Network Essentials: TCP/IP and Basic Terminology

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is the primary function of a computer network?

  • To connect devices for sharing resources. (correct)
  • To isolate devices from external threats.
  • To perform complex calculations quickly.
  • To limit access to resources.

Which of the following is considered a 'medium' in the context of network elements?

  • Protocols
  • Wireless (correct)
  • Routers
  • Switches

What is the primary role of a Network Interface Card (NIC) in a computer network?

  • To uniquely identify a device on the internet.
  • To manage IP addresses within the network.
  • To establish communication rules for network entities.
  • To enable the device to directly access the network. (correct)

Which of the following devices operates at a higher level by enabling communication between different networks?

<p>Router (C)</p> Signup and view all the answers

What is one key difference between a Local Area Network (LAN) and a Wide Area Network (WAN)?

<p>LANs operate in small geographical areas, while WANs connect large geographical areas such as countries. (A)</p> Signup and view all the answers

Which statement accurately describes the ownership of the Internet?

<p>No single entity owns the Internet; various organizations own pieces of its infrastructure. (A)</p> Signup and view all the answers

In a client-server network architecture, what distinguishes servers from clients?

<p>Servers are dedicated to providing services to other nodes. (A)</p> Signup and view all the answers

What is the fundamental reason for using protocols in computer networks?

<p>To ensure efficient and reliable communication. (A)</p> Signup and view all the answers

Which of the following is a key characteristic of the TCP/IP protocol suite?

<p>It is an open standard protocol. (A)</p> Signup and view all the answers

In the TCP/IP model, what is the role of the Network Access Layer?

<p>To manage the physical connections and data link protocols. (D)</p> Signup and view all the answers

What is the purpose of a MAC address?

<p>To uniquely identify a hardware device on a network. (A)</p> Signup and view all the answers

What is the significance of the IPv4 address space?

<p>It uniquely identifies each device on an IP network layer with a 32-bit address. (D)</p> Signup and view all the answers

What is the primary function of Network Address Translation (NAT)?

<p>To translate private IP addresses to public IP addresses. (C)</p> Signup and view all the answers

How does IPv6 address the limitations of IPv4?

<p>By providing a significantly larger address space using a 128-bit address. (B)</p> Signup and view all the answers

Which layer in the TCP/IP model ensures reliable data delivery between applications?

<p>Transport Layer (A)</p> Signup and view all the answers

What is the range of port numbers typically used for well-known ports?

<p>0 to 1023 (B)</p> Signup and view all the answers

How does a client typically resolve a domain name to an IP address?

<p>By querying a DNS server. (B)</p> Signup and view all the answers

Which protocol is commonly used for transferring files between a client and a server?

<p>FTP (A)</p> Signup and view all the answers

What is the function of the Simple Mail Transfer Protocol (SMTP)?

<p>To send email messages between mail servers. (D)</p> Signup and view all the answers

Which of the following is a primary goal of information security?

<p>Ensuring system availability, integrity, and confidentiality. (C)</p> Signup and view all the answers

In the context of cybersecurity, what does 'integrity' refer to?

<p>Maintaining the consistency and accuracy of data. (A)</p> Signup and view all the answers

In risk assessment, what is the relationship between threats and vulnerabilities?

<p>Risk is the product of threats and vulnerabilities. (C)</p> Signup and view all the answers

What characterizes a 'passive attack' in cybersecurity?

<p>Interception or monitoring of data without altering it. (B)</p> Signup and view all the answers

Which of the following best describes social engineering?

<p>Manipulating individuals to reveal sensitive information. (A)</p> Signup and view all the answers

What is the primary goal of a phishing attack?

<p>To gain unauthorized access to sensitive information. (A)</p> Signup and view all the answers

What typically occurs in a 'session hijacking' attack?

<p>An attacker gains control over a user's active session. (C)</p> Signup and view all the answers

Which type of password attack involves trying common words and phrases?

<p>Dictionary attack (D)</p> Signup and view all the answers

What is a key characteristic of a Trojan Horse malware?

<p>It appears as a harmless file but performs malicious actions. (A)</p> Signup and view all the answers

What is the main difference between a virus and a worm?

