Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
23Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Re Des

Re Des

Ratings: (0)|Views: 27,289|Likes:
Published by firefoxa

More info:

Published by: firefoxa on Jun 22, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/04/2013

pdf

text

original

 
Redes Libres - Sergio A. Alonso - Técnicas para armado de redes LAN utilizando Software Libre - 1/217
 v0.58
Técnicas para armado de redes LAN utilizando Software Libre
 
Redes Libres - Sergio A. Alonso - Técnicas para armado de redes LAN utilizando Software Libre - 2/217
Redes Libres
Técnicas para armado de redes LAN utilizando Software LibreLicencia y derechos de uso del presente documento al final del documento
[ Copyrigth 2007
Sergio A. Alonso
][ E-mail / MSN: sergio (at) eim.esc.edu.ar ][ Jabber: karancho (at) lugmen.org.ar ][ www.eim.esc.edu.ar - Dto. Sistemas ][ www.bunker.org.ar - Webmaster ][ Hi, I am the root. If you see me laughing, ][ you'd better have a backup ready. ]
 
Redes Libres - Sergio A. Alonso - Técnicas para armado de redes LAN utilizando Software Libre - 3/217
Tabla de Contenidos
Índice de contenido
Introducción......................................................................................................................................................................9Breve Manual de Supervivencia para la Materia...........................................................................................................10Licencia, Versiones y Contacto.................................................................................................................................10Enlaces y Agradecimientos........................................................................................................................................11Perfil del Administrador de Redes.............................................................................................................................12Software Libre...........................................................................................................................................................12Enumeración de Sistemas Operativos de Redes.......................................................................................................13Unix.......................................................................................................................................................................13Unix propietarios..............................................................................................................................................13Unix Libre: La familia FreeBSD.....................................................................................................................13MAC OS/X.......................................................................................................................................................15Linux.....................................................................................................................................................................17Debian: es la distribución libre por definición. ..............................................................................................17Ubuntu: ............................................................................................................................................................17Knoppix............................................................................................................................................................19Linux “Comerciales”: SuSE, RedHat, Mandriva............................................................................................19Marco General................................................................................................................................................................20Breve Histórico..........................................................................................................................................................20El modelo de los 70: los mainframes Unix y los sistemas patrimoniales............................................................20Ventajas:...........................................................................................................................................................21Desventajas: ....................................................................................................................................................21El modelo de los 80: DOS y Novell.....................................................................................................................22El modelo de los 90: WFW 3.11, 9x, NT y las redes Peer to Peer. Internet......................................................23El modelo actual: Unix / Linux / Windows 2000/XP. Internet insegura. ...........................................................24Windows actualmente......................................................................................................................................24GNU/Linux y BSD: las Comunidades Abiertas..............................................................................................25Enfoque a los servicios...............................................................................................................................25¿Todo el software debería ser libre? ..........................................................................................................26De Usuarios a Hackers................................................................................................................................26Libera rápido, y a menudo..........................................................................................................................26Como convertirse en Hacker.....................................................................................................................27Recuperación de Hardware Obsoleto.........................................................................................................27¿Cual es la razón por la cual se usa Windows?....................................................................................................28¿Unix / Linux es para mí?.....................................................................................................................................28Teoría: Los "ladrillos" de la red:....................................................................................................................................30Interfaces:...................................................................................................................................................................30Modem, o conexión "Dial Up".............................................................................................................................30ADSL....................................................................................................................................................................31Configuración...................................................................................................................................................31Clases de Modems ADSL:...............................................................................................................................31Servidores Caseros con ADSL........................................................................................................................32Cablemodem.........................................................................................................................................................32Cable Serie............................................................................................................................................................32Cable paralelo.......................................................................................................................................................33Placas de Red........................................................................................................................................................33Ethernet (puertos ISA, y PCI con Plug'n'Play)..............................................................................................33Configuración..............................................................................................................................................34Hardware comúnmente utilizado en una red Ethernet...............................................................................34 NIC, o adaptador de red Ethernet..........................................................................................................34Concentrador o HUB:............................................................................................................................34Switch.....................................................................................................................................................34Enrutador o Router.................................................................................................................................35

Activity (23)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
michael_2534 liked this
Quethzel liked this
a1a1a1s2s2 liked this
cx5caf liked this
Marcos Silva liked this
badtornado liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->