNA)

  • Demonstrate knowledge of networking
  • Highlights skills in administering network maintenance, creating secure network access, and improving network connectivity
  • Certification are not required
  • Begin by studying for certifications
  • Some employers offer assistance
  • Ask about certification opportunities

Support Tools, Support Tiers, and Service-Level Agreements

Overview of Support Channels

  • Self-support channels
    • Self-help
    • Wikis
    • FAQs
    • Knowledge base
    • Documentation
    • Discussion Forums
  • Email support
    • Asynchronous support
    • Not a real-time exchange
  • Social media support
    • Asynchronous support
  • Phone support
    • Synchronous support
    • Urgent issues
    • Sensitive information
    • Real-time support
  • Live-chat support
  • Video chat support
    • Virtual hands on support
  • Remote support
    • Host device to customer device
  • In-person support
    • Hands-on troubleshooting
    • Preventive maintenance services
    • Hardware support

Ticketing systems

  • Create ticket
  • Document, track, and manage customer issues to resolution
  • Convert emails to tickets
  • Log phone sessions
  • Users submit tickets

Remote Support Tools

Two types of remote support

  • Attended
    • Customer is at a device
    • Immediate resolution
    • Hands-on support
    • Faster resolution times
    • Customer satisfaction
  • Unattended
    • Maintenance of groups of users and servers
    • Doesn’t require permission from users to access their computers
    • Users don’t need to be at their computers
    • Installing updates
    • Managing the IT infrastructure
    • Troubleshooting issues on many devices

Tools

  • ConnecWise
  • TeamViewer
  • Dameware
  • BeyondTrust
  • ZoHo Assist
  • Windows Remote Assistance

Common Features

  • Remote control and screen sharing
  • File sharing
  • Secure devices
  • Transfer support sessions
  • Multiple monitors
  • Virtual agent and chatbots
  • Training and education in IT
  • Pre-installed support
    • ML/AI embedded solutions
  • Proactive technical support
  • Cloud-connected support
  • Video chats
  • Technical support i virtual spaces
  • All-in-one support platforms

Levels of Technical Support

Need for tiered support

  • Route technical support issues
  • Handle a large volume of issues
  • Increase customer satisfaction
  • Improve technical support

Levels of technical support

Support Tools, Support Tiers, and Service-Level Agreements Support Tools, Support Tiers, and Service-Level Agreements

Technical support skills required

Support Tools, Support Tiers, and Service-Level Agreements Support Tools, Support Tiers, and Service-Level Agreements

Service-Level Agreements (SLAs)

SLAs in technical support

  • Legal agreements

    Ensure:

  • Quality

  • Timeliness

  • Availability

  • Expectations

SLA contracts

  • Support available
  • Free or paid version
  • Accepted contract

SLA details

  • Agreement summary
  • Goals of business and users
  • Consequences of violations
  • Points of contact

Types of SLAs:

  • Customer-based
  • Service-based
  • Multiple

SLA priority levels

Support Tools, Support Tiers, and Service-Level Agreements Support Tools, Support Tiers, and Service-Level Agreements

Response SLAs vs Resolution SLAs

Support Tools, Support Tiers, and Service-Level Agreements Support Tools, Support Tiers, and Service-Level Agreements

SLA management

  • Track
  • Monitor
  • Prioritize
  • Automate
  • Report

The Escalation Matrix

Escalation management

  • Builds trust and support
  • Improves business
  • Improves communication
  • Boosts satisfaction

Escalation Process

  • Escalation paths
    1. Functional
    2. Hierarchical
    3. Automatic

1) Functional escalation

Support Tools, Support Tiers, and Service-Level Agreements Support Tools, Support Tiers, and Service-Level Agreements

2) Hierarchical escalation

Support Tools, Support Tiers, and Service-Level Agreements Support Tools, Support Tiers, and Service-Level Agreements

3) Automatic escalation

Support Tools, Support Tiers, and Service-Level Agreements Support Tools, Support Tiers, and Service-Level Agreements

Escalation matrix

Support Tools, Support Tiers, and Service-Level agreements Support Tools, Support Tiers, and Service-Level agreements

Handoffs in technical support

  • Help to resolve an issue
  • Encourage information sharing
  • Prevent incomplete documentation
  • Lead to faster resolution

Ticketing Systems

What are ticketing systems?

  • A support ticket records the interaction between a customer and a service representative
  • Documents issues and their progress/resolution
  • Ticket also called Issue, Case, Incident, etc.
  • Support tickets are managed by a ticketing system
  • These systems may also be called:
    • Helpdesk software
    • Customer support software
    • Ticketing software/app
    • Case Management System or Customer Care Management System

What is a ticketing system?

  • Software used to systematically document, track, manage, and resolve customer issues.
  • Creation of tickets
  • Central data hub

What a ticketing system provides

  • Automation
  • Collaboration
  • Integration
  • Channels
  • Reporting

Lifecycle of a ticket

  • Create a ticket
  • Assign and Start ticket issue
  • Resolve issue
  • Close ticket

Features and Benefits of Ticketing Systems

Common features

  • Omnichannel support
    • Email
    • Social media
    • Live chat
    • Phone
  • Ticket routing
  • Ticket categorization and tagging
    • Categorization
    • Tagging
    • Routing
    • Ticket status
  • Tracking and measurement
    • Tracking
    • Analytics
  • Knowledge base management
  • Automation
    • Helps get to the right person at the right time
    • Automation:
      • Assigning tickets
      • Sending responses
      • Escalate issues
      • Pulling customer data
    • Reduce time spent on repetitive tasks
    • Help make agents more engaged and productive

What to look for

  • Agent productivity
  • Customer interactions
  • Metrics
  • Continuous improvement
  • Collaboration

Types of ticketing systems

  • Cloud based
  • Self hosted
  • Open source
  • Enterprise

Cloud based systems

Benefits

  • Easier to set up and maintain
  • Scalable
  • Availability

Concerns

  • Vendor must resolve issues
  • Internet connection always required
  • Limited customization

Self-hosted systems

Benefits

  • Complete control of data and security
  • More customizable

Concerns

  • Initial investment
  • Server maintenance
  • Updates and fixes
  • Backups

Open-source systems

Benefits

  • Free or mostly free
  • Highly customizable
  • Developer community

Concerns

  • Knowledgeable developers
  • Long installation timeline
  • In house updating and maintenance

Enterprise systems

Benefits

  • Asset management and reporting
  • Support 24 hours a day
  • Highly customizable

Concerns

  • Expensive
  • Higher level of training
  • Zendesk
  • Jira Service Desk
  • Freshdesk
  • LiveAgent
  • ServiceNow

Common features

  • Omnichannel support
  • Automation
  • Collaboration
  • Knowledge Base
  • Subscription Based
  • Free trials

Zendesk

  • Cloud based
  • Pre-built Integrations
  • Collaboration
  • Knowledge base
  • Live chat/chatbots
  • Macros
  • Expensive

Jira Service Desk

  • Cloud or self-hosted
  • Built on Jira
  • Expandable
  • External knowledge base
  • Limited chat
  • Automation

Freshdesk

  • Cloud based
  • Custom ticket views
  • AI powered chatbots
  • Freshworks academy
  • Moderate pricing

LiveAgent

  • Cloud based
  • Emphasized live chat
  • Advanced integration
  • Chat widget
  • Unlimited email addresses
  • Moderate pricing

ServiceNow

  • Cloud based
  • ITSM Approach
  • Repeatable workflow
  • Advanced integration
  • Integrated mobile
  • Request quote

Troubleshooting

CompTIA troubleshooting model steps

  1. Identify the problem
  • Gather information
  • Question users
  • Identify symptoms
  • Determine if anything has changed
  • Duplicate the problem
  • Approach multiple problems individually
  1. Research the knowledge base/Internet
  • Knowledge base
  • Internet
  1. Establish a theory of probable cause
  • Question the obvious (Is the printer turned on?)
  • Consider more than one approach
  1. Test the theory to determine the cause
  • Are you successful?
  • More research and testing may be required
  1. Establish a plan of action
  • Some fixes may require reboots or downtime
  • May require downloading software or patches
  • Test in staging environment if available
  • Back up data
  • May require approval
  1. Implement the solution or escalate
  • Run scripts
  • Update systems or software
  • Update configuration files
  • Change firewall settings
  1. Verify full system functionality and implement preventive measures
  • Ask users to test functionality
  • Consider other servers or devices
  1. Document findings/lessons, actions, and outcomes
  • Full document your research, theories, changes, and updates
  • Add information to knowledge base
  • Useful if unintended consequences appear

Tech Support Methodologies and Frameworks

What is ITSM?

  • IT Service Management

  • Processes, activities, technologies, and people

  • Strategy for IT services

    Ticketing Systems Ticketing Systems

Implementing ITSM

  • Predefined frameworks
  • Guides with formalized structure
  • Standards, processes, and best practices

Popular ITSM frameworks have these features:

  • Strategy
  • Design
  • Management
  • Operation
  • Improvement

ITSM Frameworks

  • ITIL
  • COBIT
  • Lean IT
    • MOF
    • ISO/IEC 20000

ITIL

  • Information technology infrastructure library
  • Standardized set of detailed practices and processes
    • Service strategy
    • Service Design
    • Service Transition
    • Service Operation
    • Continual Service Improvement

COBIT and Lean IT frameworks

COBIT

  • For governance and management of IT
  • Uses processes contained in ITIL

Lean IT

  • Framework for applying lean principles to the delivery of IT services
  • Designed to cut out waste that doesn’t add value

MOF and ISO/IEC 20000 frameworks

Microsoft Operations Framework

  • Guidance for IT lifecycle
    • Plan phase
    • Deliver phase
    • Operate phase
    • Manage phase

ISO/IEC 20000

  • International standard for ITSM
  • Guidelines to establish, implement, operate and maintain

ITSM metrics

  • Customer Satisfaction (CSAT) scores
  • First-contact resolution
  • First-level resolution
  • Cost per ticket
  • Mean time to resolution

Benefits of ITSM processes

  • Consistency
  • Efficiency
  • Management
  • Risk and downtime
  • Operational costs
  • Standardization and accountability
  • Higher quality of service
  • Improved customer satisfaction
  • More agility

ITSM frameworks and technical support

  • People are part of ITSM
  • Processes based on service
  • Standards for managing IT services
  • IT solutions and knowledge
  • Technical support feedback

Effective Documentation and Communication

Communicating in technical support

  • Interest in technology
  • Ability to write clearly
  • Skills to Communicate

Effective communication

  • Informative communication
  • Clear explanations
  • Faster resolutions

Notes and communication

  • Notes
  • Word processing
  • Spreadsheets

Keep your audience in mind while taking notes or writing documentation and technical abilities and knowledge.

Order of steps

  • List what you have tried
  • State them chronologically
  • State them from most to least important
  • Use a clear order

Analysis of the problem

  • State what is or is not the problem
  • Show how you have worked through the problem
  • Include what led to the issue
  • Describe what worked in the past but did not this time

Communication tools

  • Keep it simple
  • Ask clear questions
  • Model others

Cheat sheet for Logging a Ticket

  • You noted the customer’s name and contact information.
  • You included the ticket or issue number and the date the ticket was created.
  • You documented the complete details of the problem or issue.
  • You noted the priority and urgency of the customer and the issue.
  • You logged the issue category, the department, and agent the issue is assigned to.
  • You included closing notes.

Subsections of Hardware and OS

Introduction to Computing Fundamentals

Introduction to Computing Fundamentals

  • The global IT spending on devices, including PCs, tablets, mobile phones, printers, as well as data center systems, enterprise software, and communication services came to 4.24 trillion USD in 2021.

  • It expected to increase by approximately 5.1 percent to around 4.45 trillion USD in 2022.

    A computer is a device or system that includes:

    Introduction to Computing Fundamentals Introduction to Computing Fundamentals

    Introduction to Computing Fundamentals Introduction to Computing Fundamentals

    Introduction to Computing Fundamentals Introduction to Computing Fundamentals

    Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Functions of computing

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Benefits of computing

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Common Computing Devices and Platforms

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Stationary computing devices

  • Remain on a desk, rack, or other stationary location.
  • Consist of a box or chassis.
  • Includes processors, storage, memory, input, and output connections.
  • Memory and storage, often updatable.

Workstations

  • Used at the office and at home.
  • Typically, in a hard box containing processors, memory, storage, slots.
  • Include connections for external devices and wireless connectivity.
  • Enable memory, storage, and graphic card upgrades.
  • Use Microsoft Windows, macOS, and Linux OSes.

Servers: functions

  • Installed on networks
  • Enabling shared access
    • Media storage – movies videos, sound
    • Web servers – websites
    • Print servers – print documents
    • File servers – files and documents
    • Email servers – email storage
  • Provide fault tolerance for businesses to keep working

Servers: hardware support

  • Motherboard providers hardware support for multiple:
    • Processors
    • Memory (RAM)
    • Graphic cards
    • Storage
    • Port connections

Servers: operating systems

Use operating systems that support distributed workloads:

  • Microsoft Windows Server
  • Linux
  • UNIX
  • Mac OS X
  • FreeBSD

Stationary devices: gaming consoles

  • Contain processors, memory, graphic processors (GPU), input ports, and output ports
  • Console include Microsoft Xbox, Sony PlayStation, and Nintendo
  • Hardware features enhanced memory caching and graphics processing
  • Required additional hardware devices such as wired or cabled handheld devices
  • Usually not upgradable

Mobile devices

  • Laptop processing power matches desktop performance
  • Tablets have both business and personal uses
  • Smartphones are a hub for life management
  • Portable and Wi-Fi enabled gaming systems abound
  • Transforming both business and personal life

IoT devices

  • Contain chips, sensors, input and output capabilities, and onboard software.

  • Enable the exchange of data with other devices and systems.

  • Communicate via Wi-Fi, Bluetooth, NFC, Zigbee, and other protocols.

  • Software updatable, but generally no hardware upgrades.

    Introduction to Computing Fundamentals Introduction to Computing Fundamentals

IoT devices: categorized

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Understanding How Computers Talk

Notational systems defined

A system of symbols that represent types of numbers.

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Notational systems – decimal

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Notational systems – binary

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Convert to decimal to binary

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Convert binary to decimal

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Notational Systems – hexadecimal

  • Uses 16 digits, referred to as base 16, including the numbers 0 through 9, and the letters A through F.

  • Enables compact notation for large numbers

  • Used for MAC addresses, colors, IP addresses, and memory addresses

    Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Convert hex to binary

  1. Note the hex number, and represent each hex digit by its binary equivalent number.
  2. Add insignificant zeros if the binary number has less than 4 digits. For example, write the decimal 10 as 0010.
  3. String (concatenate) all the binary digits together from left to right.
  4. Discard any leading zeros at the left of the concatenated number.

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

The result is 100100011010.

Data Types

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Character Types

ASCII

American Standard Code for Information Interchange:

  • Developed from telegraph code and first published in 1963.
  • Translates computer text to human text.
  • Originally a 7-byte system (to save on transmission costs) representing 128 binary character.
  • Expanded to 8-bytes representing another 256 characters.
  • Full charts are available online.

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Unicode

Unicode includes ASCII and other characters from languages around the world, as well as emojis.

  • Web pages use UTF-8.
  • Popular programming languages use Unicode 16-bit encoding and a few use 32-bit.
  • Commonly formatted as U+hhhh, known as “code points”, where hhhh is character hexadecimal value.
  • Conversion services are available online.

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

An Introduction to Operating Systems

Operating system basics

Operating systems consist of standardized code for:

Input>Output>Processing>Storage

  • CLI
  • GUI

Operating system history

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

The first generation (1945-1955)

  • Operating systems that worked for multiple computers didn’t yet exist.
  • All input, output, processing, and storage instructions were coded every time, for every task.
  • This repetitive code became the basis for future operating systems.

The second generation (1955-1965)

  • Mainframe computers became available for commercial and scientific use.
  • Tape drives provided input and output storage.
  • In 1956, GM Research produced the first single-stream batch operating system for its IBM 704 computing system.
  • IBM became the first company to create OSes to accompany computers.
  • Embedded operating systems were developed in the early 1960s and are still in use.
    • Focus on a single task.
    • Provide split-second response times.
    • Real-time operating systems are a type of embedded operating system used in airplanes and air traffic control, space exploration.
    • As the time passed, real-time OSes started being used in satellite systems, Robotics, Cars/automobiles.

The third generation (1965-1980)

  • Additional companies began creating their own batch file operating systems for their large computing needs.
  • Network operating systems were developed during this time.
    • Provide scalable, fast, accurate, and secure network communications.
    • Enables workstations to operate independently.
  • In 1969, the UNIX operating system, operable on multiple computer systems, featured processor time-sharing.

The fourth generation (1980 to now)

  • Multitasking operating systems enable computers to perform multiple tasks at the same time.
    • Linux
      • 1991: Linus Torvalds created a small, open source PC operating system.
      • 1994: Version 1.0 released.
      • 1996: Version 2.0 released, included support for network-based SMP benefitting commercial and scientific data processing.
      • 2013: Google’s Linux-based mobile operating system, Android, took 75% of the mobile operating system market share.
      • 2018: IBM acquired Red Hat for $34 billion.
    • macOS
      • 1999: OS X and macOS, based on UNIX, offered with PowerPC with PowerPC-based Macs.
      • 2006: Apple began selling Macs using Intel Core processors.
      • 2020: Apple began the Apple Silicon chip transition, using self-designed 64-bit, ARM-based Apple M1 processors on new Mac computers.
    • Windows
      • 1981: MS-DOS launched
      • 1985: Launched a graphical user interface version of the Windows operating system.
      • 1995: Windows 95 catapulted Microsoft’s dominance in the consumer operating system software market.
      • Today, Microsoft holds about 70% of consumer desktop operating system market share.
      • Microsoft also offers network, server management, mobile, and phone operating systems.
    • ChromeOS
      • 2011: Launched ChromeOS, built atop Linux.
      • Offers a lightweight operating system built for mobile devices.
      • Requires less local storage and costs less.
      • Currently composes about 10% of the laptop market.
  • Mobile operating systems also fit the definition of multitasking operating systems.
    • Android
    • iOS
    • Windows
    • ChromeOS

Getting Started with Microsoft Windows

Logging into Windows

Four methods of logging into Windows

  • PIN
  • Password
  • Photo
  • Fingerprint

Using Keyboard Shortcuts

Introduction to Computing Fundamentals Introduction to Computing Fundamentals

Computing Devices and Peripherals

Identifying Hardware Components and Peripherals

What is a computer component?

  • A physical part needed for computer functioning, also called “hardware”.
  • Each component performs a specific task.
  • Components can be internal or external.
  • External components connect via ports and connectors.
  • Without a given component, such as a CPU, a computer system cannot function as desired.

Common internal components

A part inside a computing device:

  • RAM
  • Hard Drive
  • CPU

Peripherals

  • Connect to the computer to transfer data.
  • External devices easily removed and connected to a computer.
  • Connections vary
  • Examples: Mouse, Printer, and a Keyboard etc.

Categories of peripherals

  • Input – send commands to the computer
  • Output – receive commands from the computer
  • Storage – save files indefinitely

Connectors for Components

  • A connector is the unique end of a plug, jack, or the edge of a card that connects to a port.
  • For example, all desktop computer expansion cards have an internal connector that allows them to connect to a slot on the motherboard.
  • A Universal Serial Bus (USB) connector at the end of a cable is an example of an external connector.

Ports

  • A connector plugs into an opening on a computer called a port.
  • A port is the jack or receptacle for a peripheral device to plug into.
  • Ports are standardized for each purpose.
  • Common ports include USB ports and HDMI ports.

Input and Pointing Devices

Input Devices

  • Keyboards
  • Mouse
  • Camera
  • Joystick
  • Trackball

Pointing Devices

  • The stylus (Pen)
    • Input tool
    • Moves the cursor and sends commands
    • Generally used on tablets
    • Uses capacitive technology
    • Detects heat and pressure

Hard Drives

Hard drives:

  • are a repository for images, video, audio, and text.
  • RAM
  • ROM
  • HDD/SSD/NVMe

Hard drive performance

Measurement benchmarks

  • Spin speed: how fast the platter spins.
  • Access time: how fast the data is retrieved.
  • Transfer/media rate: how fast the data is written to the drive.

