Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Resumen— esta actividad tiene como finalidad I. OBJETIVOS
profundizar la instalación e implementación de una red
telemática teniendo en cuenta la administración e OBJETIVO GENERAL
implementación de redes telemáticas, los protocolos de Implementar la red telemática trabajada en la actividad
análisis y gestión de redes telemáticas, monitorización anterior teniendo en cuenta la administración e
remota de red (RMON), Redes Telemáticas de nueva implementación de redes telemáticas
generación e internet de las cosas, Normas de la IEEE para
el diseño de las redes y protocolos para monitoreo. OBJETIVOS ESPECIFICOS
Diseñar una red ipv6
Palabras claves:
Implementar sistema de televisión
Monitorización: El Sistema de Monitorización
Remota (SMR) de Zenithal es un avanzado sistema Incluir teléfonos en la red en la cual se puedan
orientado al control remoto, localización y telemetría comunicar de una oficina a otra.
de emplazamientos de telecomunicación, de huertos Diferenciar la configuración entre ipv4 y ipv6
de energía solar
Protocolos: es un conjunto de reglas que definen
como se va a desarrollar la comunicación entre los II. LINK DE LAS PRESENTACIONES
nodos de una red de ordenadores. INDIVIDUALES
Abstract-- This activity aims to deepen the installation Ciclo de vida de las redes telemáticas
and implementation of a telematic network taking into
account the administration and implementation of https://www.powtoon.com/c/d3v04AjJTQj/1/mAutor
telematic networks, telematic communication networks, Autor: Elsa Yaneth González
remote network monitoring (RMON), new generation
telematic networks and Internet of the things, IEEE
standards for the design of networks and protocols for Administración de redes telemáticas
monitoring. https://prezi.com/view/T4l41oho9fGpdfVzE5oM/
Autor: Graciela Blanco Bonilla
The main concepts to be defined are the elements that One of the great advantages of using a NOC is the
participate in the management of the network. It is possibility of automating management processes.
what they will be called ENTITIES. Three types of
different entities will be distinguished. 2. Monitor the network to guarantee service levels
MANAGEMENT ENTITY: it is the team (there can in the present and the future.
be several teams where the software is located Another good practice is to monitor the network in
(network administrator service) that is used to control order to monitor what you are doing at all times. This
the management of the network, it will be the point can also be useful for analyzing future needs.
from where the network administrator works. During the monitoring, the volume and type of traffic
following tasks. that is being produced can be analyzed, from which
Collect information from managed devices. statistics can be extracted for the changes that will be
Process and analyze the information obtained. needed in the future.
Present said information for its interpretation
and for decision making. 3. Control, analyze, test and register changes in the
MANAGED DEVICES: contains the managed network.
objects. For example, it may be a computer (managed • The control of these changes (who does it, why, how
device) that contains various elements that you want and when). Different versions of the data must be
to manage, such as the CPU, the network card, the maintained. This is the case of the device
memory, etc. The managing entity obtains and, configuration files.
perhaps, modifies the information of those objects. To • Previous analysis (by appropriate personnel).
do this, in the managed device is the management • Test after the changes have the desired effect. If this
agent, the software that allows remote management is not achieved, it may require a new analysis.
in the managed device. A managed device can be any • In the end, a record is kept of the changes made that
computer that can connect to the network and in turn help control them and the future changes.
communicate, any computer, printer, server, etc.
MANAGEMENT PROTOCOLS: they are the ones 4. Maintain and ensure the safety of the network.
The maintenance of security emphasizes three
that establish the rules of communication between the
fundamental pillars: confidentiality, integrity and
managing entity and the management agents. These
availability.
rules define the types of messages, the scripts that can
• Confidentiality: it is about that the information can
be used and the security to be used in communication.
only be comprehensible or read by the subject or
system that is authorized.
• Integrity: is the quality that has an information
(document or file) that has not been altered and that
also allows to verify that no manipulation has
occurred in the original information.
• Availability: is the capacity of a service, data or
system to be accessible and usable by users (or
processes) authorized when they require it.
1. Si se detecta errores
1. Se realiza el
se corrigen, se
planeamiento lógico y
reconfigura un
físico de la red.
dispositivo, se cambia
4
cosas que contenga el nombre del servicio, requerimientos y Madrid, ES: IC Editorial. Recuperado
justificación del servicio a implementar a través de IoT. de: https://bibliotecavirtual.unad.edu.co:2538/lib/unadsp/reader.
action?docID=4310542&ppg=34
Recursos IoT [3] Santos, M. (2014). Sistemas telemáticos. Protocolo IPv6.
Nombre requerimiento justificacion (Páginas. 309 - 312). Madrid, ES: RA-MA Editorial.
Camaras web Ordenador. Es necesario ya Recuperado
Controlador. que la sede se va a de https://bibliotecavirtual.unad.edu.co:2538/lib/unadsp/reader.a
implementar ction?ppg=308&docID=3228770&tm=1542655019158
telemedicina, asi [4] Marugan, J. (s.f.). oa.upm.es. Obtenido de
los usuarios http://oa.upm.es/4976/3/PFC_JUAN_MARUGAN_MERINERO
podran interectuar x.pdf
con los medicos.
Detectores Punto de red. Para identificar [5] Reader Digital Books. (s.f.). Obtenido de
Punto de movimientos http://reader.digitalbooks.pro/content/preview/books/37922/boo
k/OEBPS/Text/chapter2.html
corriente. generales de la
Ordenador para sede. [6] Universidad Autónoma del Estado de Hidalgo. (s.f.). Obtenido
monitoriar. de
Programa https://www.uaeh.edu.mx/scige/boletin/huejutla/n10/r1.htm
administrador l
para administrar.
[7] wikibooks.org. (17 de 02 de 2018). Obtenido de
Impresoras Ordenador. Es muy nesecaria https://es.wikibooks.org/wiki/Redes_inform
Controlador. ya que los usuarios %C3%A1ticas/Protocolos_TCP_y_UDP_en_el_nivel_de_tr
Punto de red. podran imprimir ansporte
Puntyo de sus citas y
corriente. formulas indicadas [8] reader.digitalbooks.pro. (s.f.). Retrieved from
por los medicos. http://reader.digitalbooks.pro/content/preview/books/37922/boo
k/OEBPS/Text/chapter2.html
Sensores de Punto de red. Es ideal porque
conteo Controlador. sirve para llevar
Programa para un conteo de los
administrar. usuartios que
visitan la sede y
asi demostrar que
la telemedicina
seria un metodo
comodo, facir y
rapido para los
usuarios.
Puerta Sensores. Para mayor
aumomatica Punto de red. comodidad de los
Punto de usuarios al visitar
corriente. la sede.
Amdministrador.
v. CONCLUSIONES
VI. REFERENCIAS
[1] Calvo, G. Á. L. (2014). Gestión de redes telemáticas (UF1880),
Ciclo de Vida de las Redes Telemáticas. (Páginas 7 – 23).
Madrid, ES: IC Editorial. Recuperado de
http://bibliotecavirtual.unad.edu.co:2077/lib/unadsp/reader.actio
n?ppg=12&docID=11148764&tm=1481850490574