<p>Viruses require a host program to execute, while worms can spread independently. (B)</p> Signup and view all the answers

What is the primary objective of a Denial of Service (DoS) attack?

<p>To disrupt access to a service or resource. (C)</p> Signup and view all the answers

How does a Distributed Denial of Service (DDoS) attack differ from a DoS attack?

<p>A DDoS attack originates from multiple compromised systems. (D)</p> Signup and view all the answers

Which statement best describes the functionality of a firewall?

<p>It controls network traffic based on security rules. (D)</p> Signup and view all the answers

What is a key difference between static and dynamic packet filtering?

<p>Dynamic packet filtering tracks the state of network connections. (C)</p> Signup and view all the answers

What is the primary purpose of a VPN?

<p>To encrypt network traffic and provide secure remote access. (D)</p> Signup and view all the answers

What actions are preformed by Intrusion Detection Systems (IDS)?

<p>Analyzing network traffic and alerting administrators to potential threats. (C)</p> Signup and view all the answers

Which statement describes symmetric encryption?

<p>It uses same key for both encryption and decryption. (A)</p> Signup and view all the answers

What is a primary characteristic of a distributed system?

<p>It appears to the user as a single computing unit. (B)</p> Signup and view all the answers

Why is reliability improved through the use of a distributed system?

<p>The failure of one part does not halt the whole system. (D)</p> Signup and view all the answers

In a client-server distributed architecture, what is the role of the server?

<p>Provides resourse as databases, files, or web services. (B)</p> Signup and view all the answers

Which of the following is a characteristic of peer-to-peer architecture?

<p>Each component can be both a client or a server. (B)</p> Signup and view all the answers

Why is cloud computing considered an example of a distributed system?

<p>It provides access to computing resources over a network. (C)</p> Signup and view all the answers

What is the main benefit of virtualization?

<p>Run multiple, different OS on the same physical hardware. (A)</p> Signup and view all the answers

What is a crucial feature of cloud computing?

<p>Rapid on-demand resource provision. (C)</p> Signup and view all the answers

Flashcards

Computer Network

A collection of computers and devices connected to share resources.

NIC

Hardware that enables a device to access a network directly.

MAC address

A unique physical address burned on the NIC card.

IP Address

A logical address used to identify each device on an IP network.

Signup and view all the flashcards

Protocols

Rules that govern how messages flow across a network.

Signup and view all the flashcards

Hub

Allows different nodes to communicate within the same network (can slow network).

Signup and view all the flashcards

Repeater

Regenerates signals to prevent weakening or corruption on a network.

Signup and view all the flashcards

Access Point (AP)

Allows Wi-Fi devices to connect to a wired network.

Signup and view all the flashcards

Router

Connects different networks to allow communication between them.

Signup and view all the flashcards

LAN

Network in a small geographical area like a school or office.

Signup and view all the flashcards

WAN

Network spanning a large geographical area, like a country.

Signup and view all the flashcards

Internet

Global mesh of interconnected networks.

Signup and view all the flashcards

Peer to Peer Networks

Network where all nodes have equal capabilities and responsibilities

Signup and view all the flashcards

Client/Server Networks

Network with dedicated servers providing services to clients.

Signup and view all the flashcards

Protocols

A set of rules governing data flow in a network.

Signup and view all the flashcards

TCP/IP Protocol Suite

A suite of communication protocols used to interconnect network devices on the internet.

Signup and view all the flashcards

TCP

Ensures reliable transmission of data.

Signup and view all the flashcards

UDP

A faster protocol that does not guarantee delivery.

Signup and view all the flashcards

Physical Layer

Defines electrical and physical aspects of data transmission.

Signup and view all the flashcards

Data Link Layer

Provides the logical interface between the end system and the network.

Signup and view all the flashcards

MAC Address

A unique hardware address burned on the network card.

Signup and view all the flashcards

Internet Protocol (IP)

Provides connectivity and path selection between hosts.

Signup and view all the flashcards

IPv4

A 32-bit numeric address written as four numbers separated by periods.

Signup and view all the flashcards

IPv6

128-bit address that supplies a larger address space than IPv4.

Signup and view all the flashcards

Internet of Things (IoT)

Connects devices to the internet.

Signup and view all the flashcards

Cyber Security

Is about protecting systems, networks, programs, devices, and data from cyber attacks.