Connecting an internal hard drive

  • Back up data
  • transfer the enclosure
  • Secure with screws
  • prevent movement
  • attach to motherboard via SATA/PATA cables
  • plug into power supply
  • finally, it can be configured in the disk management utility of windows

Optical Drives and External Storage

Optical drives

Reading and writing data

  • Laser pressing or “burning”

  • Burning pits on lands

  • Reflective disk surface

    Storage disks

  • Single-sided

  • Double-side

Types of optical drive

Several types

  • CD-ROM
  • CD-RW
  • DVD-ROM
  • DVD-RW
  • Blu-ray

Solid state drives

Solid state drive → (SSD)

  • Integrated circuit assemblies store data
  • Flash memory
  • Permanent, secondary storage
  • AKA “solid state drive” or “solid state disk”
  • No moving parts
    • Unlike hard disk drives and floppy drives

External hard drive

  • File backup and transfer
  • Capacity: 250 GB to 20 TB
    • Several file types
    • USB or eSATA connection
      • eSATA – signal, not power

Expansion devices

  • Additional file storage
  • Usually, USB
  • Frees hard drive space
  • Automatically recognized
  • Known as a “Thumb drive”
  • Holds up to 2 TB of data

Flash Drives

  • Combines a USB interface and Flash memory
  • Highly portable
  • Weighs less than an ounce
  • Storage has risen as prices have dropped
  • Available capacity up to 2 TB

Memory card

  • Uses Flash memory to store data
  • Found in portable devices such as portable media players and smartphones
  • Contained inside a device
    • Unlike USB drives
  • Available in both Secure Digital (SD) and Micro Secure Digital (MSD) formats

Display Devices

Defining display devices:

  • Hardware component for the output of information in visual form
  • Tactile monitors present information in a fingertip-readable format
  • Often seen as television sets and computer monitors

Cathode ray tube (CRT) monitors

  • Create an image by directing electrons beams over phosphor dots
  • Used in monitors throughout the mid to late 1990s
  • By 1990, they boasted 800 × 600 pixel resolution

Flat-screen monitors

  • Also known as liquid crystal display (LCD)/ Think film transistor (TFT)
  • Digital signal drives color value of each picture element (Pixel)
  • Replaced CRT monitors

Touchscreens

  • Use a touch panel on an electronic display
  • Capacitive technology measures heat and pressure
  • Often found on smartphones, laptops, and tablets

Projectors

  • Take images from a computer and display them
  • the surface projected onto is large, flat, and lightly colored
  • Projected images can be still or animated

Printers and Scanners

Output devices

“Hardware that shows data in readable form.”

That data can take many forms:

  • Scanner and speech synthesizer
  • Unnecessary (though highly useful) for computer function

Printers

  • Laser/LED
  • Inkjet
  • Thermal

Shared printers

  • IP-based
  • Web-based

Scanners

  • Converts images from analog to digital
  • Flatbed (stand alone) or multifunction device

Faxes and multifunction devices

  • Facsimile (fax) machines send documents using landlines
  • Multifunction devices often include fax capabilities

Audio Visual Devices

Defining audio devices

  • Digital data is converted into an audible format
  • Components are used to reproduce, record, or process sound
  • Examples include microphones, CD players amplifiers, mixing consoles, effects units, and speakers

Defining visual devices

  • Present images electronically on-screen
  • Typically, greater than 4" diagonally
  • Examples include smartphones, monitors, and laptop computers

Interfaces and Connectors

Identifying Ports and Connectors

  • Ports enable devices to connect to computers

  • Connectors plug into ports

  • Each port has a unique function and accepts only specific connectors

    Interfaces and Connectors Interfaces and Connectors

Interfaces

  • Point of communication between two or more entities

  • Can be hardware or software based

    Interfaces and Connectors Interfaces and Connectors

    Common Interfaces are:

    • USB

    Interfaces and Connectors Interfaces and Connectors

    • USB connectors

    Interfaces and Connectors Interfaces and Connectors

Thunderbolt

  • Combines data transfer, display, and power

  • Initial versions reused Mini DisplayPort

  • New versions reuse USB-C connectors

  • Identified with a thunderbolt symbol

    Interfaces and Connectors Interfaces and Connectors

FireWire

  • Predecessor to Thunderbolt

    • FireWire 400 = 400 mBits/second
    • FireWire 800 = 800 mBits/second
    • Uses a serial bus to transfer data on e bit at a time
    • Still used for audio/video connections on older computers (before 2011), and in the automobile and aerospace industries

    Interfaces and Connectors Interfaces and Connectors

PS/2

  • Developed for IBM PS/2

  • Connects keyboard and mice

  • Ports are device specific

    • Green for mice
    • Purple for keyboard
  • Considered a legacy port

    Interfaces and Connectors Interfaces and Connectors

eSATA

  • Standard port for connecting external storage devices
  • Allows hot swapping of devices
  • Since 2008, Upgraded eSATAp that supports both eSATA and USB on the same port
  • eSATA revisions:
    • Revision 1: Speeds of 1.5 Gbps

    • Revision 2: Speeds of 3 Gbps

    • Revision 3: Speeds of 6 Gbps

      Interfaces and Connectors Interfaces and Connectors

Identifying Graphic Devices

Display Unit

  • Display unit (GPU) connected to the computer via a display card or adapter
  • Low-end generic graphic cards come built into the computer
  • Require specialized adapters for high-end functions
  • ATI/AMD, nVIDIA, SiS, Intel, and Via are leading manufacturers

Display System

Interfaces and Connectors Interfaces and Connectors

VGA Display System

Interfaces and Connectors Interfaces and Connectors

LED Display System

Interfaces and Connectors Interfaces and Connectors

Display Connectors

  • Different cables and connectors for different display adapters

  • Each connector has specific function and benefits

    Interfaces and Connectors Interfaces and Connectors

HDMI Interface

  • Most widely used digital audio and video interface
  • Also offers remote control and content protection
  • Uses a proprietary 19-pin connector
  • Offers up to 8K UHD resolutions

DisplayPort

  • Royalty-free complement to HDMI
  • First interface to use packetized data transmission
  • Uses a 20-pin connector
  • Can support even different transmission modes of increasing bandwidth

Thunderbolt

  • Developed by Intel and Apple, primarily for Apple laptops and computers
  • Can be used as either a display or peripheral interface
  • Initial versions used the MiniDP interface
  • Version 3 and now version 4 use the USB-C interface
  • Thunderbolt features don’t work with a standard USB-C cable and port

Digital Visual Interface (DVI)

  • Designed as a high-quality interface for flat-paneled devices

  • Support both analog and digital devices

    • DVI-I supports both analog and digital
    • DVI-A supports only analog
    • DVI-D supports only digital
  • Single-link for lower resolutions and Dual-link for HDTV

  • Superseded by HDMI and Thunderbolt

    Interfaces and Connectors Interfaces and Connectors

Video Graphics Array (VGA)

  • A legacy interface, used for analog video on PC
  • Has a 15-pin connector that can be secured with screws

Identifying Audio Connectors

The audio connection

  • Onboard or internal expansion

  • Has multiple ports to connect a variety of devices

  • Used for multimedia application, education and entertainment, presentation, and teleconferencing

    Interfaces and Connectors Interfaces and Connectors

Audio connectors

  • Sound cards
  • Bluetooth
  • Game ports/USB ports
  • External audio interfaces

External audio interfaces

  • Single device for multiple input and output ports
  • Mostly used in professional studies
  • Use USB, FireWire, Thunderbolt, or similar connectors

Wired and Wireless Connections

Data packets

  • Communication technology allows components to communicate over a network
  • Data packets are sent from one smart object to another
    • Information about the sending and receiving device, along with the message
  • Devices built to talk over a network can communicate with each other

Network types

  • Closed (limited number of devices can connect)
  • Open (unlimited number of devices can connect)
  • Either could be wired or wireless

Wired connectors

Interfaces and Connectors Interfaces and Connectors

Wire connection benefits

  • Faster data transmission
    • Up to 5 Gbps
  • More reliable than wireless
    • Immune to signal drops and dead zones
  • Less prone to radio interference
  • More secure
    • Less likely to be hacked

Wireless connections

  • Use different technologies based on connection requirements
  • Wireless Fidelity (Wi-Fi)
    • Connects a router to a modem for network access
  • Bluetooth
    • 1998
    • Pairing
  • Radio-frequency identification (RFID)
    • Identification and tracks objects using tags
    • Range up to several hundred meters
    • Collection of road tolls
    • Other uses of RFID tags
      • Livestock tracking, tacking pharmaceuticals through warehouses, preventing theft, and expediting checkout in stores
  • NFC (Near Field Communication)
    • Based on RFID
    • Extremely short range
    • Transmits data through electromagnetic radio fields

Wireless connection advantages

  • Increased mobility
  • Reduced time to set up
  • Flexibility and scalability
  • Wider reach
  • Lower cost of ownership

Peripherals and Printer Connections

Common installation steps

Computers require software that enables peripheral or printer device recognition and communication using:

  • Onboard Plug and Play software
  • Device driver software
  • Device application software Initial stand-alone, peripheral installation often still requires a wired connection or network connection
  1. Connect the printer to the computer using a cable
  2. Turn on the printer Frequently used stand-alone peripherals are:
  • USB
  • Bluetooth
  • Wi-Fi
  • NFC Three other connection methods are:
  • Serial port
  • Parallel port
  • Network

Serial cable connections

  • Are less common

  • Transmit data more slowly

  • RS232 protocol remains in use

    • Data can travel longer distances
    • Better noise immunity
    • Compatibility among manufacturers
  • Cables commonly feature 9-pin connections and two screws to secure the cable

    Interfaces and Connectors Interfaces and Connectors

Parallel port cable connection

  • Are less common

  • Send and receive multiple bits of data simultaneously

  • Feature 25-pin connections

  • Include two screws to keep the cable connected

    Interfaces and Connectors Interfaces and Connectors

Network connections

  • Generally, are Wi-Fi or wired Ethernet connections
  • Before you begin, verify that your computer has a network connection

Connecting to local printers

Interfaces and Connectors Interfaces and Connectors

Installation Types

  1. Plug and Play
  2. Driver Installation

PnP vs. driver installation

  • PnP devices work as soon as they’re connected to a computer
  • Examples include mice and keyboards
  • A malfunctioning device should be investigated in Device Manager.
    • Possible cause of malfunction is an outdated driver

IP-based peripherals

  • Hardware connected to a TCP/IP network
  • Examples of such devices include wireless routers and security cameras
  • These devices must be connected to a local area network (LAN) or the Internet to function

Web-based configuration

  • Different from installation
  • Used for networking devices such as routers
  • Is an easier process to set up a device
  • Completed on a web page
    • Often on the manufacturer’s site

Internal Computer Components

Internal Computer Components

Motherboard

  • Main printed circuit board (PCB) in computers
  • Contains significant subsystems
  • Allows communication among many of the crucial internal electronic components
  • Enables communications and power distribution for peripherals and other components

Chip sets

  • A set of electronic components in an integrated circuit
  • Manage data flow
  • Have two distinct parts: the northbridge and the southbridge
  • Manage communications between the CPU and other parts of the motherboard

Chip sets: Northbridge and southbridge

  • Northbridge – the first half of the core logic chip set on a motherboard
    • Directly connected to the CPU
    • Responsible for tasks that require the highest performance
  • Southbridge – the second half of the core logic chip set
    • Implements slower-performance tasks
    • Not directly connected to the CPU

What is a bus?

  • A high-speed internal connection on a motherboard
  • Used to send control signals and data internally
  • The front-side bus carries data between the CPU and the memory controller hub (northbridge)

Sockets

“Components not directly attached to a motherboard connect via sockets”

  • Array of pins holding a processor and connecting the processor to the motherboard

  • Differ based on the motherboard

    Internal Computer Components Internal Computer Components

Power connectors

  • Found on a motherboard
  • Allow an electrical current to provide power to a device
  • ATX-style power connectors are larger than most
  • Join the power supply to the motherboard

Data Processing and Storage

Central Processing Unit (CPU)

  • Silicon chip in a special socket on the motherboard
    • Billions of microscopic transistors
    • Makes calculations to run programs
    • 32-bit is like a two-lane information highway
    • 64-bit is like a four-lane information highway

Memory (RAM)

  • Typically used to store working data
  • Volatile: Data existing in RAM is lost when power is terminated
  • Is cold pluggable (cold swappable)
  • Speed measured in Megahertz (MHz)
  • Available in varying speeds
  • Available in varying storage capacities

Types of Memory

  • Choice depends on the motherboard
    • Dynamic Random-Access Memory (DRAM)
    • Synchronous Dynamic Random-Access Memory (SDRAM)
    • Double Data Rate Synchronous Dynamic Random-Access Memory (DDR-SDRAM)
    • Double Data Rate 3 Synchronous Dynamic Access Memory (DDR3 and DDR4)
    • Small outline Dual Input Memory Module (SO-DIMM)

Memory Slots

  • Hold RAM chips on the motherboard
  • Allow the system to use RAM by enabling the motherboard to communicate with memory
  • Most motherboards include two to four memory slots
  • Type determines which RAM is compatible

Expansion Slots

  • Use PCI or PCIe slots

  • Add additional capabilities

    • Peripherals (such as sound cards)
    • Memory
    • High-end graphics
    • Network interfaces
  • Availability depends on the motherboard configuration

    Internal Computer Components Internal Computer Components

Disk Controllers

  • Circuit that enables the CPU to communicate with hard disk drive
  • Interface between the hard disk drive and the bus
  • Integrated Drive Electronics is a standard
  • IDE controller-circuit board guides how the hard disk drive manages data
  • Have memory that boosts hard drive performance

BIOS (Basic Input Output System)

  • Manages your computer’s exchange of inputs and outputs
  • Preprogrammed into the motherboard
  • Needs to always operate
  • Update in a flash
  • Use the System Summary window

CMOS: Battery and chip

  • Uses a coin-sized battery
  • Is attached to the motherboard
  • Powers the memory chip that stores hardware settings
  • Replace the computer’s system data, time, and hardware settings

Internal Storage

Hard drive characteristics

Introduced by IBM in 1956, internal hard drives provide: - Stable, long-term data storage - Fast access time - Fast data transfer rates

Traditional hard drive technology

Internal Computer Components Internal Computer Components

Internal Computer Components Internal Computer Components

IDE and PATA drives

1980s to 2003:

  • Integrated Drive Electronics (IDE) hard drives and Parallel Advanced Technology Attachment (PATA) drives were popular industry standard storage options
    • Early ATA drives: 33 Mbps

    • Later ATA drives: 133 Mbps

      Internal Computer Components Internal Computer Components

SATA drives

2003 to today:

  • Serial advanced technology attachment drives (SATA) became an industry standard technology

  • Communicate using a serial cable and bus

  • Initial data processing of 1.5 Gbps

  • Current processing of 6 Gbps

    Internal Computer Components Internal Computer Components

  • Available in multiple sizes

  • Spin at 5400 or 7200 rpm

  • Capacity: 250 GB to over 30 TB

  • Still dominate today’s desktop and laptop market

  • Each SATA port supports a single drive

  • Most desktop motherboards have at least four SATA ports

SCSI drives

1986:

  • Small computer system interface, pronounced “scuzzy” (SCSI) drives

  • Historical speeds: 10,000 or 15,000 rpm

    1994:

  • Discontinued usage

    Internal Computer Components Internal Computer Components

Solid-state drives

1989:

  • Solid-state drives (SSDs) came to market

  • Consist of nonvolatile flash memory

  • Provide faster speeds: 10 to 12 Gbps

  • Capacity: 120 GB to 2 TB

  • Cost: More expensive than SATA or SCSI drives but also more reliable

    Internal Computer Components Internal Computer Components

  • Available as internal, external, and hybrid hard drives

  • As part of an internal hybrid configuration:

    • SSD serves as a cache
    • SATA drive functions as storage
    • Hybrid drives tend to operate slower than SSD drives

    Internal Computer Components Internal Computer Components

Optical Drives

1992:

  • Invented in the 1960s, but came to the market in 1992.
  • CDs and DVDs provide nonvolatile storage.
  • Optical drives use low-power laser beams to retrieve and write data.
  • Data is stored in tiny pits arranged in a spiral track on the disc’s surface.

CDs and DVDs compared

Internal Computer Components Internal Computer Components

Blu-ray discs

  • Media specific for movies and video games

  • Provide high resolution

  • Single-sided, but with up to four layers

  • Store 25 GB per layer

  • Writable Blu-ray discs exist in 100 GB and quad-layer 128 GB formats

  • Writable Blu-ray discs require BD-XL-compatible drives

    Internal Computer Components Internal Computer Components

Expansion Slots

  • Locations on the motherboard where you can add additional capabilities, including hard drive storage

Display Cards and Sound Cards

Video card

  • An expansion card installed in an empty slot on the motherboard
  • Or a chip built into a system’s motherboard
  • Allows the computer to send graphical information to a video display device
  • Also known as a display adapter, graphics card, video adapter, video board, or video controller

Graphics processing unit (GPU)

  • Specialized processor originally designed to accelerate graphics rendering
  • Process many pieces of data simultaneously
  • Machine learning, video editing, and gaming applications
  • Several industries rely on their power processing capabilities

Audio card

  • Also known as a sound card
  • Integrated circuit that generates an audio signal and send it to a computer’s speakers
  • Can accept an analog sound and convert it to digital data
  • Usually built into PC motherboard
  • Users desiring higher-quality audio can buy a dedicated circuit board

MIDI controller

  • A simple way to sequence music and play virtual instruments and play virtual instruments on your PC
  • Works by sending musical instrument digital interface (MIDI) data to a computer or synthesizer
  • Interprets the signal and produces a sound
  • Frequently used by musicians

Network Interface Cards

  • A hardware component without which a computer cannot connect to a network
  • A circuit board that provides a dedicated network connection to the computer
  • Receives network signals and translates network signals and translates them into data that the computer displays

Types of NIC

  • Provides a connection to a network
    • Usually, the Internet
  • Onboard: built into motherboard
  • Add-on: fit into expansion slot
  • No significant difference in speed or quality

Wired and wireless network cards

  • Wireless – use an antenna to communicate through radio frequency waves on a Wi-Fi connection
  • Wired-use an input jack and a wired LAN technology, such as fast Ethernet

Modems

  • Connects your system to the Internet.
  • Translates ISP signals into a digital format.
  • Then feeds those digitized signals to your router, so you can connect to a network.

Cooling and Fans

System cooling

  • Computers generate heat
  • Excessive heat can damage internal components
  • Never operate a computer w/out proper cooling
  • Designed to dissipate heat produced by the processor
  • Allow the accumulated heat energy to flow away from vital internal parts

Cooling methods

  • Passive
  • Active
    • Fans draw cool air through front vents and expel warm air through the back
  • Forced convection
  • Using thermal paste and a baseplate

Cooling methods – heat sink

  • Heat sink

  • Use heat sink compound to fill gaps

  • Place the heat sink over the CPU

  • Excess heat is drawn away

  • Before warm air can damage the internal components

    Internal Computer Components Internal Computer Components

Liquid-based cooling

  • Quieter and more efficient than fans
  • Water blocks rest atop the chip
    • Cool liquid in the blocks cool the chip
  • Heated fluid is pumped to a radiator-cooled by fans.
    • That fluid goes back to the water block to repeat the cycle.

Workstation Setup Evaluation and Troubleshooting

Managing File and Folders

Rules for naming files and folders

  • Name so the file or folder you want is easy to find
  • Make names short but descriptive
  • Use 25 characters or fewer
  • Avoid using special characters
  • Use capitals and underscores
  • Consider using a date format

Introduction to Workstation Evaluation, Setup, and Troubleshooting

Screen Capture and Tools

Screen capture on macOS

Saves screenshots on the desktop.

  • Command + shift +3
    • Capture entire screen
  • Command + shift +4
    • Capture part of the screen
  • Command + shift +5
    • Capture as photo/video

Screen captures on Windows

Saves screenshots to the screenshot folder.

  • Windows + PrintSc
    • Capture entire screen
  • Alt + PrintSc
    • Capture active window
  • Windows + Shift + S (Opens up snip and sketch tool)
    • Entire screen
    • Part of the screen
    • Active window

Screen captures on a Chromebook

Saves screenshots to Downlaods or Google Drive.

  • Ctrl + Show Windows
    • Capture entire screen
  • CTRL + shift + show windows
    • Capture part of the screen

Evaluating Computing Performance and Storage

Assessing processor performance

  • The processor’s speed
  • The number of cores
  • The bus types and speeds
    • Located on the processor’s perimeter
    • The data highway wiring from the processor to other board components
  • The presence of cache or other onboard memory

Bus types

Historically, three bus types:

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Bus alternatives

Replacement technologies include:

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

And others.

Cache

  • Consist of processor platform memory that buffers information and speeds tasks
  • Can help offset slower processor speeds

Storage

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

RAM error symptoms

  • Screen or computer freezes or stops working
  • Computer runs more slowly
  • Browser tabs error or other error messages display
  • Out-of-memory or other error messages display
  • Files become corrupt
  • Computer beeps
  • A “blue screen” with an error message displays

Workstation Evaluation and Setup

Identifying user needs

Environment: Where does the use work?

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

What are the user’s workspace conditions?

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Network access: What are the user’s options?

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Data storage requirements:

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Application requirements:

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Evaluating peripheral needs

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Suggested computing solutions

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Evaluating computing options

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Purchasing decisions

Four important considerations:

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Workstation setup

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Environment

  • Is a desk present or needed? If so, is the desk safe and sturdy?
  • Is a chair present? If so, is the chair safe and sturdy?
  • Is lighting present?
  • Are electrical outlets present, of appropriate amperage and grounded?
  • Can the use physically secure the computer?

Unboxing

  • Read and follow the manufacturer’s practices for workstation setup
  • Move boxes and packing materials into a safe location, out of the user’s workspace

Cable management

Reduce service calls with three practices

  • Install shorter cable lengths where possible
  • Securely attach and identify each cable
  • Collect and tie the cables together

Electrical

Safety for you and your user:

  • Label each electric cable.
  • Verify that electrical connections are away from the user and are accessible.
  • Connect power supplies to their assigned wall or power strip location. Note the wall outlet number.

Ergonomics

Can the user work comfortably?

  • Feet are on the floor.
  • Monitor at or just below eye height.
  • Arms are parallel with the keyboard, table, and chair.
  • Shoulders are relaxed and not hunched.
  • The environment provides enough light to see the display and keyboard.
  • Cords and cables are out of the way.

Workstation setup

  • Power on the workstation and peripherals
  • Setup the operating system and options for the user:
    • User logon credentials
    • Keyboard options
    • Monitor resolution
    • Printer connections
    • Sound options
    • Security options
    • Network connections
  • Select the user’s default browser
  • Uninstall bloatware or unnecessary software
  • Install and configure additional productivity software
  • Modify the desktop Productivity pane
  • Setup backup options

Introduction to Troubleshooting

3 Basic Computer Support Concepts

  • Determining the problem
    • Ask questions
    • Reproduce the problem
    • Address individual problems separately
    • Collect information
  • Examining the problem
    • Consider simple explanations
    • Consider all possible causes
    • Test your theory
    • Escalate if needed
  • Solving the problem
    • Create your plan
    • Document the process beforehand
    • Carry out the solution
    • Record each step
    • Confirm the system is operational
    • Update your documentation

Troubleshooting

“Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with computers.”

Troubleshooting steps

  1. Gathering information
  2. Duplicating the problem
  3. Triaging the problem
  4. Identifying symptoms
  5. Researching an online knowledge base
  6. Establishing a plan of action
  7. Evaluating a theory and solutions
  8. Implementing the solution
  9. Verifying system functionality

Restoring Functionality

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Common PC issues

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Internet Support

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Manufacturer Technical Support

  • Before contacting support:
    • Have all documentation
    • Be prepared to provide:
      • Name of the hardware/software
      • Device model and serial number
      • Date of purchase
      • Explanation of the problem

CompTIA troubleshooting model

The industry standard troubleshooting model comes from The Computing Technology Industry Association (CompTIA)

CompTIA model steps

  1. Identify the problem
  2. Gather information
  3. Duplicate the problem
  4. Question users
  5. Identify symptoms
  6. Determine if anything has changed
  7. Approach multiple problems individually
  8. Research knowledge base/Internet
  9. Establish a theory of probable cause
  10. Question the obvious
  11. Consider multiple approaches
  12. Divide and conquer
  13. Test the theory to determine the cause
  14. Establish a plan of action
  15. Implement the solution or escalate
  16. Verify fully system functionality and implement preventive measures
  17. Document findings/lessons, actions, and outcomes

Advanced Microsoft Windows 10 Management and Utilities

Policy management

  • Applies rules for passwords, retries, allowed programs, and other settings
  • Type “group policy” in the taskbar search box
  • View Edit group policy and click open
  • Select the User Configuration settings to view its details and edit policy settings

Process management

  • Schedules processes and allocates resources
  • Task manager

Memory management

Windows uses:

  • RAM for frequent memory tasks

  • Virtual memory for less-frequent tasks

    When you notice that:

  • Performance is slow

  • You see errors that report “low on virtual memory”

Service management

  • Automatically manages background tasks and enables advanced troubleshooting of performance issues.
  • Capabilities include:
    • Stopping services
    • Restarting services
    • Running a program
    • Taking no action
    • Restarting the computer

Driver configuration

Drivers are the software components that enable communications between the operating system and the device

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Utilities

Utilities help you administer and manage the operating system:

Workstation Setup and Evaluation and Troubleshooting Workstation Setup and Evaluation and Troubleshooting

Introduction to Business Continuity Principles

Business continuity

  • Risk management strategies minimize productivity issues
  • Business continuity is having a plan to deal with disruptions
  • Necessary for all businesses to remain operational under any circumstances

Fault tolerance

  • Ability of a system to continue operating when one or more components fail
  • Anticipates disruptions and develops contingency plans
  • Design systems without single points of failure

Redundancy

  • Minimizes the effects of system outages
  • System redundancy strengthens existing fault tolerance levels
  • Network redundancy seeks to prevent system outages
  • Hardware redundancy serves as a solution to a server outage
  • Additional capacity of a computer network above what is needed
  • Safety net for the almost inevitable system or component failure
  • Backup system at the ready
  • 5 types of redundancy

Data redundancy

  • First type of redundancy
  • When the same piece of data exists in multiple places
  • Might cause data inconsistency
  • Multiple versions of the same file on a network
  • Real-time syncing of data across all backups to ensure consistency

RAID redundancy

  • Redundant array of independent disks (RAID)
  • RAID 0: Allows a storage system to tolerate individual disk unit failures
  • RAID 1: Exact copy (mirror) of a set of data on two or more disks
  • RAID 5: Minimum of three hard disk drives (HDDs) and no maximum

Network redundancy

  • Process of adding additional network devices and lines of communication
  • Features include:
    • Multiple adapter cards and/or ports for individual hosts
    • Load balancing to distribute traffic across multiple servers
    • Multiple network paths
    • Routers can detect issues and reroute data

Site redundancy

  • Ability to lose an entire site without losing signaling or application state data
  • Guards against total loss of operations
  • Employs the process of replication to synchronize data among multiple sites
  • Ensures data access

Power redundancy

  • Two independent power sources
  • Eliminates potential downtime from the loss of the primary power source
  • An uninterruptible power supply (UPS) adds another layer of protection against system downtime
  • UPS is less expensive than a backup power generator

Backup requirements

  • Create a copy of data from which a business can restore when the primary copy is damaged or unavailable
  • Have a specific and sequential strategy for backups
  • Identify key backup concerns
  • Select appropriate backup types

Backup methods

  • Full – Copies all files
  • Incremental – Copies only those files that have been altered since the last full backup
  • Differential – Saves only the difference in the data since the last full backup
  • Daily – keeps a backup of just those files that have been modified the same day the backup is done

Backup storage devices

  • Used to make copies of data that is actively in use
  • Provide redundancy of data residing on primary storage (usually a hard disk drive)
  • Examples: USB drive, external hard drive, LAN, and tape

Backup considerations

  • Costs:
    • Can include hardware, software, maintenance agreement, and training
  • Location:
    • Backup to the cloud
    • Consider keeping a data copy in an additional location
  • Requirements of each backup approach

Disaster recovery plan

  • Organization’s strategy for restoring functionality to its IT infrastructure
  • Explains the actions to be taken before, during, and after a disaster
  • Strategies for specific scenarios
  • Method depends on needs and resources

Subsections of Software, Programming, and Databases

Computing Platforms and Software Application

A computing platform is the environment where the hardware and the software work together to run applications.

  • Hardware is the type of computer or device, such as a desktop computer, a laptop, or a smartphone.
  • Software refers to the type of operating system (OS), such as Windows, macOS, iOS, Android and Linux, and the programs and applications that run on the OS.

Types of computing platforms

Desktop platform

Includes personal computers and laptops that run operating system like Windows, macOS, and Linux.

Web-based platform

Includes modern browsers like Firefox, and Chrome that function the same in various operating system, regardless of the hardware.

Mobile platform

Includes devices like Pixel and the iPhone that run operating systems like Android OS and iOS.

Single-platform vs. cross-platform

Computing Platforms and Software Application Computing Platforms and Software Application

Compatibility concerns

  • Cross-platform software acts differently or may have limited usability across devices and platforms.
  • Software is created by different developers, and programs may interpret the code differently in each application.
  • Functionality and results differ across platforms, which might mean undesired results or a difference in appearance.

Commercial and Open Source Software

Commercial Software

  • Commercial Proprietary Closed source
    • Copyrighted software, which is identified in the End User License Agreement (EULA).
    • Private source code, which users are not allowed to copy, modify, or redistribute.
    • Developed for commercial profit and can include open source code bundled with private source code.
    • Commercial software usually requires a product key or serial number to certify that software is original.
    • Some commercial software is free, but upgrades and updates may cost extra, or the software contains ads.
    • Examples: Microsoft Office, Adobe Photoshop, and Intuit QuickBooks.

Open source software

  • Open source: Free and open source (FOSS)
    • Free software, which can be downloaded, installed, and used without limits or restrictions
    • Free source code, which can be freely copied, modified, and redistributed.
    • Open access to the software functions and software code without cost or restrictions.
    • Developers and users can contribute to the source code to improve the software.
    • Open source software requires users to agree to an End User License Agreement (EULA) to use the software.
    • Examples: Linux, Mozilla Firefox, and Apache OpenOffice.

Software Licenses

What is a software license?

A software license states the terms and conditions for software providers and users.

  • It is a contract between the developer of the source code and the user of the software.
  • It specifies who owns the software, outlines copyrights for the software, and specifies the terms and duration of the license.
  • Likewise, it states where the software can be installed, how many copies can be installed, and how it can be used.
  • Not only that, but it can be lengthy and full of definitions, restrictions, and penalties for misuse.

Agreeing to licensing terms

  • If you want to use software, you must agree to the licensing terms and requirements, called an End-User License Agreement (EULA).
  • Agreeing means you accept the terms of the license, such as how many computers the software can be installed on, how it can be used, and what the limitations on developer liability are.
  • Different software programs and applications have various ways of presenting their EULAs.

Types of software licenses

Single-use license

  • Allows single installation.
  • Allows installation on only one computer or device.
  • Ideal for a single user to install on computers or devices owned only by the user.

Group use, corporate, campus, or site license

  • Allows multiple installation for specified number of multiple users.
  • Allows installation on many computers or devices.
  • Idea for use with computers and devices that are required and owned by organizations.

Concurrent license

  • Allows installation on many computers, but can only use concurrently by a lower number.
  • Allows many users to have access, but is not used often by a lot of people at once.
  • Ideal for companies that do not have all workers using the software at the same time.

Software licensing cost

  • Costs vary, depending on the type of software, how it will be used, and how much was spent to develop the software.
  • The cost is for the license to use the software.
  • Several options are available, such trial subscription, and one-time purchase.
  • Trial licenses are usually free for a limited time, for a user to decide if they want to purchase the software.

Subscription or one-time licenses

Computing Platforms and Software Application Computing Platforms and Software Application

Software Installation Management

Before installing software

  • Read application details and be selective.
  • Avoid ads or other unwanted software.
  • Avoid downloading software that contains malware.
  • Review permissions requests to access other apps and hardware on your device.
  • Be selective when allowing application privileges.

Installing software

Consider minimum system requirements, such as:

  • Minimum processor speed

  • Minimum amount of RAM

  • Minimum amount of hard disk space available

  • Compatible OS versions

    Additional requirements may be:

  • Specific display adapter

  • Amount display adapter RAM

  • Internet connection to use the software.

Software versions

  • Software versions are identified by version number.
  • Version numbers indicate:
    • When the software was released.
    • When it was updated.
    • If any minor changes or fixes were made to the software.
  • Software developers use versioning to keep track of new software, updates, and patches.

Version numbers

  • Version numbers can be short or long, with 2,3, or 4 sets.
  • Each number set is divided by a period.
  • An application with a 1.0 version number indicated the first release.
  • Software with many releases and updates will have a larger number.
  • Some use dates for versioning, such as Ubuntu Linux version 18.04.2 released in 2018 April, with a change shown in the third number set.

What do version numbers mean?

Some version numbers follow the semantic numbering system and have 4 parts separated by a period.

  • The first number indicates major changes to the software, such as a new release.

  • The second number indicated that minor changes were made to a piece of software.

  • The third number in the version number indicates patches or minor bug fixes.

  • The fourth number indicates build numbers, build dates, and less significant changes.

    Computing Platforms and Software Application Computing Platforms and Software Application

Version compatibility

  • Older versions may not work as well in newer versions.
  • Compatibility with old and new versions of software is a common problem.
  • Troubleshooting compatibility issues by viewing the software version.
  • Update software to a newer version that is compatible.
  • Backwards-compatible software functions properly with older versions of files, programs, and systems.

Productivity, Business, and Collaboration Software

Types of software

  • Productivity software enables users to be productive in their daily activities.

  • Business software is related to work tasks and business-specific processes.

  • Collaboration software enables people to work together and communicate with each other.

  • Utility software helps manage, maintain, and optimize a computer.

    Note: A program or application can be categorized as multiple types of software.

What is productivity software?

“Productivity software is made up of programs and application that we use every day.”

Computing Platforms and Software Application Computing Platforms and Software Application

Types of productivity software

Computing Platforms and Software Application Computing Platforms and Software Application

What is business software?

  • Programs and applications that help businesses complete tasks and function more efficiently are considered business software.
  • Some business software is uniquely designed to meet an industry-specific need.

Types of business software

Computing Platforms and Software Application Computing Platforms and Software Application

What is collaboration software?

  • Collaboration software helps people and companies communicate and work together.
  • Collaboration software can also be business software, but they are not interchangeable.
  • The primary purpose is to help users create, develop, and share information collaboratively.

Types of collaboration software

Computing Platforms and Software Application Computing Platforms and Software Application

What is utility software?

  • Utility software runs continuously on a computer without requiring direct interaction with the user.
  • These programs keep computers and networks functioning properly.

Utility software

Computing Platforms and Software Application Computing Platforms and Software Application

Types of File Formats

Executable files

Executable files run programs and applications.

Some executable file format extensions are:

  • EXE or .exe for Windows applications
  • BAT or .bat for running a list of commands
  • SH or .sh for shell commands on Linux/Unix
  • CMD or .cmd for running command in order
  • APP or .app for Mac application bundles
  • MSI or .msi for installer package on Windows

Common compression formats

Computing Platforms and Software Application Computing Platforms and Software Application

Common audio and video formats

Audio and video formats often share the same extensions and the same properties.

Some audio formats:

  • WAV

  • MPEG, including MP3 and MP4

  • AAC

  • MIDI

    Some video formats:

  • AVI

  • FLV

  • MPEG, including MP4 and MPG

  • WMV

Images formats

Some common image formats are:

Computing Platforms and Software Application Computing Platforms and Software Application

Document formats

Some examples of document formats and extensions:

  • TXT / .txt for text files
  • RTF / .rtf for rich text format
  • DOCX and DOC / .docx and .doc for Microsoft Word
  • XLSX and XLS / .xlsx and .xls Microsoft Excel
  • PDF / .pdf for Adobe Acrobat and Adobe Reader
  • PPTX and PPT / .pptx and .ppt for PowerPoint

Fundamentals of Web Browsers, Applications, and Cloud Computing

Common Web Browsers

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Web Browser components

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Browser installs and updates

Importance of browser updates

  • Compatibility with websites
  • Security
  • New features

Frequency of browser updates

Most web browsers update at the same frequency:

  • Major updates every four weeks
  • Minor updates as needed within the four-week period
    • Security fixes, crash fixes, policy updates
  • Some vendors offer an extended release:
    • Major updates are much less frequent
    • Better for structured environments

Malicious plug-ins and extensions

  • Malicious plug-ins and extensions typically not displayed in list of installed apps and features.
  • Use an anti-malware program to remove them.
  • Use trusted sources for plug-ins and extensions to avoid malware.

Basic Browser Security Settings

What is a proxy server?

  • Acts as go-between when browsing the web.
  • The website thinks the proxy is the site visitor.
  • Protects privacy or bypass content restrictions.
  • Allows organizations to maintain web security, web monitoring, and content filtering.
  • Controls what, when, and who.
  • Reduces bandwidth consumption and improves speed.

How does a proxy server work?

  • Proxy servers perform network address translation to request and retrieve web content on behalf of requesting computers on the network.

    Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Managing cookies

  • Cookies:
    • Small text-based data stores information about your computer when browsing
    • Save session information
    • More customized browsing experience
    • Example: Online shopping basket
  • Cookies can be useful but could be malicious too:
    • Tracking browsing activity
    • Falsifying your identity

What is cache?

  • Cache is temporary storage area
  • Stores web data, so it can be quickly retrieved and reused without going to original source
  • Cache is stored on local disk
  • Improves speed, performance, and bandwidth usage
  • Cache can be cleared when no longer needed

Browser Security Certificates and Pop-ups Settings

Security certificates

  • Good security practice to check websites’ authenticity
  • Look for HTTPS in URL and padlock icon
    • ‘Connection is secure’
  • If it says ‘not secure’ be wary
    • Certificate expired
    • Issuing CA not trusted

Script and pop-ups blockers

Pop-ups:

  • Typically are targeted online ads

  • Can be annoying and distracting

  • Can be malicious

    • Associated with ‘innocent’ actions
  • Take care when interacting with pop-ups

    Popular third-party pop-up blockers:

  • Adlock

  • AdGuard

  • AdBlock

  • Ghostery

  • Adblock Plus May provide additional features such as ad filtering.

Private Browsing and Client-side Scripting Settings

Private browsing mode that doesn’t save:

  • History

  • Passwords

  • Form data

  • Cookies

  • Cache

    Only hidden locally

  • ISPs, websites, workplace can view data

Client-side scripting

  • Web pages were static in early days of WWW
  • Dynamic web pages adapt to situation/user
  • Server-side scripting performed by server hosting dynamic pages
  • Client-side scripting performed by client’s web browser
  • Code is embedded in web page
    • JavaScript

Pros

  • Client-side scripts are visible to user
  • No reliance on web server resources

Cons

  • Client-side scripts have security implications
  • Malware developers constantly trying to find security flaws
  • You may need to disable client-side scripts

Should you disable JavaScript?

Pros of disabling

  • Security

  • Browsing speed

  • Browser support

  • Disabled cookies

    Cons of disabling

  • Lack of dynamic content

  • Less user-friendly browsing experience

  • Website navigation

Introduction to cloud computing and cloud deployment and service models

What is cloud computing?

Delivery of on-demand computing resources:

  • Networks

  • Servers

  • Storage

  • Applications

  • Services

  • Data centers Over the Internet on a pay-for-use basis.

    Applications and data users access over the Internet rather than locally:

  • Online web apps

  • Secure online business applications

  • Storing personal files

    • Google Drive
    • OneDrive
    • Dropbox

Cloud computing user benefits

  • No need to purchase applications and install them on local computer
  • Use online versions of applications and pay a monthly subscription
  • More cost-effective
  • Access most current software versions
  • Save local storage space
  • Work collaboratively in real time

Cloud computing

  • Five characteristics
  • Three deployment models
  • Three service models

Cloud computing characteristics

  • ON-demand self-service
  • Broad network access
  • Resource pooling
  • Rapid elasticity
  • Measured service

Cloud deployment models

  • Public Cloud
  • Private Cloud
  • Hybrid cloud

Cloud service models

  • IaaS
  • PaaS
  • SaaS

Application Architecture and Delivery Methods

Application Architecture models

  • How will an application be use?