Signup and view all the flashcards

Confidentiality

Ensuring information is not revealed to unauthorized persons.

Signup and view all the flashcards

Integrity

Ensuring consistency of data and detecting modification.

Signup and view all the flashcards

Availability

Ensuring legitimate users are not denied access to information and resources.

Signup and view all the flashcards

Vulnerability

Degree of weakness found in a network or device.

Signup and view all the flashcards

Threats

A person, thing, event, or idea that poses a danger to an asset.

Signup and view all the flashcards

Attack

Attempt to destroy, expose, alter, or steal data or break into systems.

Signup and view all the flashcards

Passive Attack

An attack that intercepts and monitors network traffic.

Signup and view all the flashcards

Active Attack

Involves sending traffic to try to access data in order to modify a system.

Signup and view all the flashcards

Social Engineering

Influencing people to reveal confidential information.

Signup and view all the flashcards

Phishing Attack

Acquiring sensitive information through deceptively similar websites.

Signup and view all the flashcards

Hijack Attack

Taking over a session between two parties.

Signup and view all the flashcards

Password Attack

An attempt to crack passwords stored in a secured system.

Signup and view all the flashcards

Viruses

Malicious code that needs a host program to execute.

Signup and view all the flashcards

Trojan Horse

Malicious code appearing as legitimate software.

Signup and view all the flashcards

Study Notes

Agenda

  • Session 1 covers Network Essentials.
  • Session 2 is about Cyber Security Essentials.
  • Session 3 covers Distributed Systems.

Session 1 (Network Essentials)

  • The session outlines basic terminologies and the TCP/IP protocol suite.
  • It also covers computer networks, definition and basic terminologies.
  • The TCP/IP Protocol Suite will be covered, including:
  • Network Access Layer (Physical Layer /Datalink Layer)
  • Internet layer
  • Transport layer
  • Application Layer

Session 1 (Computer Networks Definition)

  • Computer Network serves as a collection of computers and other devices, connected to perform tasks.
  • Connecting Medias shares resources, which can include file sharing, devices, software, voice/video calls, and shared internet access.

Session 1 (Network Elements)

  • Network elements include both hardware and software components
  • Hardware includes devices like computers, printers, phones, routers, and swtiches.
  • Mediums are wired, wireless, satellites.
  • Software includes messages and protocols.
  • Messages can travel via mediums like Mails, WhatsApp.
  • Protocols govern how messages flow across a network, such as http, https, FTP, and RDP.

Session 1 (Network Basic Terminologies)

  • NIC stands for Network Interface Card, also known as network adapter or LAN adapter.
  • NIC: A hardware component enabling a device to directly access the network.
  • Internal NICs plug directly into the motherboard
  • External NICs are Wireless and USB based.
  • Physical addresses are unique addresses burned on the NIC card
  • IP addresses are logical addresses to identify devices on any IP network layer.
  • Protocols are communication rules that entities must agree on, such as http, https, FTP, and RDP.
  • Hubs all different nodes to communicate in the same network but it often slows the network considerably
  • Repeaters regenerate signals over the same network before the signal becomes weak/corrupted.
  • An Access Point (AP) allows WiFi devices to connect to a wired network.
  • A switch enables different nodes to communicate simultaneously without slowing each other.
  • A router facilitates communication between different networks.

Session 1 (LAN VS WAN)

  • Local Area Network (LAN): A group of computers connected within a small geographical area, like an office, that allows users to share files and services with high speed under administrative control (100-1000 M).
  • Wide Area Network (WAN): A group of computers connected over a large geographical area like a country.
  • WANs can contain multiple smaller networks (LANs or MANs), operate at very low speed, and are controlled by your ISP.
  • An example of a WAN is the Internet.

Session 1 (Internet)

  • The Internet is defined as a global mesh of interconnected networks.
  • There is no single owner of the Internet.
  • Infrastructure is maintained via organizations, ISPs, companies and governments.
  • ISOC stands for Internet Society
  • IETF stands for Internet Engineering Task Force
  • ICANN stands for Internet Corporation for Assigned Names and Numbers

Session 1 (Peer to Peer Vs Client/Server)

  • Peer-to-peer networks, nodes are all the same, easy to work with, and have no dedicated resources for specific services.
  • Client/Server Networks have dedicated servers that provide services to other client nodes.