  • How will it be accessed?

    Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

One-tier model

  • Single-tier model
  • Also called monolithic model
  • Applications run on a local computer

Two-tier model

  • Workspace-based client – Personal computer
  • Web server – Database server

Three-tier model

  • Workspace-based client

  • Application server or web server

  • Additional server (Database)

    Each tier can be:

  • Individually developed and updated by a separate team

  • Modified and upgraded without affecting the other tiers

N-tier model

  • A number of tiers

  • Multi-tier model

    • Workspace-based client
    • Web server or database server
    • Security
    • Additional servers
  • Preferred for the microservices pattern and Agile model

    Pros

  • Changes can be made to specific tiers

  • Each tier can have its own security settings

  • Different tiers can be load balanced

  • Tiers can be individually backed up by IT administrators

    Cons

  • Changes to all tiers may take longer

Application Delivery methods

  • Local installation
  • Hosted on a local network
  • Cloud hosted

Software Development Life Cycle

Introduction to the SDLC

  • Structured methodology that defines creating and developing software

  • Detailed plan to develop maintain, or enhance software

  • Methodology for consistent development that ensures quality production

  • Six major steps

    Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Requirement analysis and planning

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Design

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Coding or implementation

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Testing

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Deployment

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Maintenance

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

SDLC models

Waterfall

  • Linear sequential model

  • Output of one phase is input for the next phase

  • Next doesn’t start until work is completed on the previous phase

    Iterative

  • Iterative incremental model

  • Product features developed iteratively

  • Once complete, final product build contains all features

    Spiral

  • Uses waterfall and prototype models

  • Good for large projects

  • Largely reduces risk

  • Planning, risk analysis, engineering, and evaluation

  • Follows an iterative process

    V-shaped

  • Verification and validation model

  • Coding and testing are concurrent, implemented at development stage

    Agile

  • Joint development process over several short cycles

  • Teams work in cycles, typically two to four weeks

  • Testing happens in each sprint, minimizes risk

  • Iterative approach to development

  • At the end sprint, basic product developed for user feedback

  • Process is repeated every sprint cycle

    Four core values of agile model

  • Individuals and interactions over process and tools

  • Working software over comprehensive documentation

  • Customer collaboration over contract negotiation

  • Responding to change over following plan

    Lean

  • Application of lean principles

  • Focuses on delivery speed

  • Continuous improvement

  • Reducing waste each phase

    Seven rules of Lean Model

  • Build in quality

  • Create knowledge

  • Defer commitment

  • Deliver fast

  • Respect people

  • Optimize the whole

  • DevOps evolved from Agile and Lean principles

  • Development and Operations teams work collaboratively

  • Accelerate software deployment

    Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Traditional SDLC vs. Agile

Fundamentals of Web Browsers, Applications, and Cloud Computing Fundamentals of Web Browsers, Applications, and Cloud Computing

Basics of Programming

Interpreted and Compiled Programming Languages

Programming Languages

  • Common programming languages categories:
    • Interpreted
    • Compiled
  • Many programming languages are compiled and interpreted
  • The developer determines which languages is best suited for the project

Interpreted programming

Basics of Programming Basics of Programming

  • Some interpreted programming languages are outdated
  • Some are more versatile and easier to learn languages
  • Interpreted programming languages need an interpreter to translate the source code
  • Translators are built into the browser or require a program on your computer to interpret the code

Interpreted programming examples

Basics of Programming Basics of Programming

Compiled programming

  • Programs that you run on your computer

  • Packaged or compiled into one file

  • Usually larger programs

  • Used to help solve more challenging problems, like interpreting source code

    Basics of Programming Basics of Programming

Examples

Examples of compiled programming languages are:

  • C, C++ and C# are used in many operating systems, like Microsoft. Windows, Apple macOS, and Linux
  • Java works well across platforms, like the Android OS

Compiled programming

Basics of Programming Basics of Programming

Comparing Compiled and Interpreted Programming Languages

Choosing a programming language

Developers determine what programming language is best to use depending on:

  • What they are most experienced with and trust
  • What is best for their users
  • What is the most efficient to use

Programming Languages

Basics of Programming Basics of Programming

Interpreted Programming Languages

  • Also called script code or scripting, used to automate tasks
  • Interpreter programs read and execute the source code line by line
  • The source code need to be executed each time
  • Runs on almost any OS with the right interpreter

Compiled programming languages

  • Also called programming languages
  • Used for more complex programs that complete larger tasks
  • Larger programs installed on the computer or device
  • Longer time to write the code but runs faster
  • Grouped into one downloadable file
Interpreted vs. compiled

Basics of Programming Basics of Programming

Programming Language examples

C, C++, C#:

  • Compiled programming language

  • C is the original language, C++ and C# are variations

  • Case sensitive

  • Basis for Windows and many operating systems

  • Takes more time to learn and use for coding but requires less memory and code runs faster

    Java:

  • Compiled programming language

  • Case-sensitive, object-oriented programming language

  • Requires Java Virtual Machine (JVM) to run the code

  • Programming language for Android OS

  • Cross-platform language that runs the same code on macOS, Windows and Linux

    Python:

  • Interpreted programming language

  • Scripting language

  • General-use, case-sensitive

  • Used with Windows, macOS, and Linux OSes and with server-side web app code

  • Requires Python engine to interpret code

    JavaScript:

  • Interpreted

  • Scripting language that runs on client side web browsers

  • Case insensitive

  • Simple scripts are run with HTML

  • Complex scripts are run in separate files

  • Not to be confused with Java, the compiled programming language

    HTML:

  • Interpreted

  • HyperText Markup Language

  • Mostly case-insensitive

  • Uses tags to format web pages on client-side web browsers

Query and Assembly Programming Languages

Programming language levels

  • High-level programming languages
    • More sophisticated
    • Use common English
    • SQL, Pascal, Python
  • Low-level programming languages
    • Use simple symbols to represent machine code
    • ARM, MIPS, X86

Query languages

  • A query is a request for information from a database
  • The database searches its tables for information requested and returns results
  • Important that both the user application making the query and the database handling the query are speaking the same language
  • Writing a query means using predefined and understandable instructions to make the request to a database
  • Achieved using programmatic code (query language/database query language)
  • Most prevalent database query language is SQL
  • Other query languages available:
    • AQL, CQL, Datalog, and DMX

SQL vs. NoSQL

  • NoSQL (not only SQL)
  • Key difference is data structures
  • SQL databases:
    • Relational
    • Use structured, predefined schemas
  • NoSQL databases:
    • Non-relational
    • Dynamic schemas for unstructured data

How does a query language work?

Query language is predominantly used to:

  • Request data from a database

  • Create, read, update, and delete data in a database (CRUD)

  • Database consists of structured tables with multiple rows and columns of data

    When a user performs a query, the database:

    1. Retrieves data from the table
    2. Arranges data into some sort of order
    3. Returns and prevents query results

Query statements

  • Database queries are either:
    • Select commands
    • Action commands (CREATE, INSERT, UPDATE)
  • More common to use the term “statement”
  • Select queries request data from a database
  • Action queries manipulate data in a database

Common query statements

Basics of Programming Basics of Programming

Query statement examples

  • SELECT * FROM suppliers;
  • SELECT name FROM suppliers, WHERE name = ‘Mike’;
  • CREATE DATABASE products;
  • DROP TABLE suppliers;
  • ALTER TABLE suppliers;
  • DROP COLUMN firstname;
  • SELECT AVG(purchases);
  • FROM suppliers;

Assembly languages

  • Less sophisticated than query languages, structured programming languages, and OOP languages
  • Uses simple symbols to represent 0s and 1s
  • Closely tied to CPU architecture
  • Each CPU type has its own assembly language

Assembly language syntax

  • Simple readable format
  • Entered one line at a time
  • One statement per line
{label} mnemonic {operand list} {;comment}
mov TOTAL, 212 ;Transfer the value 212 in the memory variable TOTAL

Assemblers

  • Assembly languages are translated using an assembler instead of a compiler or interpreter

  • One statement translates into just one machine code instruction

  • Opposite to high-level languages where one statement can be translated into multiple machine code instructions

    Translate using mnemonics:

  • Input (INP), Output (OUT), Load (LDA), Store (STA), Add (ADD)

    Statements consist of:

  • Opcodes that tell the CPU what to do with data

  • Operands that tell the CPU where to find the data

Understanding Code Organization Methods

Code organization is important

Basics of Programming Basics of Programming

Planning and organizing software design:

  • Enables writing cleaner, more reliable code
  • Helps improve code base
  • Reduce bugs and errors
  • Has a positive impact on program quality
  • Provides consistent and logical format while coding

Pseudocode vs. flowcharts

Pseudocode Flowcharts
Informal, high-level algorithm description Pictorial representation of algorithm, displays steps as boxes and arrows
Step-by-step sequence of solving a problem Used in designing or documenting a process or program
Bridge to project code; follows logic Good for smaller concepts and problems
Helps programmers share ideas without extraneous waste of a creating code Provide easy method of communication about logic behind concept
Provides structure that is not dependent on a programming language Offer good starting point for project

Flowcharts

  • Graphical or pictorial representation of an algorithm

  • Symbols, shapes, and arrows in different colors to demo a process of program

  • Analyze different methods of solving a problem or completing a process

  • Standard symbols to highlight elements and relationships

    Basics of Programming Basics of Programming

    Basics of Programming Basics of Programming

Flowchart software

  • Provides ability to create flowcharts

  • Drag functionality

  • Easy-to-use interface

  • Team collaboration creating flowcharts

    Examples:

  • Microsoft Visio

  • Lucidchart

  • Draw.io

  • DrawAnywhere

Pseudocode advantages

  • Simply explains each line of code
  • Focuses more on logic
  • Code development stage is easier
  • Words/phrases represent lines of computer operations
  • Simplifies translation
  • Code in different computer languages
  • Easier review by development groups
  • Translates quickly and easily to any computer language
  • More concise, easier to modify
  • Easier than developing a flowchart
  • Usually less than one page

Branching and Looping Programming Logic

Introduction to programming logic

Basics of Programming Basics of Programming

Boolean expressions and variables

Basics of Programming Basics of Programming

Branching programming logic

Basics of Programming Basics of Programming

Branching statements allow program execution flow:

  • if

    Basics of Programming Basics of Programming

  • if-then-else

    Basics of Programming Basics of Programming

  • Switch

    Basics of Programming Basics of Programming

  • GoTo

Looping programming logic

Basics of Programming Basics of Programming

There are three basic loop statements:

  • While loop: Condition is evaluated before processing, if true, then loop is executed
  • For loop: Initial value performed once, condition tests and compares, if false is returned, loop is stopped
  • Do-While loop:Condition always executed after the body of a loop

Introduction to Programming Concepts, Part 1

What are identifiers?

  • Software developers use identifiers to reference program components
    • Stored values
    • Methods
    • Interfaces
    • Classes
  • Identifiers store two types of data values:
    • Constants
    • Variables

What are containers?

  • Special type of identifier to reference multiple program elements
    • No need to create a variable for every element
    • Faster and more efficient
  • Examples:
    • To store six numerical integers – create six variables
    • To store 1,000+ integers – use a container

Arrays

  • Simplest type of container

  • Fixed number of elements stored in sequential order, starting at zero

  • Declare an array

    • Specify data type (Int, bool, str)
    • Specify max number of elements it can contain
  • Syntax

    • Data type > array name > max array size [ ]
    int my_array[50]

Vectors

  • Dynamic size
  • Automatically resize as elements are added or removed
    • a.k.a. ‘Dynamic arrays’
  • Take up more memory space
  • Take longer to access as not stored in sequential memory
  • Syntax
    • Container type/data type in <>/name of array

      vector <int> my_vector;

Introduction to Programming Concepts, Part 2

What are functions?

  • Consequence of modular programming software development methodology
    • Multiple modular components
  • Structured, stand-alone, reusable code that performs a single specific action
  • Some languages refer to them as subroutines, procedures, methods, or modules

How functions work

  1. Functions take in data as input
  2. Then process the data
  3. Then return the result as output

Types of functions

  • Standard library functions – built-in functions
    • if, else, while, print
  • User-defined functions – you write yourself
    • Once a function is written, you can use it over and over
  • Blocks of code in a function are identified in different ways
    • Use {}
    • Use begin-end statements
    • Use indentations

Using function

  1. Define a function (create)
  • Function keyword, unique name, statements
  1. Call a function (invoke)
  • Specified actions are performed using supplied parameters
  1. Declare a function (some programming languages)
  • C, C++

What are objects?

  • Objects are key to understanding object-oriented programming (OOP)

  • OOP is a programming methodology focused on objects rather than functions

  • Objects contain data in the form of properties (attributes) and code in the form of procedures (methods)

  • OOP packages methods with data structures

    • Objects operate on their own data structure

    Basics of Programming Basics of Programming

Objects in programming

  • Consist of states (properties) and behaviors (methods)

    Basics of Programming Basics of Programming

  • Store properties in field (variables)

  • Expose their behaviors through methods (functions)

Database Fundamentals

Types of Data, Sources, and Uses

What is data?

A set of characters gathered and translated for some purpose, usually analysis

Database Fundamentals Database Fundamentals

Common types:

  • Single character

  • Boolean (true or false)

  • Text (string)

  • Number (integer or floating point)

  • Picture

  • Sound

  • Video

    Database Fundamentals Database Fundamentals

Forms of data

Database Fundamentals Database Fundamentals

Types of data

Categorized by level and rigidity

Structured data

  • Structured in rows and columns

  • Well-defined with rigid structure

  • Relational databases

  • Microsoft SQL server

  • IBM Db2

  • Oracle database

    Semi-structured data

  • Some organizational properties

  • Not in rows or columns

  • Organized in hierarchy using tags and metadata

  • Non-relational database

    Unstructured data

  • No identifiable structure, specific format, sequence, or rules

  • Most common include text, email

  • Also images, audio files, and log files

    Examples of Semi and Unstructured data

  • MonoDB

  • Hbase

  • Cassandra DB

  • Oracle NoSQL DB

Data Sources

Database Fundamentals Database Fundamentals

Using data

Data sources may be internal or external

Internal

  • Collects data from reports or records from organization

  • Known as internal sourcing

  • Accounting

  • Order processing

  • Payroll

  • Order shipping

    External

  • Collects data from outside the organization

  • Known as external sourcing

  • Social media feeds

  • Weather reports

  • Government

  • Database and research

Database Fundamentals and Constructs

What is a database?

Database Fundamentals Database Fundamentals

Components of a database

Schema

  • Collection of tables of data

  • A database can have more than one schema

    Table

  • One or more columns of data

  • Two or more columns of stored data

    Column

  • A pillar of information containing one or more data or values

  • Can contain dates, numeric or integer values, alphabetic values

    Row

  • A horizontally formatted line of information like rows in Excel

  • 100s or 1000s rows of data are typically in a table

Database constructs

Queries

  • Request for data

  • Provide answers

  • Perform calculations

  • Combine data

  • Add, change, or delete data

    Constraints

  • Primary and foreign key enforce rules

  • Values in columns not repeated

  • Limit the type of data

  • Ensure data accuracy and reliability

Database query

Database Fundamentals Database Fundamentals

Database constraints

Database Fundamentals Database Fundamentals

Database characteristics

Database Fundamentals Database Fundamentals

Flat file vs. database

Flat File Database
Stores data in single table Uses multiple table structures
Set in various application types Tables are organized in rows and columns
Sorted based on column values One piece of data per column
Solution for simple tasks Faster, more efficient, more powerful

Database Fundamentals Database Fundamentals

Database Fundamentals Database Fundamentals

Database Roles and Permissions

Database permissions

Three types of permissions:

Database

  • Right to execute a specific type of SQL statement

  • Access second person’s object

  • Controls use of computing resources

  • Does not apply to DBA

    System

  • Right to perform any activity

  • Ability to add or delete columns and rows

    Object

  • Right to perform specific actions

  • Allows user to INSERT, DELETE, UPDATE, or SELECT data

  • Object’s owner has permissions for object

Permission commands

Database Fundamentals Database Fundamentals

Database roles

Database Fundamentals Database Fundamentals

Benefits of roles

Database Fundamentals Database Fundamentals

Database types

Structured data type

  • Tabular data, columns, and rows

  • These databases are called relational databases

  • Formed set of data

  • All rows have same columns

    Database Fundamentals Database Fundamentals

Semi-structured data type

  • Some structure

  • Documents in JavaScript Object Notation (JSON) format

  • Include key-value stores and graph database

    Database Fundamentals Database Fundamentals

Unstructured data type

  • Not in pre-defined structure or data model

  • Text heavy files, but may contain numbers and dates

  • Videos, audio, sensor data, and other types of information

    Database Fundamentals Database Fundamentals

Relational database

Relational Non-Relational
Structured to recognize relations among stored items of information Stores data in a non-tabular form, and tends to be more flexible than the traditional, SQL-based, relational database structures

Database Fundamentals Database Fundamentals

Non-relational database

Database Fundamentals Database Fundamentals

Permit storing, store data in a format that closely meets the original structure.

Most common types of data stores:

  • Document data stores

    • Handles

      • Objects
      • Data values
    • Named string fields in an entity referred to as a document

    • Generally store data in the form of JSON documents

      Database Fundamentals Database Fundamentals

  • Key-value stores

    Database Fundamentals Database Fundamentals

  • Column-oriented databases

    Database Fundamentals Database Fundamentals

  • Graph databases

    Database Fundamentals Database Fundamentals

Interfacing with Databases

What is a database interface?

Enable users to input queries to a database

Database Fundamentals Database Fundamentals

Principles of a database interface

Database Fundamentals Database Fundamentals

How to access a database

Types of access:

Direct

  • Enters SQL commands

  • Selects a menu

  • Accesses tables directly

  • Works well with locally stored database or local area network

    Programmatic

  • Accesses’ database using programming language

  • Enables data to be used in more ways

  • Safer than using direct access

  • Oracle databases support access from many languages

  • Might be necessary to perform a query with a supported language

    User interface

  • Microsoft Access permits access to user interface

  • Optional user interface may be needed

  • Oracle offers MySQL Workbench as a graphical user interface

  • Allows ability to input queries without the query language

  • Menu-base interface

  • Forms-based interface

  • GUI displays schema in diagrammatic form

  • Specific query by manipulating diagram

  • GUIs utilize both menus and forms

  • GUIs using point device to pick sections of displayed schema diagram

  • Natural language interfaces accepts user requests and tries to interpret it

  • These interfaces have own schema like database conception schemas

  • Search engine example of entering and retrieving information using natural language

    Query

  • Find specified data using SELECT statement

  • Query and reporting function included with software like Microsoft Access

  • Query Builder’s GUI is designed to enhance productivity and simplify query tasks

    • SQL or SQL displayed visually
    • Has pane displaying SQL text
    • Related tables determined by Query Builder that constructs join command
    • Query and update database using SELECT statement
    • Quickly view and edit query results
    • Examples:
      • Chartio Visual SQL
      • dbForge Query Builder for SQL Server
      • Active Query Builder
      • FlySpeed SQL
      • QueryDbVis Query Builder
  • Drag multiple tables, views, and columns to generate SQL statements

Database Management

Managing databases with SQL commands

  • Queries refer to request information from a database

  • Queries generate data of different formats according to function

  • Query commands perform the data retrieval and management in a database

    Database Fundamentals Database Fundamentals

SQL command Categories

DDL

  • SQL commands that define database schema

  • Create, modify, and delete database structures

  • Not set by general user

    DML

  • SQL commands that manipulate data

    DCL

  • SQL commands for rights, permissions, and other database system controls

    Database Fundamentals Database Fundamentals

Inputting and importing data

Data is input manually into a database through queries.

Database Fundamentals Database Fundamentals

Another way is through importing data from different sources.

  • SQL Server Import Export Wizard
  • SQL Server Integrated Services (or SSIS)
  • OPENROWSET function

Extracting data from a database

Database Fundamentals Database Fundamentals

Backing Up Databases

What is a database backup?

Two backup types:

  • Logical

  • Physical

    Database Fundamentals Database Fundamentals

Physical database backups

  • Needed to perform full database restoration
  • Minimal errors and loss
  • Full or incremental copies

Logical database backups

  • Copies of database information
  • Tables, schemas, procedures

Backup pros and cons

Physical backup Logical backup
Pros: Pros:
Simple and fast, despite format Only selected data is backed up
Mirror copy loaded to another device Saves time and storage
Cons: Cons:
Used only to recreate system No file system information
Cannot do full restore Complications restoring process

Database backup methods

Full

  • Stores copies of all files

  • Preset schedule

  • Files are compressed but may need large storage capacity

    Differential

  • Simplifies recovery

  • Requires last full backup

  • Last differential back up for full recovery

    Incremental

  • Saves storage

  • Back up files generated or updated since last backup

    Virtual

  • Uses’ database to track and maintain data

  • Helps avoid pitfalls of other backup methods

Backup Management

Database Fundamentals Database Fundamentals

Subsections of Introduction to Networking and Storage

Networking Fundamentals

Network Topologies, Types, and Connections

Types and Topologies

What is a computer network?

Computer networking refers to connected computing devices and an array of IoT devices that communicate with one another.

Network Types

There are multiple network types:

  • PAN (Personal Area Network)
  • LAN (Local Area Network)
  • MAN (Metropolitan Area Network)
  • WAN (Wide Area Network)
  • WLAN (Wireless LAN)
  • VPN (Virtual Private Network)

PAN (Personal Area Network)

A PAN enables communication between devices around a person. PANs can be wired or wireless.

  • USB

  • FireWire

  • Infrared

  • ZigBee

  • Bluetooth

    Networking Fundamentals Networking Fundamentals

LAN (Local Area Network)

A LAN is typically limited to a small, localized area, such as a single building or site.

Networking Fundamentals Networking Fundamentals

MAN (Metropolitan Area Network)

  • A MAN is a network that spans an entire city, a campus, or a small region.

  • MANs are sometimes referred to as CANs (Campus Area Networks).

    Networking Fundamentals Networking Fundamentals

WAN (Wide Area Network)

A WAN is a network that extends over a large geographic area.

  • Businesses

  • Schools

  • Government entities

    Networking Fundamentals Networking Fundamentals

WLAN (Wireless LAN)

A WLAN links two or more devices using wireless communication.

  • Home

  • School

  • Campus

  • Office building

  • Computer Lab

    Through a gateway device, a WLAN can also provide a connection to the wider Internet.

VPN (Virtual Private Network)

  • A private network connection across public networks.
  • Encrypt your Internet traffic.
  • Disguise your online identity
  • Safeguard your data.

Topology

  • Topology defines a network’s structure

  • A network’s topology type is chosen bases on the specific needs of the group installing that network

    1. Physical Topology: It describes how network devices are physically connected.
    2. Logical Topology: It describes how data flows across the physically connected network devices.

    Networking Fundamentals Networking Fundamentals

Star topology

Star topology networks feature a central computer that acts as a hub.

Networking Fundamentals Networking Fundamentals

Ring topology

Ring topology networks connect all devices in a circular ring pattern, where data only flows in one direction (clockwise).

Networking Fundamentals Networking Fundamentals

Bus topology

Bus topology networks connect all devices with a single cable or transmission line.

  • Small networks, LAN.

    Networking Fundamentals Networking Fundamentals

Tree topology

Tree topology networks combine the characteristics of bus topology and star topology.

  • University campus

    Networking Fundamentals Networking Fundamentals

Mesh topology

Mesh topology networks connect all devices on the network together.

  • This is called dynamic routing.

  • It is commonly used in WAN network for backup purposes.

  • It is not used in LAN implementations.

    Networking Fundamentals Networking Fundamentals

Wire Connections

Older Internet Connection Types

Networking Fundamentals Networking Fundamentals

Newer Internet Connection Types

Networking Fundamentals Networking Fundamentals

Wired Networks

Wired networking refers to the use of wire connections that allow users to communicate over a network.

  • Most computer networks still depend on cables or wires to connect devices and transfer data.

Wire Connections: Dial-Up

Requires a modem and phone line to access the internet.

Pros:

  • Widely available

  • Low cost

  • Easy Setup

    Cons:

  • Very slow speeds

  • Can’t use phone and Internet at the same time

Wire Connections: DSL

Connects to the Internet using a modem and two copper wires within the phone lines to receive and transmit data.

Pros:

  • Faster than dial-up

  • Inexpensive

  • Dedicated connection (no bandwidth sharing)

  • Can provide Wi-Fi

  • Uses existing phone lines

    Cons:

  • Slow speeds (less than 100 Mbps)

  • Not always available

Wired Connections: Cable

Cable delivers Internet via copper coaxial television cable.

Pros:

  • Lower cost than fiber

  • Fast speeds

  • Better than DSL

  • Long distances

  • Lower latency

    Cons:

  • Bandwidth congestion

  • Slower uploads

  • Electromagnetic interference

Wired Connection: Fiber Optic

Transmit data by sending pulses of light across strands of glass (up to 200 Gbps).

Pros:

  • Efficient

  • Reliable

  • Covers long distances

  • Fast speeds

  • Streaming and hosting

    Cons:

  • Expensive

  • Not available everywhere

Cables

Cables types

Networking Fundamentals Networking Fundamentals

Hard Drive Cables

Hard drive cables connect a hard drive to a motherboard or controller card. May also be used to connect optical drives or older floppy drives.

  • SATA
    • Next-generation
    • Carries high-speed data
    • Connects to storage devices
  • IDE
    • Older tech
    • 40-wire ribbon
    • Connect motherboard to one or two drives
  • SCSI
    • Supports variety of devices

    • Different cable types

    • Up to 16 connections

      Networking Fundamentals Networking Fundamentals

Network Cables

In wired networks, network cables connect devices and route information from one network device to another.

Cable need is determined by:

  • Network topology

  • Protocol

  • Size

    Types:

  • Coaxial

    • TV signals to cable boxes
    • Internet to home modems
      • Inner copper wire surrounded by shielding
      • Highly Resistant to signal interference
      • Supports greater cable lengths between devices
      • 10 Mbps capacity, uses DOCSIS standard
  • Fiber optic

    • Work over long distances without much interference
    • Handles heavy volumes of data traffic
    • Two Types
      • Single-Mode
        • Carries one light path
        • Sourced by a laser
        • Longer transmission distance
      • Multimode
        • Multiple light paths
        • Sourced by an LED
  • Ethernet

    • Consist of four pairs of twisted wires
    • Reduce interference
    • Wire a computer to LAN
    • Fast and Consistent
    • Two Types:
      • Unshielded Twisted Pair (UTP)
        • Cheaper and more common
      • Shielded Twisted Pair (STP)
        • More expensive

        • Designed to reduce interference Networking Fundamentals Networking Fundamentals

          Networking Fundamentals Networking Fundamentals

Serial Cables

A serial cable follows the RS-232 standard: “Data bits must flow in a line, one after another, over the cable.” Used in:

  • Modems

  • Keyboards

  • Mice

  • Peripheral devices

    Networking Fundamentals Networking Fundamentals

Video Cables

Transmits video signals.

  • VGA
    • Older, analog
  • DisplayPort
    • Connects interface to display
  • HDMI
    • High definition
    • Different connector types
    • Type A is common
  • DVI
    • Can be digital or integrated
    • Can be single or dual link
  • Mini-HDMI
    • Type C HDMI

      Networking Fundamentals Networking Fundamentals

Multipurpose Cables

Multipurpose cables connect devices and peripherals without a network connection. They transfer both data and power.

  • USB
    • Low speed 1.5 Mbps @3 meters
    • Full speed 12 Mbps @5 meters
  • Lighting
    • Apple only
    • Connects to USB ports
  • Thunderbolt
    • Apple only
    • Copper max length 3 meters
    • Optical max length 60 meters
    • 20-40 Gbps throughput

Wireless Connections

Wireless network types

Networking Fundamentals Networking Fundamentals

WPAN networking examples

Networking Fundamentals Networking Fundamentals

WLAN networking examples

Networking Fundamentals Networking Fundamentals

WMAN networking examples

Networking Fundamentals Networking Fundamentals

WWAN networking examples

Networking Fundamentals Networking Fundamentals

Wired vs. wireless

Networking Fundamentals Networking Fundamentals

Networking Fundamentals Networking Fundamentals

Advantages and Disadvantages of Network Types

Networks vs. devices

Networking Fundamentals Networking Fundamentals

Smaller vs. larger

Networking Fundamentals Networking Fundamentals

Wired vs. wireless

Networking Fundamentals Networking Fundamentals

Network Types

Basic network types are:

  • Wired

  • Wireless

    Networking Fundamentals Networking Fundamentals

PAN

A PAN enables communication between devices around a person. PANs are wired and WPANs are wireless.

Advantages:

  • Flexible and mobile

  • One-time, easy setup

  • Portable

    Disadvantages:

  • Limited range

  • Limited bandwidth

LAN

Advantages:

  • Reliable and versatile

  • Higher data transmission rates

  • Easier to manage

    Disadvantages:

  • Smaller network coverage area

  • Number of device affects speed

  • Security risks

MAN

A MAN is optimized for a larger geographical area, ranging from several building blocks to entire cities.

Advantages:

  • Cover multiple areas

  • Easy to use, extend, and exchange

  • Managed by an ISP, government entity, or corporation

    Disadvantages:

  • Requires special user permissions

  • Security risk

WAN

WANs and WWANs provide global coverage. Examples include the Internet and cellular networks.

Advantages:

  • Global coverage

  • More secure

    Disadvantages:

  • Expensive

  • Difficult to maintain

Hardware, Network Flow, and Protocols

Networking Hardware Devices

Network Devices

Network devices, or networking hardware, enable communication and interaction on a computer network.

This includes:

  • Cables
  • Servers
  • Desktops
  • Laptops
  • Tablets
  • Smartphones
  • IoT devices

What is a server?

  • Other computers or devices on the same network can access the server
  • The devices that access the server are known as clients
  • A user can access a server file or application from anywhere

What are nodes and clients?

A node is a network-connected device that can send and receive information.

  • All devices that can send, receive, and create information on a network are nodes.
  • The nodes that access servers to get on the network are known as clients.

Client-server

Client-server networks are common in businesses.

  • They keep files up-to-date

  • Easy-to-find

  • One shared file in one location

    Examples of services that use client-server networks:

  • FTP sites

  • Web servers

  • Web browsers

Peer-to-peer

Peer-to-peer networks are common in homes on the Internet.

Examples:

  • File sharing sites
  • Discussion forums
  • Media streaming
  • VoIP services

Hubs and Switches

A hub:

  • Connects multiple devices together

  • Broadcasts to all devices except sender

    A switch:

  • Keeps a table of MAC addresses

  • Sends directly to correct address (More efficient than hubs)

Routers and modems

Routers interconnect different networks or subnetworks.

  • Manage traffic between networks by forwarding data packets

  • Allow multiple devices to use the same Internet connection

    Routers use internal routing to direct packets effectively The router:

  • Reads a packet’s header to determine its path

  • Consults the routing table

  • Forwards the packet

    A modem converts data into a format that is easy to transmit across a network.

  • Data reaches its destination, and the modem converts it to its original form

  • Most common modems are cable and DSL modems

Bridges and gateways

A bridge joins two separate computer networks, so they can communicate with each other and work as a single network.

Wireless bridges can support:

  • Wi-Fi to Wi-F i

  • Wi-Fi to Ethernet

  • Bluetooth to Wi-Fi

    A gateway is a hardware or software that allows data to flow from one network to another, for examples, a home network to the Internet.

    Networking Fundamentals Networking Fundamentals

Repeaters and WAPs

Repeaters

  • Receive a signal and retransmits it

  • Used to extend a wireless signal

  • Connect to wireless routers

    Wireless Access Point (WAP)

  • Allows Wi-Fi devices to connect to a wired network

  • Usually connects to a wired router as a standalone device

  • Acts as a central wireless connection point for computers equipped with wireless network adapters

Network Interface Cards (NICs)

NICs connect individual devices to a network.

Networking Fundamentals Networking Fundamentals

Firewalls, proxies, IDS, and IPS

A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewalls can be software or hardware

  • Routers and operating systems have built-in firewalls

    Networking Fundamentals Networking Fundamentals

    A Proxy Server:

  • Works to minimize security risks

  • Evaluates requests from clients and forwards them to the appropriate server

  • Hides an IP address

  • Saves bandwidth

    IDS and IPS:

  • IDS monitors network traffic and reports malicious activity

  • IPS inspects network traffic and removes, detains, or redirects malicious items

    Networking Fundamentals Networking Fundamentals

Packets, IP Addressing, DNS, DHCP, and NAT

What is a packet?

Everything you do on the Internet involves packets.

Packets are also called:

  • Frames
  • Blocks
  • Cells
  • Segments

Data Transmission Flow Types

Networking Fundamentals Networking Fundamentals

IP Packets Transmission Modes

Networking Fundamentals Networking Fundamentals

Data Transmission Flow

When you send an email, it is broken down into individually labeled data packets and sent across the network.

IPv4 and IPv6

  • IPv4 is one of the core protocols for the Internet.
  • IPv6 is the newest version of Internet Protocol.

What is an IP address?

An IP address is used to logically identify each device (Host) on a given network.

Networking Fundamentals Networking Fundamentals

IP Address Types

Static: Static IP addresses are manually assigned.

Dynamic: Dynamic IP addresses are automatically assigned.

Public: Public IP address is used to communicate publically.

Private: Private IP address is used to connect securely within an internal, private network.

Loopback: Loopback is the range of IP addresses reserved for the local host.

Reserved: Reserved IP addresses have been reserved by the IETF and IANA.

DNS

The DNS is the phone book of the internet.

Networking Fundamentals Networking Fundamentals

Dynamic Host Configuration Protocol (DHCP)

The DHCP automates the configuring of IP network devices.

A DHCP server uses a pool of reserved IP addresses to automatically assign dynamic IP addresses or allocate a permanent IP address to a device.

Static allocation: The server uses a manually assigned “permanent” IP address for a device.

Dynamic allocation: The server chooses which IP address to assign a device each time it connects to the network.

Automatic allocation: The server assigns a “permanent” IP addresses for a device automatically.

Subnetting (and Subnet Mask)

Subnetting is the process of taking a large, single network and splitting it up into many individual smaller subnetworks or subnets.

  • Identifies the boundary between the IP network and the IP host.

  • Internal usage within a network.

  • Routers use subnet masks to route data to the right place.

    Networking Fundamentals Networking Fundamentals

Automatic Private IP Addressing (APIPA)

APIPA is a feature in operating systems like Windows that let computers self-configure an IP address and subnet mask automatically when the DHCP server isn’t reachable.

Networking Fundamentals Networking Fundamentals

Network Address Translation (NAT)

NAT is a process that maps multiple local private addresses to a public one before transferring the information.

  • Multiple devices using a single IP address

  • Home routers employ NAT

  • Conserves public IP addresses

  • Improves security

    NAT instructions send all data packets without revealing private IP addresses of the intended destination.

    Networking Fundamentals Networking Fundamentals

Media Access Control (MAC) Addresses

A MAC address is the physical address of each device on a network.

Networking Fundamentals Networking Fundamentals

Models, Standards, Protocols, and Ports

Networking Models

A networking model describes:

  • Architecture

  • Components

  • Design

    Two types:

    1. OSI Model: A conceptual framework used to describe the functions of a networking system.
    2. TCP/IP Model: A set of standards that allow computers to communicate on a network. TCP/IP is based on the OSI model.

7 Layer OSI Model

Networking Fundamentals Networking Fundamentals

5 Layer TCP/IP Model

The TCP/IP model is a set of standards that allow computers to communicate on a network. TCP/IP is based on the OSI model.

Networking Fundamentals Networking Fundamentals

Network Standards and their Importance

Networking standards define the rules for data communications that are needed for interoperability of networking technologies and processes.

There are two types of network standards:

  1. De-jure or Formal Standards: Developed by an official industry or government body.

Examples: HTTP, HTML, IP, Ethernet 802.3d

  1. De-Facto Standards: De-facto standards result from marketplace domination or practice.

Examples: Microsoft Windows, QWERTY keyboard

Noted Network Standards Organizations

Standards are usually created by government or non-profit organizations for the betterment of an entire industry.

  1. ISO: Established the well known OSI reference networking model.
  2. DARPA: Established the TCP/IP protocol suit.
  3. W3C: Established the World Wide Web (WWW) standard.
  4. ITU: Standardized international telecom, set standards for fair use of radio frequency.
  5. IEEE: Established the IEEE 802 standards.
  6. IETF: Maintains TCP/IP protocol suites. IETF also developed RFC standard.

Protocols

A network protocol is a set of rules that determines how data is transmitted between different devices in the same network.

  1. Security: - Encryption - Authentication - Transportation
  2. Communication: - Encryption - Authentication - Transportation
  3. Network Management: - Connection - Link Aggregation - Troubleshooting

Protocols – TCP vs. UDP

TCP UDP
Slower but more reliable Faster but not guaranteed
Typical applications Typical application
1) File transfer protocol 1) Online games
2) Web browsing 2) Calls over the internet
3) EMAIL

Protocols – TCP/IP

The TCP/IP suite is a collection of protocols.

Networking Fundamentals Networking Fundamentals

Protocols – Internet of Things

Networking Fundamentals Networking Fundamentals

Protocols – Crypto Classic

The Crypto Classic protocol is designed to serve as one of the most efficient, effective, and secure payment methods built on the blockchain network.

Bitcoin Protocol: A peer-to-peer network operating on a cryptographic protocol used for bitcoin transactions and transfers on the Internet.

Blockchain Protocol: An open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way.

Commonly Used Ports

Ports are the first and last stop for information sent across a network.

  • A port is a communication endpoint.

  • A port always has an associated protocol and application.

  • The protocol is the path that leads to the application’s port.

  • A network device can have up to 65536 ports.

  • Port numbers do not change.

    Networking Fundamentals Networking Fundamentals

Wireless Networks and Standards

Network types

Networking Fundamentals Networking Fundamentals

WPAN

A WPAN connects devices within the range of an individual person (10 meters). WPANs use signals like infrared, Zigbee, Bluetooth, and ultra-wideband.

Networking Fundamentals Networking Fundamentals

WLAN

A WLAN connects computers and devices within homes, offices, or small businesses. WLANs use Wi-Fi signals from routers, modems, and wireless access points to wirelessly connect devices.

Networking Fundamentals Networking Fundamentals

WMAN

A WMAN spans a geographic area (size of a city). It serves ranges greater than 100 meters.

Networking Fundamentals Networking Fundamentals

WWAN

A WWAN provides regional, nationwide, and global wireless coverage. This includes private networks of multinational corporations, the Internet, and cellular networks like 4G, 5G, LTE, and LoRaWAN.

Networking Fundamentals Networking Fundamentals

Wireless ad hoc network

A WANET uses Wi-Fi signals from whatever infrastructure happens to be available to connect devices instantly, anywhere. WANETs are similar in size to WLANs, but use technology that is closer to WWANs and cellular network.

Advantages:

  • Flexible

  • No required infrastructure

  • Can be set up anywhere instantly

    Disadvantages:

  • Limited bandwidth quality

  • Not robust

  • Security risks

    Networking Fundamentals Networking Fundamentals

Cellular networks

A cellular network provides regional, nationwide, and global mesh coverage for mobile devices.

Networking Fundamentals Networking Fundamentals

Advantages

  • Flexibility

  • Access

  • Speed and efficiency

    Disadvantages

  • Expensive

  • Decreased coverage

  • Hardware limitations

IEEE 802.20 and IEEE 802.22

The IEEE 802.20 and 802.22 standards support WWANs, cellular networks and WANETs.

Networking Fundamentals Networking Fundamentals

IEEE 802.20

  • Optimizes bandwidth to increase coverage or mobility

  • Used to fill the gap between cellular and other wireless networks

    IEEE 802.22

  • Uses empty spaces in the TV frequency spectrum to bring broadband to low-population, hard-to-reach areas

Protocol Table

Web page protocols

Networking Fundamentals Networking Fundamentals

File transfer protocols

Networking Fundamentals Networking Fundamentals

Remote access protocols

Networking Fundamentals Networking Fundamentals

Email protocols

Networking Fundamentals Networking Fundamentals

Network Protocols

Networking Fundamentals Networking Fundamentals

Configuring and Troubleshooting Networks

Configuring a Wired SOHO Network

What is a SOHO Network?