Session 1 (TCP/IP Protocol Suite)

  • Protocols are necessary for efficient communication
  • Protocols needed to enable data flow from one Network Interface Card (NIC) to another
  • Protocols controls messages and their quantity in any network.
  • OSI Reference Model: Defined by the ISO in 1983 to provide universal concepts for developing protocols
  • The OSI model breaks down into layers

Session 1 (TCP/IP Protocol Suite)

  • TCP/IP is Transmission Control Protocol/Internet Protocol
  • TCP/IP: An open-standard, default protocol for operating systems.
  • TCP/IP: Not tied to a specific vendor.
  • TCP/IP enables direct access to the Internet and is the protocol for internet.
  • Current Internet use is TCP/IP v4; next version is TCP/IP v6
  • TCP/IP is also routable.

Session 1 (TCP/IP Protocol Architecture)

  • The TCP/IP architecture suite of protocols includes various application, transport, and network protocols.
  • Application examples: SMTP, FTP, DNS, SNMP, NFS, TFTP, RPC
  • The transport layer uses TCP and UDP protocols.
  • The network layer relies on the Internet Protocol (IP), alongside ICMP and GGMP
  • The data link and physical layers use protocols defined by underlying networks

Session 1 (TCP/IP Protocol Architecture)

  • The network access layer consists of physical and data link layers.
  • Physical Layer: Defines the electrical and transmission medium, handling the movement of individual bits from node to node.
  • Datalink Layer: Provides a logical interface between the end system and network including error notifications.
  • Uses frames and MAC addresses for media access control, hop to hop addressing
  • Also uses error detection mechanisms

Session 1 (TCP/IP Protocol Architecture)

  • Physical Addresses (Mac addresss):
  • It a physical address on the NIC card
  • Unique world wide address
  • written as 12 hexadecimal digits
  • Each byte (2 hexadecimal digits) is separated by a colon
  • Physical addresses can be Unicast, Multicast, Broadcast
  • Use "Ipconfig /all" or "GetMac" to check physical address

Session 1 (TCP/IP Protocol Architecture)

  • Internet/Network Protocol Layer (IP Layer):
  • Provides connectivity and path selection between two hosts
  • Routing of data provides mechanism to transmit data over linked networks
  • Consist of logical addressing IPV4, IPV6

Session 1 (TCP/IP Protocol Architecture)

  • Internet Protocol - IP V4 identifies devices on an IP network layer
  • Sometimes it the logical address
  • Computer, device, peripheral is at a unique address at the same network
  • V4: 32 bit divided into 4 octets each octet 8 bit
  • 1 octet = 8 bit each numbered from 0 to 255 separated with dots
  • the full address space of IPv4 232, or 4,294,967,296
  • Class A Public IP ranges from 1.0.0.0 to 9.255.255.255 and 11.0.0.0 to 126.255.255.255 Private IP ranges from 10.0.0.0 to 10.255.255.255
  • Class B Public IP ranges from 128.0.0.0 to 172.15.255.255 and 172.32.0.0 to 191.255.255.255 Private IP ranges from 172.16.0.0 to 172.31.255.255
  • Class C Public IP ranges from to 192.0.0.0 to 192.167.255.255 and 192.169.0.0 to 223.255.255.255 Private IP ranges from 192.168.0.0 to 192.168.255 255
  • Nat is used to translate private IP address to public IP addresses.

Session 1 (TCP/IP Protocol Architecture)

  • IP Address Assignment: IP addresses are assigned manually/automatically (DHCP).
  • To find your private IP address use: Ipconfig, Ipconfig /all, Ipconfig /release, Ipconfig /renew
  • You can test connectivity between hosts using ICMP(Ping)
  • Ping IP
  • Ping URL
  • Ping IP -l -n -t

Session 1 (TCP/IP Protocol Architecture)

  • Internet Protocol - IP V6
  • a 128-bit address, provides approximately 340 billion billion billion billion addresses
  • Representation of eight groups, separated by colons, of four hexadecimal digits
  • Full form can be simplified

Session 1 (TCP/IP Protocol Architecture)

  • Internet Of Things (IOT):
  • Aims connect all devices to the existing Internet infrastructure, sense and collect data, then send it to the internet
  • Coffee makers, A.C, washing machine, ceiling fans and lights can be connected
  • IOT Practical Applications: Smart Homes -Smart Cities-Energy -Environment monitoring- healthcare and Management

Session 1 (TCP/IP Protocol Architecture)

  • The transport layer employs two main protocols:
  • TCP: Transmission Control Protocol, which is connection oriented, reliable, is full duplex, and has error control/data recovery.
  • UDP: User Datagram Protocol, which is connectionless, unreliable, is full duplex and provides Voice/Video streaming services.