A SOHO (small office, home office) network is a LAN with less than 10 computers that serves a small physical space with a few employees or home users.

It can be a wired Ethernet LAN or a LAN made of both wired and wireless devices.

A typical wired SOHO network includes:

  • Router with a firewall

  • Switch with 4-8 Ethernet LAN ports

  • Printer

  • Desktops and /or laptops

    Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Setup steps – plan ahead

When setting up a SOHO network, knowing the compatibility requirements is very important.

  • Before setting up any SOHO network, review and confirm everything in your plan to ensure a successful installation.

    Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Setup steps – gather hardware

  • SOHO networks need a switch to act as the hub of the network

  • If Internet is desired, a router can be added or used instead

    Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Setup steps – connect hardware

Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Setup steps – router settings

Log in to router settings

  • Enter ‘ipconfig’ in a command prompt window to find your router’s public IP address (listed next to default gateway)

  • Enter it into a browser and log in

    Update username and password

  • All routers have default administrator usernames and passwords

  • To improve security, change the default username password

    Update firmware

  • Updating router firmware solves problems and enhances security

  • Check the manufacturer website for available firmware updates

  • Download and install if your firmware is not up-to-date

Setup steps – additional settings

  • SOHO wired network security depends on a firewall
  • Most routers have a built-in firewall, additional software can be installed on individual machines
  • Servers and hardware have built-in DHCP and NAT actions
  • DHCP servers use IP addresses to provide network hosts
  • NAT maps public IPv4 address to private IP addresses

Setup steps – user accounts

User account setup is included in most operating systems.

Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Setup steps – test connectivity

Network performance depends on Internet strength, cable specification, installation quality, connected devices, and network and software settings.

Test and troubleshoot to ensure proper network performance.

To troubleshoot performance:

  • Run security tools
  • Check for updates
  • Restart devices
  • Run diagnostic
  • Reboot the router or modem

Configuring a (wireless) SOHO network

What is a SOHO wireless network?

A SOHO wireless network is a WLAN that serves a small physical space with a few home users.

A SOHO wireless network can be configured with the help of a central WAP, which can cover a range of wireless devices within a small office or home.

Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Common broadband types

Common broadband types that enable network connection:

  • DHCP:
    • The most common broadband type, used in cable modem connections.
  • PPPoE:
    • Used in DSL connections in areas that don’t have newer options.
  • Static IP:
    • More common in business.

      DHCP is the easiest broadband type to use. Internet Service Providers can provide other options if needed.

Wireless security factors

Wireless networks can be setup to be either open (unencrypted) or encrypted.

Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Get to know your wireless router

Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Connect to router admin interface

To manage router settings, you must find its default IP address, paste it into a browser and hit enter.

Assign a SSID

  • SSID is the name of a wireless network.
  • This name is chosen during setup.
  • Unique names help to identify the network.
  • Each country determines band and available modes.
  • 2.4 GHz and 5 GHz have specific supported modes.
  • Every router has as a default option.

Wireless encryption security modes

Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Going wireless

Once the router is configured, your wireless network is ready.

Users will see it among the available wireless networks when they click the Wi-Fi icon.

Test and troubleshoot connectivity

Test network performance and Internet connectivity on each wireless device in the vicinity of the WAP.

If required, troubleshoot performance issues (network lags, glitches, or network cannot be accessed) with the following actions:

  • Check router configuration settings.
  • Run security tools.
  • Check for updates.
  • Restart devices.
  • Run diagnostics.
  • Reboot the router or modem.
  • Check equipment for damage.

Mobile configuration

IMEI vs. IMSI

IMEI and IMSI are used to identify cellular devices and network users when troubleshooting device and account issues.

Internation Mobile Equipment Identity (IMEI)

  • ID# for phones on GSM, UMTS, LTE, and iDEN networks

  • Can be used to block stolen phones

    International Mobile Subscriber Identity (IMSI)

  • ID# for cell network subscribers

  • Stored in a network sim card

Troubleshooting Network Connectivity

Symptoms of connectivity problems

“Can’t connect” or “slow connection” are two of the most common network problems. These symptoms can be caused by several things.

Causes of Connectivity Problems

Common causes of network connectivity problems: Configuring and Troubleshooting Networks Configuring and Troubleshooting Networks

Cable Damage

Cable damage slows or stops network connections. The damage can be obvious or hidden from view.

Ways to solve:

  • Check for physical damage
  • Test the cable using different devices or a specialized tool
  • Replace the cable

Equipment malfunction

An equipment malfunction can slow or stop network connections.

Ways to solve:

  • Check network adapter drivers in Device Manager
  • Check switch or router port settings in the management software
  • Replace the equipment

Out of range

When a user is too far away from a wireless signal, their connection will lag or fail.

Ways to solve:

  • Move physically closer to the source of the wireless connection
  • Move the wireless connection source closer to the affected user(s)
  • Use stronger devices to boost the signal strength
  • Use more devices to ensure the Wi-Fi reaches users who are farther away

Missing SSID

Network connections can fail when a user can’t find the network name (SSID) in the available networks list.

Ways to solve:

  • Move physically closer to the Wi-Fi source
  • Reconfigure the network to ensure the SSID is not hidden
  • Upgrade devices or use compatibility mode on newer network, so older devices can still connect
    • Compatibility mode can slow a network
    • Reserve 2.4 GHz band for legacy devices

Interference

Interference is when a radio or microwave signal slows or breaks a wireless connection.

Ways to solve:

  • Remove the source of the interference signal
  • Use a different Wi-Fi frequency (wireless)
  • Use shielded cables to connect (wired)
  • Remodel the building with signal-blocking materials

Weak signal strength

When signal strength is weak, a wireless adapter might slow speeds down to make the connection more reliable.

Weak signals cause:

  • Lags

  • Dropped connection

  • Back-and-forth network hopping

  • Out of range

  • Interference

  • Physical obstacles

    Ways to solve:

  • Move closer to signal

  • Adjust Wi-Fi frequency

  • Realign router antennae

    Wireless access points should be placed up high and in the middle of the space.

DNS and software configuration

Network connections can fail when DNS or software is configured incorrectly.

DNS issue:

  • Domain not recognized

  • IP addresses recognized

    OS and apps issue:

  • Software affecting connection

    Ways to solve:

  • For DNS servers, test domains using ipconfig in a command prompt

  • For apps and OSes, use the network troubleshooter in Windows Settings

Malware

Malware slows or stops network connections intentionally, or as a result of overloading a system with other tasks.

Ways to solve:

  • Use antimalware tools
  • Adjust firewall settings
  • Configure Privacy settings
    • Windows
    • Browser
    • Email

Network Troubleshooting with Command Line Utilities

Common command line utility commands that you would use to troubleshoot or diagnose network issues:

  • ipconfig
    • IP address
    • Subnet mask
    • Default gateway
  • ping
    • You can ping:
      • IP addresses, or
      • Domains
  • nslookup
    • It lists:
      • Your DNS server
      • Your DNS server’s IP address
      • Domain name
  • tracert
    • Tracert lists:
      • Sent from
      • Sent to
      • Number of transfers
      • Transfer locations
      • Duration
  • netstat: It shows if a server’s email and ports are open and connecting to other devices.
    • Netstat lists:
      • Protocol
      • Local address
      • Foreign address
      • Current state

Storage Types and Network Sharing

Types of Local Storage Devices

Hard Drive (HD or HDD)

HDDs:

  • Large storage capacity
  • Up to 200 MB/s
  • Can overheat
  • Were the standard PC storage for decades

Solid-state Drive (SSD)

  • No moving parts

  • Do not need power to retain data

  • faster than any HDD

    Storage Types and Network Sharing Storage Types and Network Sharing

Solid-state Hybrid Drive (SSHD)

SSHDs integrate the speed of an SSD and the capacity of an HDD into a single device. It decides what to store in SSD vs. HDD based on user activity.

SSHDs are:

  • Faster than HDDs

  • Perform better than HDDs

  • Cost less than SSDs

  • Higher capacities than SSDs

    Storage Types and Network Sharing Storage Types and Network Sharing

Optical Disk Drive (ODD)

ODDs are also called:

  • CD Drives
  • DVD Drives
  • BD Drives
  • Disc Drives
  • Optical Drives

Flash Drive

Flash drives store data on solid-state drives (SSDs). Less energy is needed to run flash drives, as they don’t have moving parts that require cooling. High-end versions deduplicate and compress data to save space.

Storage Types and Network Sharing Storage Types and Network Sharing

Local Storage wit Multiple Drives

Hybrid disk arrays physically combine multiple SSD and HDD devices into an array of drives working together to achieve the fast and easy performance of solid-state and the lower costs and higher capacities of hard-disk.

Storage Types and Network Sharing Storage Types and Network Sharing

Direct Attached Storage (DAS)

DAS is one or more storage units within an external enclosure that is directly attached to the computer accessing it.

Storage Types and Network Sharing Storage Types and Network Sharing

Ephemeral and Persistent storage

In DAS units and other storage devices, you can configure storage settings to be Ephemeral or Persistent.

Storage Types and Network Sharing Storage Types and Network Sharing

Redundant Array of Independent Disks (RAID)

A RAID spread data across multiple storage drives working in parallel.

Storage Types and Network Sharing Storage Types and Network Sharing

Storage Types and Network Sharing Storage Types and Network Sharing

Storage Types and Network Sharing Storage Types and Network Sharing

Storage Types and Network Sharing Storage Types and Network Sharing

Companies choose RAID devices for their durability and performance.

  • Maintain RAID devices
  • Keep spare drives
  • Perform routine backups

Troubleshooting Storage Issues

Disk Failure symptoms

Disk failure can be caused by wear and tear over time, faulty manufacturing, or power loss.

  • Read/write failure
  • Blue screen of Death (BSoD)
  • Bad sectors
  • Disk thrashing
  • Clicking and grinding noises

Chkdsk and SMART

The chkdsk tools and the SMART program are used to monitor and troubleshoot disk health.

SMART: Self-Monitoring Analysis, and Reporting Technology

  • wmic/node: localhost diskdrive get status

    Check disk tools

  • chkdsk /r locates bad sectors

  • chkdsk /f attempts to fix file system errors

Boot failures

When a computer fails to boot:

Computer power up

  • Lights and sound

  • Plugged in

    Drive configuration

  • Correct firmware boot sequence

  • No removable disks

  • Cables connected and undamaged

  • Motherboard port enables

    Filesystem error Boot into recovery and enter C: in command prompt.

  • If invalid media type, reformat disk with bootrec tool (erases all data).

  • If invalid drive specification, partition structure with diskparttool.

Boot block repair

Errors like “Invalid drive specification” or “OSS not found” indicate boot errors (caused by disk corruption, incorrect OS installation, or viruses).

  • Try antivirus boot disk and recovery options
  • Original product disk > Repair
    • Startup repair
    • Command prompt
      • Fix MBR: bootrec /fixmbr
      • Fix boot sector: bbotrec /fixboot
      • Correct missing installation in BCD: bootrec /rebuild bcd

File recovery options

For computers that won’t boot, you can try to recover files by removing the hard drive and connecting it to another computer.

Recovery options:

  • Windows disk management
  • chkdsk
  • Third-Party file recovery

Disk Performance issues

Disk performance can slow if a disk is older, too full, or its files are not optimized.

To improve performance:

  • Defragment the drive
  • Add RAM
  • Upgrade to a solid state or hybrid drive
  • Remove files and applications
  • Add additional drive space

Troubleshooting optical drives

Optical drives are laser-based and don’t physically touch disks.

  • Cleaning kits solve read/write errors

  • CD-ROM drives cannot play DVDs and Blu-rays

  • DVD and Blu-ray drives have third-party support

  • Writable discs have recommended write speeds

    Buffer underrun When the OS is too slow for the optical drive’s write process, errors occur.

    To fix buffer underrun:

  • Use latest writes

  • Burn at lower speeds

  • Close apps during burn

  • Save to hard drive instead

Troubleshooting RAID issues

Here are some common RAID troubleshooting steps:

Storage Types and Network Sharing Storage Types and Network Sharing

Types of Hosted Storage and Sharing

Storage as a Service (STaaS)

STaaS is when companies sell network storage space to customers, so they don’t have to buy and maintain their own network equipment.

  • Dropbox
  • OneDrive
  • Google Drive
  • box
  • Amazon Drive

Email and social media storage

Email Companies store your data, emails, and attachments in their data centers.

Social Media Companies store your photos, videos, and messages in their data centers.

  • Gmail waits 30 days before permanent removal.
  • Facebook deleted after 90 days, but keeps certain user data indefinitely.

Workgroup and homegroup

A workgroup or homegroup is a group of computers on a SOHO network, typically without a server.

  • To share files and folders, users set them to ‘public’

  • Data is stored on the user device that created it.

  • The added points of failure create higher risk of data loss.

  • Newer cloud solutions provide the same features more securely.

    Workgroups and homegroups are less common. Homegroups have been removed from Windows 10 altogether.

Repositories

A repository is a network location that lets a user store, manage, track, collaborate on, and control changes to their code.

Repositories save every draft. Users can roll things back if problems occur. This can save software developers months of time.

  • GitHub
  • DockerHub

Active Directory Domain Service (AD DS)

AD is a Microsoft technology that manages domain elements such as users and computers.

  • Organizes domain structure.

  • Grants network access.

  • Connects to external domains.

  • It can be managed remotely from multiple locations.

    Active Directory Domain Services:

  • Stores centralized data, manages communication and search.

  • Authenticates users so they can access encrypted content.

  • Manages single-sign on (SSO) user authentication.

  • Limits content access via encryption.

Network drives

Network drives are installed on a network and shared with selected users. They offer the same data storage and services as a standard disk drive.

  • Network drives can be located anywhere.
  • Network drives appear alongside local drive.
  • Network drives can be installed on computers, servers, NAS units, or portable drives.

Network file and print sharing

File and Printer Sharing is part of the Microsoft Networks services.

  • Appear alongside local drives
  • Accessed via a web browser
  • Appears in the printer options

Network Storage Types

Network storage is digital storage that all users on a network can access.

  • Small networks might rely on a single device for the storage needs of 1–5 people.
  • Large networks (like the Internet) must rely on hundreds of datacenters full of servers.

Storage Area Network (SAN)

A SAN combines servers, storage systems, switches, software, and services to provide secure, robust data transfers.

  • Better application performance.
  • Central and consolidated.
  • Offsite (data protected and ready for recovery)
  • Simple, centralized management of connections and settings.

Network Attached Storage (NAS)

A NAS device is a local file server. It acts as a hard drive for all devices on a local network.

  • Convenient sharing across network devices.
  • Better performance through RAID configuration.
  • Remote Access
  • Work when the Internet is down.

Difference between NAS and SAN

Storage Types and Network Sharing Storage Types and Network Sharing

Cloud-based Storage Devices

Cloud storage

Cloud storage is when files and applications are stored and engaged with via the Internet.

  • Cloud companies manage data centers around the world to keep applications functioning properly, and user data stored securely.

    Public Cloud: Provide offsite storage for Internet users.

    Private Cloud: Provides collaboration and access to private network users.

    Hybrid Cloud: A mix of both. Provides public sharing and restricted private areas via cloud storage and cloud-hosted apps.

File, Block, and Object storage

Cloud companies use multiple data storage types depending on how often they need to access different data and the volume of that data.

File Storage

File storage saves all data in a single file and is organized by a hierarchical path of folders and subfolders. File storage uses app extensions like .jpg or .doc or .mp3.

  • Familiar and easy for most users
  • User-level customization
  • Expensive
  • Hard to manage at larger scale

Block Storage

Block Storage splits data into fixed blocks and stores them with unique identifiers. Blocks can be stored in different environments (like one block on Windows, and the rest in Linux). When a block is retrieved, it’s reassembled with associated blocks to recreate the original data.

  • Default storage for data that is frequently updated.
  • Fast, reliable, easy to manage.
  • No metadata, not searchable, expensive.
  • Used in databases and email servers.

Object Storage

Object Storage divides data into self-contained units stored at the same level. There are no subdirectories like in file storage.

  • Users metadata for fast searching.
  • Each object has a unique number.
  • Requires an API to access and manage objects.
  • Good for large amounts of unstructured data.
  • Important for AI, machine learning, and big data analytics.

Storage gateways

A storage gateway is a service that connect on-premises devices with cloud storage.

Storage Types and Network Sharing Storage Types and Network Sharing

Archival storage

Storage Types and Network Sharing Storage Types and Network Sharing

Backups and snapshots

Storage Types and Network Sharing Storage Types and Network Sharing

Subsections of Cybersecurity Essentials

Common Security Threats and Risks

Confidentiality, Integrity, and Availability Concerns

The CIA Triad

Common Security Threats and Risks Common Security Threats and Risks

Regulatory Standards

Common Security Threats and Risks Common Security Threats and Risks

Importance of Security and Information Privacy

Data and information assets

An information asset is information or data that is of value.

Common Security Threats and Risks Common Security Threats and Risks

Information assets can exist physically (paper, disks, other media) or they can exist electronically, in databases and files.

Intellectual property (IP)

IP refers to creations of the mind and generally are not tangible. It’s protected by copyright, trademark, and patent law.

  • Industrial designs

  • Trade secrets

  • Research discoveries

    Even some employee knowledge is considered intellectual property.

    Companies use a legally binding document called an NDA to prevent the sharing of sensitive information.

Digital products

Digital products are non-tangible assets a company owns.

It includes:

  • Software

  • Online music

  • E-book or audiobooks

  • Web elements like WordPress or Shopify themes

    A company must protect digital products from piracy and reserse-engineering.

  • DRM is code added directly to files that helps prevent digital assets from being copied or pirated.

  • The DMCA makes it illegal to bypass copy protections or to develop technology that helps bypass copy protections.

Confidential Information

Common Security Threats and Risks Common Security Threats and Risks

Properly handling confidentiality means:

  • Restricting access
  • Not allowing unauthorized views or copies
  • Storing information securely
  • Destroying unneeded files
  • Getting consent
  • Ensuring employees use strong passwords and change them regularly

Security Threats and Ways of Breaches

  • Hardware/physical threats due to weak security or poor practices.
  • Data leaks
  • Data Breach
  • Data Dump
  • Dumpster Diving
  • Software Threats
    • Software or license theft
    • Exploits
    • Malware
      • Viruses
        • Program viruses
        • Macro Viruses
        • Stealth viruses
        • Polymorphic Viruses
      • Worms
      • Trojans
      • Exploits
      • Spyware
      • Adware
      • Ransomware

Different Types of Security Threats

  • Impersonation
    • Public Wi-Fi
    • Websites
    • Social Engineering
  • Snooping
    • Eavesdropping
    • Man in the middle
      • Physical
      • Logical
      • Spoofing
      • Hijacking
      • Theft of browser cookies
    • Replay
  • Password cracking
    • Brute force attacks
    • Dictionary attacks
    • Rainbow attacks
  • Unauthorized information alteration
    • Threats for
      • Financial records
      • Vote totals
      • Health records
      • News stories
    • Tools to avoid this:
      • File integrity monitoring (FIM)
      • Relational database management system (RDBMS)
      • Denial of service
        • Buffer overflow
        • ICMP flood
        • SYN flood
        • DDoS attack

Password Management and Security Best Practices

Password Management Techniques

  • Password Policies
  • Creating better passwords
  • Password Confidentiality
  • Password reuse
  • Password expiration
  • 2FA
  • MFA
  • Password Managers

Identification factors

Identification factors are pieces of information that only you and an authentication service know.

Security Best Practices Security Best Practices

Single sign-on

SSO verifies users for connected accounts or apps, so they only have to log in once.

  • Businesses use SSO to simplify and speed up access to resources.
  • IT departments set up SSO, so employees are automatically logged in when they log into their work networks.

Authentication, Authorization, and Accounting

The three A’s

There are three processes involved in logging in to a network or account.

Security Best Practices Security Best Practices

Access control

  • Rules of the least privilege (ROLP)
  • Role-based access control (RBAC) follows a company’s org chart.

Authorization

Authorization is when you have permissions to access a location or do an action.

Access control must be setup before authorization is granted.

Authorization must be set up for your user account before you’re able to log in.

Authentication

Authentication is the act of confirming the identity of a user.

Security Best Practices Security Best Practices

Accounting

Digital accounting is used in troubleshooting, security analysis, forensics, and hacking.

Security Best Practices Security Best Practices

Non-repudiation

Non-repudiation is when you can’t deny being in a specific location. It guarantees a message sent between two parties is genuine.

Security Best Practices Security Best Practices

Ways to Hardening Devices

  • Device hardening
  • Patching updates
  • Firmware updates
    • Secure boot
    • TPM
    • Drive Encryption
  • Encryption
  • Device lock
  • Disable features and ports
    • Autorun
    • Bluetooth
    • NFC
  • Apps that harden
    • Antivirus
    • Anti-malware
    • Ani-spyware
    • Software firewalls and VPNS
  • Change default password and disable admin accounts

Device hardening

Hardening is the process of securing a device to minimize vulnerabilities.

Harden devices by:

  • Disabling unneeded features.

  • Updating firmware, OS, and software.

  • Using firewalls, VPN, and anti-malware.

    The more layers of security you use, the safer your data and devices will be.

Validation and Device Usage

  • Software sources validation
  • Use OEM websites
  • Avoid third-party websites or use with caution
  • Uninstall unwanted software (bloatware)
  • Keep your computer safe while browsing
  • Firewalls and VPNs
  • Disable admin accounts
  • Keep software updated

Encryption concepts

Security Best Practices Security Best Practices

Public Key Infrastructure (PKI)

PKI is when a user is validated with a digital certificate by a Certificate Authority (CA).

Cryptographic hashes

A cryptographic hash is a short string of numbers and letters created by running a password or file through an algorithm.

Email and Spam Management

Managing email

Email management is classifying email messages and deciding whether they should be saved or deleted.

  • Keep inbox clean
  • Organize with folders
  • Filter with rules
  • Unsubscribe
  • Turn off notifications

Identify and manage spam

Spam is unwanted, unsolicited email. Some spam is harmless, but it can be dangerous when scammers use it for phishing or fraud.

To reduce spam:

  • Don’t give out your email address.
  • Use throwaway accounts.
  • Configure settings to block spam.
  • Use a full-featured mail app.

Security Concerns and Safe Browsing

Application Ecosystem Security

Mobile applications

  • Weak passwords

  • Malware

  • Poorly designed apps

    Safe Browsing Practices Safe Browsing Practices

Rooting and Jail breaking

  • Add functionality but also adds vulnerability

Desktop Software

  • Weak passwords

  • Not physically secure

  • Non-HTTPS browsing

    Safe Browsing Practices Safe Browsing Practices

Business software

Business software automates transactions, mines sales data, manages information, and more.

Safe Browsing Practices Safe Browsing Practices

Corporate network

To protect files, systems, and resources, businesses must limit access.

Safe Browsing Practices Safe Browsing Practices

Safe Browsing Practices Safe Browsing Practices

Public Browsing Risks

Free and Open networks

Safe Browsing Practices Safe Browsing Practices

Public browsing risks

  • Session hijacking
  • Shoulder surfing

Social Networking Sites

Safe Browsing Practices Safe Browsing Practices

Instant messaging

Safe Browsing Practices Safe Browsing Practices

Internet browser and versions

Safe Browsing Practices Safe Browsing Practices

Cookies

Cookies are text files with small pieces of data.

Safe Browsing Practices Safe Browsing Practices

Cookie types:

  • Session cookies
  • Persistent cookies
  • Authentication cookies
  • First-party cookies
  • Third-party cookies
  • Zombie cookies

Security certificates

Secure sockets layer (SSL) certificates authenticate a website’s identity and enable an encrypted connection between a web server and a browser.

Safe Browsing Practices Safe Browsing Practices

Browser updates

Because browsers are a favorite target for hackers, keeping them updated is very important.

Safe Browsing Practices Safe Browsing Practices

Safe Browsing Techniques

Autofill management

Safe Browsing Practices Safe Browsing Practices

Browser cache and history

A browser cache is a storage data that holds downloads of web pages you’ve visited.

Safe Browsing Practices Safe Browsing Practices

Private browsing

  • You appear as a new or unknown user on the sites you visit.
  • Other people who use the device won’t see your history.
  • Cookies and site data are deleted when you exit the browser.
  • But private browsing activity isn’t hidden from your employer, school, or ISP.
  • Bookmarks you create will be kept.
  • Downloaded files are saved and may be visible to other users.

Malicious websites

Safe Browsing Practices Safe Browsing Practices

Safe websites

Identifying safe websites is more significant than ever.

Safety tips include:

  • Use the Whois Lookup tool
  • Look for reviews
  • Only visit HTTPS sites
  • Check the trust seal
  • Inspect URLs

Adware and popups

Safe Browsing Practices Safe Browsing Practices

Redirection

The aim of redirection is to point you towards certain types of advertising or dangerous code.

Redirection is caused by:

  • Unwanted toolbars or browser extensions

  • Malware that alerts searches and URLs

  • Hacked websites servers that redirect visitors

    To avoid hijacking and redirection:

  • Set automatic updates for your browser, OS, and security tools.

  • Run regular system scans.

Warning signs

Search engines use algorithms to detect harmful sites. Browsers use those results to warn users.

Safe Browsing Practices Safe Browsing Practices

Security Threats: Virtual Private Networks

Safe Browsing Practices Safe Browsing Practices

VPN types:

  • Site-to-site VPN
  • Host-to-site VPN
  • Host-to-host VPN

VPN hardware

VPN hardware devices are:

  • Devices specifically designed to create VPNs

  • Network devices with added VPN functionality

    Safe Browsing Practices Safe Browsing Practices

Internet Protocol Security (IPsec)

IPsec is a suite of network standards and protocols that use cryptography to protect data traveling over the Internet.

IPsec suite core protocols:

  1. IPsec Authentication Header (AH) protocol: - Authenticates senders and IP addresses

  2. Encapsulating Security Payload (ESP) protocol: - Encrypts data - Authenticates data and senders

The IPsec suite has two modes:

Safe Browsing Practices Safe Browsing Practices

The IPsec suite uses:

Safe Browsing Practices Safe Browsing Practices

Subsections of Cloud Computing

Overview of Cloud Computing

Definition and Essential Characteristics of Cloud Computing

Cloud computing (NIST)

A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources with minimal management effort or service provider interaction.

Examples of computing resources include:

  • Networks
  • Servers
  • Applications
  • Services

Cloud model

  • 5 Essential characteristics
  • 3 Deployment models
  • 3 Service models

5 Essential characteristics

Overview of Cloud Computing Overview of Cloud Computing

  • Cloud Computing as a Service

    Overview of Cloud Computing Overview of Cloud Computing

3 Types of cloud deployment models

  1. Public
  2. Hybrid
  3. Private

3 Service models

Three layers in a computing stack:

  1. Infrastructure (IaaS)
  2. Platform (PaaS)
  3. Application (SaaS)

History and Evolution of Cloud Computing

In the 1950s:

  • Large-scale mainframes with high-volume processing power.

  • The practice of time-sharing, or resource pooling, evolved.

  • Multiple users were able to access the same data storage layer and CPU power.

    In the 1970s:

  • Virtual Machine (VM)

  • Mainframes to have multiple virtual systems, or virtual machines, on a single physical node

Cloud: Switch from CapEx to OpEx

Overview of Cloud Computing Overview of Cloud Computing

Key Considerations for Cloud Computing

Key Drivers for moving to cloud

Overview of Cloud Computing Overview of Cloud Computing

Infrastructure and Workloads

  • The cost of building and operating data centers can become astronomical.
  • Low initial costs and pay-as-you-go attributes of cloud computing can add up to significant cost savings.

SaaS and development platforms

  • Organizations need to consider if paying for application access is a more viable option than purchasing off-the-shelf software and subsequently investing in upgrades

Speed and Productivity

  • Organizations also need to consider what it means to them to get a new application up and running in ‘x’ hours on the cloud versus a couple of weeks, even months on traditional platforms.
  • Also, the person-hour cost efficiencies increases from using cloud dashboards, real-time statistics, and active analytics.

Risk Exposure

  • Organizations need to consider the impact of making a wrong decision – their risk exposure.
  • Is it safer for an organization to work on a 12-month plan to build, write, test, and release the code if they’re certain about adoption?
  • And is it better for them to “try” something new paying-as-you-go rather than making long-term decisions based on little or no trial or adoption?

Benefits of cloud adoption

  • Flexibility
  • Efficiency
  • Strategic Value

Challenges of cloud adoption

  • Data security, associated with loss or unavailability of data causing business disruption
  • Governance and sovereignty issues
  • Legal, regulatory, and compliance issues
  • Lack of standardization in how the constantly evolving technologies integrate and interoperate
  • Choosing the right deployment and service models to serve specific needs
  • Partnering with the right cloud service providers
  • Concerns related to business continuity and disaster recovery

Key Cloud Service Providers and Their Services

Future of Cloud Computing

Overview of Cloud Computing Overview of Cloud Computing

Cloud Service Providers

Overview of Cloud Computing Overview of Cloud Computing

Alibaba Cloud

Overview of Cloud Computing Overview of Cloud Computing

Amazon Web Services

Overview of Cloud Computing Overview of Cloud Computing

Google Cloud Platform

Overview of Cloud Computing Overview of Cloud Computing

IBM Cloud

Overview of Cloud Computing Overview of Cloud Computing

Microsoft Azure

Overview of Cloud Computing Overview of Cloud Computing

Oracle Cloud

Overview of Cloud Computing Overview of Cloud Computing

Salesforce

Overview of Cloud Computing Overview of Cloud Computing

SAP

Overview of Cloud Computing Overview of Cloud Computing

Business Case for Cloud Computing

Cloud Adoption – No longer a choice

  • It is no longer a thing of the future

  • Single individual to Global multi-billion dollar enterprise, anybody can access the computing capacity they need on the cloud.

    Cloud makes it possible for businesses to:

  • Experiment

  • Fail

  • Learn Faster than ever before with low risk.

  • Businesses today have greater freedom to change course than to live with the consequences of expensive decisions taken in the past.

  • To remain, competitive, businesses need to be able to respond quickly to marketplace changes.

  • Product lifecycles have shortened, and barriers to entry have become lower.

  • The power, scalability, flexibility, and pay-as-you-go economics of cloud has made it underpinning foundation for digital transformation.

Emerging Technologies Accelerated by Cloud

Internet of Things in the Cloud

Overview of Cloud Computing Overview of Cloud Computing

Artificial Intelligence on the Cloud

AI, IoT, and the Cloud

Overview of Cloud Computing Overview of Cloud Computing

BlockChain and Analytics in the Cloud

Blockchain & Cloud

Overview of Cloud Computing Overview of Cloud Computing

A 3-Way Relationship

Overview of Cloud Computing Overview of Cloud Computing

Analytics on the Cloud

How can analytics technology leverage the cloud?

  • Track trends on social media to predict future events
  • Analyze data to build machine learning models in cognitive applications
  • Data analytics and predictions maintenance solutions for city infrastructure

Cloud Computing Models

Overview of Cloud Service Models

  • IaaS
  • PaaS
  • SaaS

IaaS – Infrastructure as a Service

It is a form of cloud computing that delivers fundamentals:

  • compute

  • network

  • storage to consumers on-demand, over the internet, on a pay-as-you-go basis.

    The cloud provider hosts the infrastructure components traditionally present in an on-premises data center, as well as the virtualization or hypervisor layer.

IaaS Cloud

The ability to track and monitor the performance and usage of their cloud services and manage disaster recovery.

Cloud Computing Models Cloud Computing Models

  • End users don’t interact directly with the physical infrastructure, but experience it as a service provided to them.

  • Comes with supporting services like auto-scaling and load balancing that provide scalability and high performance.

  • Object storage is the most common mode of storage in the cloud, given that it is highly distributed and resilient.

    Cloud Computing Models Cloud Computing Models

IaaS use cases

Test and Development

  • Enable their teams to set up test and development environments faster.
  • Helping developers focus more on business logic than infrastructure management.

Business Continuity and Disaster Recovery

  • Require a significant amount of technology and staff investment.
  • Make applications and data accessible as usual during a disaster or outage.

Faster Deployments and Scaling

  • To deploy their web applications faster.
  • Scale infrastructure up and down as demand fluctuates.

High Performance Computing

  • To solve complex problems involving millions of variables and calculations

Big Data Analysis

  • Patterns, trends, and associations requires a huge amount of processing power.
  • Provides the required high-performance computing, but also makes it economically viable.

IaaS Concerns

  • Lack of transparency
  • Dependency on a third party

PaaS – Platform as a Service

PaaS

A cloud computing model that provides a complete application platform to:

  • Develop
  • Deploy
  • Run
  • Manage

PaaS Providers Host and Manages

Installation, configuration, operation of application infrastructure:

  • Servers

  • Networks

  • Storage

  • Operating system

  • Application runtimes

  • APIs

  • Middleware

  • Databases

    User manages: Application Code

    Cloud Computing Models Cloud Computing Models

Essential Characteristics of PaaS

  • High level of abstraction
    • Eliminate complexity of deploying applications
  • Support services and APIs
    • Simplify the job of developers
  • Run-time environments
    • Executes code according to application owner and cloud provider policies
  • Rapid deployment mechanisms
    • Deploy, run, and scale applications efficiently
  • Middleware capabilities
    • Support a range of application infrastructure capabilities

Use Cases of PaaS

  • API development and management
  • Internet of Things (IoT)
  • Business analytics/intelligence
  • Business Process Management (BPM)
  • Master data management (MDM)

Advantages of PaaS

  • Scalability
  • Faster time to market
  • Greater agility and innovation

PaaS available offerings

Cloud Computing Models Cloud Computing Models

Risks of PaaS

  • Information security threats
  • Dependency on service provider’s infrastructure
  • Customer lack control over changes in strategy, service offerings, or tools

SaaS – Software as a Service

A cloud offering that provides access to a service provider’s cloud-based software.

Provider maintains:

  • Servers

  • Databases

  • Application Code

  • Security

    Providers manages application:

  • Security

  • Availability

  • Performance

SaaS Supports

  • Email and Collaboration
  • Customer Relationship Management
  • Human Resource Management
  • Financial Management

Key Characteristics

  • Multi-tenant architecture
  • Manage Privileges and Monitor Data
  • Security, Compliance, Maintenance
  • Customize Applications
  • Subscription Model
  • Scalable Resources

Key Benefits

  • Greatly reduce the time from decision to value
  • Increase workforce productivity and efficiency
    • Users can access core business apps from anywhere
    • Buy and deploy apps in minutes
  • Spread out software costs over time

Use Cases for SaaS

Organizations are moving to SaaS to:

  • Reduce on-premise IT infrastructure and capital expenditure

  • Avoid ongoing upgrades, maintenance, and patching

  • Run applications with minimal input

  • Manage websites, marketing, sales, and operations

  • Gain resilience and business continuity of the cloud provider

    Trending towards SaaS integration platforms.

SaaS Concerns

  • Data ownership and data safety
  • Third-party maintains business-critical data
  • Needs good internet connection

Deployment Models

Public Cloud

Cloud Computing Models Cloud Computing Models

Public Cloud providers in the market today

Cloud Computing Models Cloud Computing Models

Public cloud characteristics

Cloud Computing Models Cloud Computing Models

Public cloud benefits

Cloud Computing Models Cloud Computing Models

Public cloud concerns

Cloud Computing Models Cloud Computing Models

Public cloud use cases

  • Building and testing applications, and reducing time-to-market for their products and services.
  • Businesses with fluctuating capacity and resourcing needs.
  • Build secondary infrastructures for disaster recovery, data protection, and business continuity.
  • Cloud storage and data management services for greater accessibility, easy distribution, and backing up their data.
  • IT departments are outsourcing the management of less critical and standardized business platforms and applications to public cloud providers.

Private Cloud

“Cloud infrastructure provisioned for exclusive use by a single organization comprising multiple consumers, such as the business units within the organization. It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.”

Internal or External

Cloud Computing Models Cloud Computing Models

Virtual Private Cloud (VPC)

An external cloud that offers a private, secure, computing environment in a shared public cloud.

Cloud Computing Models Cloud Computing Models

Best of Both Worlds

Cloud Computing Models Cloud Computing Models

Benefits of Private Clouds

Cloud Computing Models Cloud Computing Models

Common Use Cases

Cloud Computing Models Cloud Computing Models

Hybrid Cloud

Connects an organization on-premise private cloud and third-party public cloud.

It gives them:

  • Flexibility

  • Workloads move freely

  • Choice of security and regulation features

    With proper integration and orchestration between the public and private clouds, you can leverage both clouds for the same workload. For example, you can leverage additional public cloud capacity to accommodate a spike in demand for a private cloud application also known as “cloud bursting”.

The Three Tenets

Cloud Computing Models Cloud Computing Models

Types of Hybrid Clouds

Cloud Computing Models Cloud Computing Models

Benefits

  • Security and compliance
  • Scalability and resilience
  • Resource optimization
  • Cost-saving
  • A hybrid cloud lets organizations deploy highly regulated or sensitive workloads in a private cloud while running the less-sensitive workloads on a public cloud.
  • Using a hybrid cloud, you can scale up quickly, inexpensively, and even automatically using the public cloud infrastructure, all without impacting the other workloads running on your private cloud.
  • Because you’re not locked-in with a specific vendor and also don’t have to make either-or- decisions between the different cloud models, you can make the most cost-efficient use of your infrastructure budget. You can maintain workloads where they are most efficient, spin-up environments using pay-as-you-go in the public cloud, and rapidly adopt new tools as you need them.

Hybrid Cloud Use Cases

  • SaaS integration
  • Data and AI integration
  • Enhancing legacy apps
  • VMware migration

Components of Cloud Computing

Overview of Cloud Infrastructure

After choosing the cloud service model and the cloud type offered by vendors, customers need to plan the infrastructure architecture. The infrastructure layer is the foundation of the cloud.

Region

It is a geographic area or location where a cloud provider’s infrastructure is clustered, and may have names like NA South or US East.

Availability Zones

  • Multiple Availability Zones (AZ)

  • Have their own power, cooling, networking resources

  • Isolation of zones improves the cloud’s fault tolerance, decrease latency, and more

  • very high bandwidth connectivity with other AZs, Data Centers and the internet

    Components of Cloud Computing Components of Cloud Computing

Computing Resources

Cloud providers offer several compute options:

  • Virtual Servers (VMs)
  • Bare Metal Servers
  • Serverless (Abstraction)

Storage

Virtual servers come with their default local storage, but the stored documents are lost as we destroy the servers. Other more persistent options are:

  • Traditional Data Centers:
    • Block Storage
    • File Storage
  • Often struggle with scale, performance and distributed characteristics of cloud.
  • The most common mode of storage
    • Object Storage
  • It is highly distributed and resilient

Networking

Networking infrastructure in a cloud datacenter include traditional networking hardware like:

  • routers

  • switches

    For users of the Cloud, the Cloud providers have Software Defined Networking (SDN), which allows for easier networking:

  • provisioning

  • configuration

  • management

    Components of Cloud Computing Components of Cloud Computing

    Networking interfaces in the cloud need:

  • IP address

  • Subnets

    It is even more important to configure which network traffic and users can access your resources:

  • Security Groups

  • ACLs

  • VLANs

  • VPCs

  • VPNs

    Some traditional hardware appliances:

  • firewalls

  • load balancers

  • gateways

  • traffic analyzers

    Another networking capability provided by the Cloud Providers is:

  • CDNs

Types of Virtual Machines

Shared or Public Cloud VMs

Components of Cloud Computing Components of Cloud Computing

Transient or Spot VMs

  • The Cloud provider can choose to de-provision them at any time and reclaim the resources

    These VMs are great for:

  • Non-production

  • Testing and developing applications

  • Running stateless workloads, testing scalability

  • Running big data and HPC workloads at a low cost

    Components of Cloud Computing Components of Cloud Computing

Reserved virtual server instances

  • Reserve capacity and guarantee resources for future deployments

  • If you exceed your reserved capacity, complement it with hourly or monthly VMs Note: Not all predefined VMs families or configuration may be available as reserved.