Session 1 (TCP/IP Protocol Architecture)

  • Transport Layer addressing (port numbers) controlled by ICANN
  • Well Known Ports permanent numbers (0-1023) Assigned/controlled by ICANN
  • Registered port numbers (1,024-49,151). Not controlled by ICANN,can be registered at ICANN
  • Dynamic port numbers. neither controlled or registered (49152-65535)

Session 1 (TCP/IP Protocol Architecture)

  • Application Layer
  • Communication between processes or applications
  • Internet Services (Client/Web Server)
  • World wide web: HTTP
  • Naming Service: DNS
  • File Transfer: FTP
  • Telnet Service
  • Electronic Mail service: IMAP, POP3, SMTP

Session 1 (TCP/IP Protocol Architecture)

  • A URL (Universal Resource Locator) includes the protocol, host, port, and path.
  • HTTP (Hyper Text Transfer Protocol) Supports the delivery of web pages to the client

Session 1 (TCP/IP Protocol Architecture)

  • DNS (Domain Name Servers) translate human-readable names into IP addresses
  • To get website, check the cash, then hosts file, then ask DNS
  • Top Level Domains (TLDs)
    • .com: Commercial organization
    • .edu: Educational institution
    • .gov: Government organization
    • .mil: Military group
    • .net: Major network support center
    • .org: Organization other than those above
    • country code: A country

Session 1 (TCP/IP Protocol Architecture)

  • FTP (File Transfer Protocol) relies on a transmission protocol that ensures reliable data transfer between hosts.
  • To use, first establish a FTP client either via Browser, through MS Windows, or programs

Session 1 (TCP/IP Protocol Architecture)

  • Telnet/SSH or RDP protocols: Telnet/SSH is a user command and an underlying TCP/IP protocol for accessing remote computers.
  • Telnet/SSH, an administrator can access someone else's computer remotely
  • Remote Desktop Protocol (RDP) is proprietary to Microsoft and allows connections to other computers
  • SSH(Secure Shell) runs on port 22 ,It is Very Secure Protocol , Difficult to decrypt on All popular Operating System
  • Telnet runs on port 23 , It is Not Secure Protocol , Joint abbreviation on Linux, Windows

Session 1 (TCP/IP Protocol Architecture)

  • Mail Servers and Clients Mail Clients are web based (Hotmail, Gmail) /Non web based : Microsoft Outlook.
  • Mail Protocols:
    • SMTP (send mail transfer Protocol)
      • send messages back and forth to other Mail Servers or Email Clients
    • POP3 "Post Office Protocol version 3"
      • the Email Client contacts the Mail Server to collect email messages, then Download the messages on the hard drive
      • Offline capable
      • Keep the user's quota on the server
    • IMAP4 “Internet Message Access Protocol version 4":
      • Retrieve only message header

Session 1 Practices

  • Find your MAC address using "Ipconfig /all" or "Get mac".
  • Find your real IP address using https://www.whatismyip.com/.
  • Find your private IP address using: Ipconfig, Ipconfig /all, Ipconfig /release, Ipconfig /renew, ARP -a
  • Find current session and ports on your device using Netstat -n and Netstat -a
  • Find The IP of the domain Yahoo.com using Nslookup Yahoo.com

Session 2 (Cyber Security Essentials)

  • This Session will cover Information Security Goals, Risks and Threats, Security Defenses and Encryption
  • Information Security Goals
    • Confidentiality
    • Integrity
    • Availability

Session 2 (Security Goals)

  • Cyber Security: Protects systems, networks, programs, devices, and data from cyber attacks
  • Security is a shared responsibility from each user when connecting to the network
  • Security Goals such as Confidentiality, Integrity and Availability must be technically defined
  • Confidentiality ensure that information is not revealed to unauthorized persons
  • Ensure consistency of data
  • Availability ensuring access to legitimate users

Session 2 (Risks & Threats)

  • Focus of security is the risk of something happening
  • Risk = Threat x Vulnerabilities
  • The degree of weakness in every network and device is a vulnerability
  • Threats represent a person, thing, event or idea which poses danger to asset confidentiality, integrity, availability or legitimate use
  • There is NO simple Solution to eliminate risk
  • Security 99.9% isn't found due to new attacks such as new technologies /applications, New Vulnerabilities coupled with the difficulties in defending

Session 2 (Attackers Methods)

  • Attack: attempt to destroy, expose, alter, disable, steal or breaking into the information or breaking the systems or making unauthorized use of an asset
  • Passive Attack: Difficult to detect (malicious).
    • An attacker captures packets from the network attempting to decrypt them.
  • Active Attack: Active traffic is generally easier to detect
    • An attacker tries to modify data on a system or to access it

Session 2 (Attackers Methods)

  • Social engineering is the ability to influence the behavior of a group of people
  • PHISHING ATTACK: Fake web page looks like popular website Gmail, facebook, twitter asking for username, passwords and credit cards

Session 2 (Attackers Methods)

  • HIJACK ATTACK: -- A hacker takes over a session between you and another individual, leading to communication of accidentals information
  • Insider Attack:
  • involves a disgruntled employee attacking the network.
  • PASSWORD ATTACK:
    • An attacker tries to crack the passwords in network, database
    • Dictionary attack
    • Brute-force attack -- Hybrid attack

Session 2 (Malicious Software (Malware)types))

  • Backdoor/trapdoor: A secret entry point into a program often used by developers.
  • Viruses: Malicious software attached to a program to execute an unwanted function.
  • It propagates itself and carries a payload, makes copies of itself
  • Trojan Horse: Program with hidden side-effects, superficially attractive, and it open ports/passes malicious files.
  • It allows attacker to indirectly gain access they do not have directly
  • It is also used to propagate a virus/worm or install a backdoor

Session 2 (Malicious Software)

  • Worms are replicate but not infecting program typically spread network and lead to zombie pc's
  • The major issue is lack of security of permanently connected systems
  • Zombie is a Program which secretly takes over another networked computer.
  • Also launch distributed denial of service (DDoS) attacks
  • Ransomware locks a computer or device or encrypts data on an infected endpoint with an encryption key
  • The data is unusable until they attacker is paid (Bitcoin)

Session 2 (Malicious Software)

  • DoS (Denial of Service) Attack: Used for crashing the whole system of permission.
  • Kind of attacks are easy to launch and it is hard to protect such that these attacks Consume network resources or Memory, processor etc.
  • DDoS Attack: Distributed denial of service attack uses multiple machines to prevents attacks.
  • TCP SYN flood.
  • Spam is a serious network threat that overloads email systems and allows take control of home computers
  • Spyware: this gathers personal information from your computer without your permission or knowledge is sent to the Internet. passwords-account nos
  • Tracking Cookies record information about an Internet user who visit websites

Session 2 (Attacks Mitigation)

  • Firewalls are the most effective security tools, resides between networks, and prevents traffic access.
  • Static Packet Filtering (stateless firewall): Prevents or allows based on IP / MAC addresses.
  • Dynamic Packet Filtering (state full firewall): Incoming packets must be to requests from internal hosts.
  • SPI recognizes and filters out attacks, such as DoS.

Session 2 (Attack Mitigation)

  • Proxy Server: Intercepts user requests/processes them on behalf to hide a client's IP
  • VPN: Tunnels traffic between 2 networks, using :Remote Access VPN, Site to Site VPN

Session 2 (Attack Mitigation

  • Intrusion Detection Prevention Systems (NIDS and NIPS): NIDS watch the Network Traffic and if detects bad traffic flow and sends send alarms/logs NIPS stops bad traffic and looks for the perfect match Next generation Firewall (NGFW) is a "deep-packet inspection firewall," including application-level inspection and brings outside intelligence.