    Components of Cloud Computing Components of Cloud Computing

Dedicated Hosts

  • Single tenant isolation
  • Specify the data center and pod
  • This allows for maximum control over workload placement
  • Used for meeting compliance and regulatory requirements or licensing terms

Bare Metal Servers

A bare metal server is a single-tenant, dedicated physical server. In other words, it’s dedicated to a single customer.

  • Cloud Provider manages the server up to the OS.
  • The Customer is responsible for administering and managing everything else on the server.

Bare Metal Server Configuration

  • Preconfigured by the cloud provider
  • Custom-configured as per customer specifications
    • Processors

    • RAM

    • Hard drives

    • Specialized components

    • The OS

      Add GPUs:

  • Accelerating scientific computation
  • Data analytics
  • Rendering professional grade virtualized graphics

Characteristics

  • Can take longer to provision
  • Minutes to hours
  • More expensive than VMs
  • Only offered by some cloud providers

Workloads

  • Fully customizable/ demanding environments

  • Dedicated or long-term usage

  • High Performance Computing

  • Highly secure / isolated environments

    Components of Cloud Computing Components of Cloud Computing

Bare-metal server vs. Virtual Servers

Bare Metal Virtual Servers
Work best for: CPU and I/O intensive workloads Rapidly provisioned
Excel with the highest performance and security
Satisfy strict compliance requirements Provide an elastic and scalable environment
Offer complete flexibility, control, and transparency
Come with added management and operational over head Low cost to use

Secure Networking in Cloud

Networking in Cloud vs. On Premise

Components of Cloud Computing Components of Cloud Computing

To create a network in cloud:

  • Define the size of the Network using IP address range, e.g.,: 10.10.0.0/16

    Components of Cloud Computing Components of Cloud Computing

Direct Connectivity

Components of Cloud Computing Components of Cloud Computing

Building a Cloud

It entails creating a set of logical constructs that deliver networking functionality akin to data center networks for securing environments and ensuring high performing business applications.

Containers

Containers are an executable unit of software in which application code is packaged, along with its libraries and dependencies, in common ways so that it can be run anywhere—desktops, traditional IT, or the cloud. Containers are lighter weight and consume fewer resources than Virtual Machines.

  • Containers streamline development and deployment of cloud native applications
  • Fast
  • Portable
  • Secure

Cloud Storage and Content Delivery Networks

Basics of Storage on the Cloud

  • Direct Attached/Local Storage

    • Within the same server or rack
    • Fast
    • Use for OS
    • Not suitable
      • Ephemeral (Temporary)
      • Not shared
      • Non-resilient
  • File Storage

    • Disadvantages
      • Slower
    • Advantages
      • Low cost

      • Attach to multiple servers

        Components of Cloud Computing Components of Cloud Computing

  • Block Storage

    • Advantages
      • Faster read/write speeds

        Components of Cloud Computing Components of Cloud Computing

  • Object Storage

  • Disadvantages

    • Slowest speed
  • Advantages

    • Least expensive

    • Infinite in size

    • Pay for what you use

      Components of Cloud Computing Components of Cloud Computing

File Storage

Like Direct attached:

  • Attached to a compute node to store data

    Unlike Direct attached:

  • Less expensive

  • More resilient to failure

  • Less disk management and maintenance for user

  • Provision much larger amounts of Storage

    File storage is mounted from remote storage appliances: Components of Cloud Computing Components of Cloud Computing

  • Resilient to failure

  • Offer Encryption

  • Managed by service provider

    File storage is mounted on compute nodes via Ethernet networks: Components of Cloud Computing Components of Cloud Computing

Multiple Compute Nodes

  • File storage can be mounted onto more than one compute node
  • Common Workloads:
    • Departmental file share

    • ‘Landing zone’ for incoming files

    • Repository of files

      i.e., speed variance is not an issue

  • Low cost database storage

IOPS

Input/Output Operations Per Second – the speed at which disks can write and read data.

  • Higher IOPS value = faster speed of underlying disk
  • Higher IOPS = higher costs
  • Low IOPS value can become a bottleneck

Block Storage

What is Block Storage?

Block storage breaks files into chunks (or block) of data.

  • Stores each block separately under a unique address.

  • Must be attached to a compute node before it can be utilized.

    Advantages:

  • Mounted from remote storage appliances

  • Extremely resilient to failure

  • Data is more secure

    Mounted as a volume to compute nodes using a dedicated network of optical fibers:

  • Signals move at the speed of light

  • Higher price-point

  • Perfect for workloads that need low-latency

  • Consistent high speed

  • Databases and mail servers

  • Not suitable for shared storage between multiple servers

IOPS

For block storage, as it is for file storage, you need to take the IOPS capacity of the storage into account:

  • Specify IOPS characteristics
  • Adjust the IOPS as needed
  • Depending on requirements and usage behavior

Common Attributes of File and Block Storage

  • Block and File Storage is taken from appliances which are maintained by the service provider
  • Both are highly available and resilient
  • Often include data encryption at rest and in transit

Differences: File Storage vs. Block Storage

File Storage Block Storage
Attached via Ethernet network Attached via high-speed fiber network
Speeds vary, based on load Only attach to one node at a time
Can attach to multiple computer nodes at once
Good for file share where:
1) Fast connectivity isn’t required Good for applications that need:
2) Cost is a factor 1) Consistent fast access to disk

Remember: Consider workload IOPS requirements for both storage types.

Object Storage

  1. Object storage can be used without connecting to a particular compute node to use it:

Components of Cloud Computing Components of Cloud Computing

  1. Object storage is less expensive than other cloud storage options
  2. The most important thing to note about Object Storage is that it’s effectively infinite - With Object Storage, you just consume the storage you need and pay per gigabyte cost for what you use.

When to use Object Storage:

  • Good for large amounts of unstructured data
  • Data is not stored in any kind of hierarchical folder or directory structure

Object Storage Buckets

Components of Cloud Computing Components of Cloud Computing

Components of Cloud Computing Components of Cloud Computing

Managed by Service Provider

Components of Cloud Computing Components of Cloud Computing

Object Storage – Resilience Options

Components of Cloud Computing Components of Cloud Computing

Object Storage – Use Cases

  • Any Data which is static and where fast read and write speeds are not necessary
    • Text files

    • Audio files

    • Video files

    • IoT Data

    • VM images

    • Backup files

    • Data Archives

      Not suitable for operating systems, databases, changing content.

Object Storage – Tiers and APIs

Object Storage Tiers

Components of Cloud Computing Components of Cloud Computing

Standard Tier

  • Store objects that are frequently accessed
  • Highest per gigabyte cost

Vault/Archive Tier

  • Store objects that are accessed once or twice a month
  • Low storage cost

Cold Vault Tier

  • Store data that is typically accessed once or twice a year
  • Costs just a fraction of a US cent per/GB/month
Automatic archiving rules
  • Automatic archiving rules for your data
  • Automatically be moved to a cheaper storage tier if object isn’t accessed for long

Object Storage – Speed

  • Doesn’t come with IOPS options
  • Slower than file or block storage
  • Data in ‘cold vault’ buckets, can take hours for retrieval
  • Object storage not suitable for fast access to files.

Object Storage – Costs

  • Object Storage is priced per/GB

  • Other costs related to retrieval of the data e.g., Higher access costs for cold vault tiers

    Ensure data is stored in correct tier based on frequency of access.

Application Programming Interface, or API

Components of Cloud Computing Components of Cloud Computing

Object Storage – Backup solutions

  • Effective solution for Backup and Disaster Recovery
  • Replacement for offsite backups
  • Many backup solutions come with built-in options for Object Storage on Cloud
  • More efficient than tape backups for geographic redundancy

CDN – Content Delivery Network

  • Accelerates content delivery to users of the websites, by caching the content in data centers near their locations.
  • Makes websites faster.
  • Reduction in load on servers
  • Increase uptime
  • Security through obscurity

Hybrid Multi-Cloud, Microservices, and Serverless

Hybrid Multi-cloud

A computing environment that connects an organization’s on-premise private cloud and third-party public cloud into a single infrastructure for running the organization’s applications.

Hybrid Multicloud use cases

  • Cloud scaling
  • Composite cloud
  • Modernization
  • Data and AI
  • Prevent lock-in to a particular cloud vendor and having a flexibility to move to a new provider of choice

Microservices

Microservices architecture:

  • Single application
  • coupled and independently deployable smaller components or services
    • These services typically have their own stack running on their own containers.
  • They communicate with one another over a combination of:
    • APIs
    • Even streaming
    • Message brokers

What this means for businesses is:

  • Multiple developers working independently
  • Different stacks and runtime environments
  • Independent scaling

Serverless Computing

Offloads responsibility for common infrastructure management tasks such as:

  • Scaling
  • Scheduling
  • Patching
  • Provisioning

Key attributes

Attributes that distinguish serverless computing from other compute models:

  • No provisioning of servers and runtimes
  • Runs code on-demand, scaling as needed
  • Pay only when invoked and used i.e., not when underlying computer resources are idle.

Serverless

  • Abstracts the infrastructure away from developers
  • Code executed as individual functions
  • No prior execution context is required

A Scenario

Emerging Trends and Practices Emerging Trends and Practices

Serverless computing services

  • IBM Cloud Functions
  • AWS Lambda
  • Microsoft Azure Functions

Determining Fit with Serverless

  • Evaluate application characteristics

  • Ensure that the application is aligned to serverless architecture patterns

    Applications that qualify for a serverless architecture include:

  • Short-running stateless functions

  • Seasonal workloads

  • Production volumetric data

  • Event-based processing

  • Stateless microservices

Use Cases

Serverless architecture are well-suited for use cases around:

  • Data and event processing

  • IoT

  • Microservices

  • Mobile backends

    Serverless is well-suited to working with:

  • Text

  • Audio

  • Image

  • Video

    Tasks:

  • Data enrichment

  • Transformation

  • Validation and cleansing

  • PDF processing

  • Audio normalization

  • Thumbnail generation

  • Video transcoding

  • Data search and processing

  • Genome processing

    Data Streams:

  • Business

  • IoT sensor data

  • Log data

  • Financial market data

Challenges

Emerging Trends and Practices Emerging Trends and Practices

Vendor Dependent Capabilities

  • Authentication

  • Scaling

  • Monitoring

  • Configuration management

    Emerging Trends and Practices Emerging Trends and Practices

Cloud Native Applications, DevOps, and Application Modernization

Cloud Native Applications

  • Developed to work only in the cloud environment
  • Refactored and reconfigured with cloud native principles

Development Principles

Whether creating a new cloud native application or modernizing an existing application:

  • Microservices Architecture
  • Rely on Containers
  • Adopt Agile Methods

Benefits

  • Innovation
  • Agility
  • Commoditization

DevOps on the Cloud

What is DevOps?

Dev Teams:

  • Design Software

  • Develop Software

  • Deliver Software

  • Run Software

    Ops Teams

  • Monitoring

  • Predicting Failure

  • Managing Environment

  • Fixing Issues

    A collaborative approach that allows multiple stakeholders to collaborate:

  • Business owners

  • Development

  • Operations

  • Quality assurance

The DevOps Approach

It applies agile and lean thinking principles to all stakeholders in an organization who develop, operate, or benefit from the business’s software systems, including customers, suppliers, partners. By extending lean principles across the software supply chain, DevOps capabilities improve productivity through accelerated customer feedback cycles, unified measurements and collaboration across an enterprise, and reduced overhead, duplication, and rework.

Using the DevOps approach:

  • Developers can produce software in short iterations
  • A continuous delivery schedule of new features and bug fixes in rapid cycles
  • Businesses can seize market opportunities
  • Accelerated customer feedback into products

DevOps Process

  • Continuous Delivery

  • Continuous Integration

  • Continuous Deployment

  • Continuous Monitoring

  • Delivery Pipeline

    Emerging Trends and Practices Emerging Trends and Practices

DevOps and Cloud

With its near limitless compute power and available data and application services, cloud computing platforms come with their own risks and challenges, which can be overcome by DevOps:

  • Tools

  • Practices

  • Processes

    DevOps provides the following solutions to cloud’s complexities:

  • Automated provisioning and installation

  • Continuous integration and deployment pipelines

  • Define how people work together and collaborate

  • Test in low-cost, production-like environments

  • Recover from disasters by rebuilding systems quickly and reliably

Application Modernization

Enterprise Applications

Emerging Trends and Practices Emerging Trends and Practices

Application Modernization

Architecture: Monoliths > SOA (Service Oriented Architecture) > Microservices

Infrastructure: Physical servers > VM > Cloud

Delivery: Waterfall > Agile > DevOps

Cloud Security, Monitoring, Case Studies, Jobs

What is Cloud Security

The security in context of cloud is a shared responsibility of:

  • User

  • Cloud Provider

  • Protect data

  • Manage access

    SEC DevOps

  • Secure Design

    • Secure Build
      • Manage Security

Identity and Access Management

Biggest cloud security concerns are:

  • Data Loss and Leakage

  • Unauthorized Access

  • Insecure Interfaces and APIs

    Identity and Access Management are:

  • First line of defense

  • Authenticate and authorize users

  • Provide user-specific access

Main types of users

A comprehensive security strategy needs to encompass the security needs of a wide audience:

  • Organizational users

  • Internet and social-based users

  • Third-party business partner organizations

  • Vendors

    There are three main type of users:

  • Administrative users

  • Developer users

  • Application users

Administrative Users

Administrators | Operators | Mangers roles that typically create, update, and delete application and instances, and also need insight into their team members’ activities.

An attacker with administrative access could:

  • Steal data from databases
  • Deploy malicious applications
  • Deface or destroy existing applications

Developer Users

Application developers | Platform developers | Application publishers

Can:

  • Read sensitive information
  • Create applications
  • Update applications
  • Delete applications

Application Users

Users of the cloud-hosted applications

Authentication and User Identity

Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

Multifactor authentication

It is used to combat identity theft by adding another level of authentication for application users.

Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

Cloud Directory Services

They are used to securely manage user profiles and their associated credentials and password policy inside a cloud environment.

  • Applications hosted on the cloud do not need to use their own user repository

Reporting

It helps provide a user-centric view of access to resources or a resource-centric view of access by users:

  • which users can access which resources

  • changes in user access rights

  • access methods used by each user

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

Audit and Compliance

Critical service within identity and access management framework, both for cloud provider, and cloud consumer.

Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

User and service access management

It enables cloud application/service owners to provision and de-provision:

Streamline access control based on:

  • Role
  • Organization
  • Access policies

Mitigating Risks

Some of the controls that can help secure these sensitive accounts include:

  • Provisioning users by specifying roles on resources for each user
  • Password policies that control the usage of special characters, minimum password lengths, and other similar settings
  • Multifactor authentication like time-based one-time passwords
  • Immediate provisioning of access when users leave or change roles

Access Groups

A group of users and service IDs created so that the same access can be assigned to all entities within the group with one or more access policies.

Access Policies

Access policies define how users, service IDs, and access groups in the account are given permission to access account resources.

Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

Access Group Benefits

  • Streamline access assignment process vs. assigning individual user access

  • Reduce number of policies

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

Cloud Encryption

Encryption

It plays a key role on cloud, and is often referred to as the last line of defense, in a layered security model.

  • Encrypts Data
  • Data Access Control
  • Key management
  • Certificate management

Definition

Scrambling data in a way that makes it illegible.

Encryption Algorithm: Defines rules by which data will be transformed

Decryption Key: Defines how encrypted data will be transformed back to legible data.

It makes sure:

  • Only authorized users have access to sensitive data.
  • When accessed without authorization, data is unreadable and meaningless.

Cloud Encryption Services

  • Can be limited to encryption of data that is identified as sensitive, or
  • end-to-end encryption of all data uploaded to the cloud

Data Protection States

Encryption at Rest:

  • Protects stored data
  • Multiple encryption options:
    • Block and file storage

    • Built-in for object storage

    • Database encryption

      Encryption in Transit:

  • Protects data while transmitting
  • Includes encrypting before transmission
  • Authenticates endpoints
  • Decrypts data on arrival
    • Secure Socket Layer (SSL)

    • Transport Layer Security (TSL)

      Encryption in Use:

  • Protects data in use in memory
  • Allows computations to be performed on encrypted text without decryption

Client or Server-side Encryption

Cloud storage encryption could be server-side or client-side.

Server-side:

  • Create and manage your own encryption keys, or

  • Generate and manage keys on cloud

    Client-side:

  • Occurs before data is sent to cloud

  • Cloud providers cannot decrypt hosted data

    There is a need to implement a singular data protection strategy across an enterprise’s on-premise, hybrid, and multi-cloud deployments.

Multi-Cloud Data Encryption

Features:

  • Data access management

  • Integrated key management

  • Sophisticated encryption

    Multi-cloud encryption console:

  • Define and manage access policies

  • Create, rotate, and manage keys

  • Aggregate access logs

Key Management

Encryption doesn’t eliminate security risk.

  • It separates the security risk from the data itself.
  • Keys need to be managed and protected against threats.

Key Management Services

They enable customers to:

  • Encrypt sensitive data at rest
  • Easily create and manage the entire lifecycle of cryptographic keys
  • Protect data from cloud service providers

Key Management Best Practices

  • Storing encryption keys separately from the encrypted data
  • Taking key backups offsite and auditing them regularly
  • Refreshing the keys periodically
  • Implementing multifactor authentication for both the master and recovery keys

Cloud Monitoring Basics and Benefits

Cloud Monitoring Solutions

Monitoring performance across an entire stack of applications and services can be time-consuming and draining on internal resources.

Cloud Monitoring Assessment

Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

Cloud Monitoring Features

Cloud monitoring includes:

  • Strategies

  • Practices

  • Processes

    Used for:

  • Analyzing

  • Tracking

  • Managing services and apps

    It also serves to provide actionable insights that can help improve availability and user experience.

Cloud Monitoring Helps to:

  • Accelerate the diagnosis and resolution of performance incidents
  • Control the cost of your monitoring infrastructure
  • Mitigate the impact of abnormal situations with proactive notifications
  • Get critical Kubernetes and container insights for dynamic microservice monitoring
  • Troubleshoot your applications and infrastructure

Cloud Monitoring Solutions Provide:

  • Data in real-time with round the clock monitoring of VMs, services, databases, apps
  • Multilayer visibility into application, user, and file access behavior across all apps
  • Advanced reporting and auditing capabilities for ensuring regulatory standards
  • Large-scale performance monitoring integrations across multicloud and hybrid cloud

Cloud Monitoring Categories

Infrastructure

  • Help identify minor and large-scale failures

    • So that developers can take corrective action

    Database

  • Help track processes, queries, and availability of services

    • To ensure accuracy and reliability

      Application Performance and Monitoring

  • Help improve user experience

  • Meet app and user SLAs

    • Minimize downtime and lower operational costs

Cloud Monitoring Best Practices

To get the most benefit from your cloud-based deployments, you can follow some standard cloud monitoring best practices.

  1. Leverage end-user experience monitoring solutions
  2. Move all aspects of infrastructure under one monitoring platform
  3. Use monitoring tools that help track usage and cost
  4. Increase cloud monitoring automation
  5. Simulate outages and breach scenarios

Cloud monitoring needs to be a priority for organizations looking to leverage the benefits of cloud technologies.

Case Studies and Jobs

Case Studies in Different Industry Verticals

  • The Weather Company migrating to the cloud to reliably deliver critical weather data at high speed, especially during major weather events such as hurricanes and tornadoes
  • American Airlines, using the cloud platform and technologies to deliver digital self-service tools and customer value more rapidly across its enterprise
  • Cementos Pacasmayo, achieving operational excellence and insight to help drive strategic transformation and reach new markets using cloud services
  • Welch choosing cloud storage to drive business value from hybrid cloud
  • Liquid Power using cloud-based SAP applications to fuel business growth

Career Opportunities and Job Roles in Cloud Computing

  • Cloud Developers

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

  • Cloud Integration Specialists

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

  • Cloud Data Engineer

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

  • Cloud Security Engineers

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

  • Cloud DevOps Engineers

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs

  • Cloud Solutions Architects

    Cloud Security, Monitoring, Case Studies, Jobs Cloud Security, Monitoring, Case Studies, Jobs