Session 2 (Encryption)

  • Encryption- converting the original plaintext information into a ciphertext that a key is used for a cyphertext
  • in symmetric encryption algorithm, the same key is used for decryption, but it requires a secure way for the two sides to have the same key

Session2 Practices

  • Use your local firewall to block a port to stop DOS attacks from a zombie device

Session 3 (Distributed Systems)

  • A group of computers working in tandem appearing as a single computer to the user.
  • Sub points consist of basic terminologies, examples, and types
  • The major focus will be cloud computing

Session 3 (Distributed System)

  • Centralized System: All components stored on a single computer, this can be: Simpler or Easier to understand, Can be faster for a single user Distributed System: State divided over multiple computer
  • More robust(can tolerate failures)/More scalable (often supports many users)/More complex

Session 3 (Distributed System)

  • The advantages of working with distributed systems; one interface, high performance/reliability, dependency on cloud scaling.
  • One interface towards the end-user.
  • Distributed system is growing; it is in every could and computing database system.

Session 3 (Distributed System)

  • Distributed systems must have : Network and Messages – A System that connects all components(Hardware, or Software)
  • Messages passed between machines contain forms of data like databases, objects, and files.
  • These messages must pass via reliable communication

Session 3 (Types of Distributed

  • Four architecture types:
  1. Client-server:
  • a server as a shared resource like a printer, database, or a web server
  • Multiple clients use the shared resource.
  1. Three-tier:
    • clients do not need to be particularly intelligent
    • can rely on a middle tier to do the processing and decision making. The middle tier forwards to the applicable servers

Session 3 (Types of Distributed

  • 4 Architecture cont.

3- Multi-tier (n-tier):

  • Web services first created the various n-tier architectures such as google.com, contains the business logic that interacts via the various tiers 4- Peer-to-peer :
  • There is no centralized logic to manage the work, all decisions are split to involved machines, blockchain works this way

Session 3 (Distributed System Examples)

  • Domain Name System (DNS) allows distributed lookup of hostname to IP addresses
  • Facebook & Google are big with distributed systems
  • Massive scale – Fast enough – Very reliable
  • Email servers (SMTP), Cloud Computing and Virtualization are all the various examples of distributed systems

Session 3 (Virtualization)

  • Uses a tech to operate completely isolated.
  • With full benefits.
  • Consolidation, Redundancy, Legacy hardware, Migration, Centralized management
  • Is a technology that run multiple same or different operating systems which is completely isolated from each other
  • Ex: run both windows and Linux on the same machine
  • Virtualization is different than Dual Boot; Duall boot runs only one OS at the same time

Session 3 (Cloud computing)

  • A pool of resources rapidly provisioned in an automated, on-demand manner
  • Economies of scale
  • Elastic
  • Affordable

Session 3 (Cloud computing service

  • Cloud computing service models :
  • The on-premises models have the full stack managed by the customer from networking to applications.
  • IaaS (Infrastructure as a service) models let's the provider's operating system and virtualization managed, while Networking and Storage services are customer managed.
  • PaaS (Platform as a service) model builds on that as managed by provider .
  • SaaS(Software as a Service) Networking all managed by Provider

Session 3 (Cloud computing service

  • Software as a service (SaaS): Customers get to apply to get an application running on a cloud infrastructure as managed within control.
  • Platform as a service (PaaS): Customers can connect and develop supported applications with has to have a responsible and secure data, and applications.
  • Infrastructure as a Service (Iaas) Customers can control processing and networking resources while the customer maintains the security of those systems.

Session 3 (Cloud computing

  • Public, community, private, and Hybrid cloud are the four cloud types in action.
    • A public cloud is third party owned.
    • A community cloud is built for organizations.
    • A private cloud is owned by just one organization.
    • A hybrid cloud uses mixed models of data application deployment.

Session 3 Practices

  • Utilize Vmware workstation to simulate 2 different OS on your Machine

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

TCP/IP and Networking Fundamentals
10 questions

TCP/IP and Networking Fundamentals

WellManneredSpessartine avatar
WellManneredSpessartine
TCP/IP Model and Data Transmission
10 questions

TCP/IP Model and Data Transmission

StraightforwardInsight9160 avatar
StraightforwardInsight9160
TCP/IP Networking Basics
10 questions
Use Quizgecko on...
Browser
Browser