CertMaster Network+ (N10-009) Module 7_Presentation Slides PDF
Document Details
Uploaded by HonorableUnity8407
Tags
Summary
Module 7 from CertMaster Network+ (N10-009) is a presentation on application services, including concepts like Transport Layer Security (TLS), Network Time Protocol (NTP), and disaster recovery. It discusses various protocols and technologies related to network communication, data security, and system reliability.
Full Transcript
Module 7 Explaining Application Services Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 1 Learning Objectives Explain the importance of time synchronization and the role of NTP. Explain the use of web, file/print, and database services. Expla...
Module 7 Explaining Application Services Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 1 Learning Objectives Explain the importance of time synchronization and the role of NTP. Explain the use of web, file/print, and database services. Explain the use of email and voice services. Explain how high availability services are provisioned using redundancy and load balancing. Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 2 reserved. Lesson 7.1 Application Security and Time Synchronization Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 3 Transport Layer Security (TLS) Encryption Encrypts the data Confirm server identity Authentication with certificates Ensures data is Integrity unchanged Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 4 reserved. TLS Handshake Client Hello Server Hello Client Key Exchange Session Key Established Server Finished Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 5 reserved. Network Time Protocol (NTP) Purpose Operation Hierarchy Synchronization Algorithms Synchronizes Operates over Organizes Synchronizes Uses complex system clocks to networks using devices in a devices by algorithms to Coordinated the UPD hierarchical sending account for Universal Time protocol on port manner, timestamped network delay (UTC) 123 indicating messages to/ and jitter distance from from network the clock peers Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 6 reserved. NTP Diagram Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 7 reserved. Precision Time Protocol (PTP) Applications Clock types Roles Industrial Grandmaster TimeTransmitter processes clock TimeReceiver 5G cellular data Boundary clock Grandmaster Medical devices Ordinary clock Boundary Financial services Broadcasting Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 8 reserved. Activity: Fill in the Blank 1. TLS __________ the data to hide it from anyone who might intercept it. 2. __________ is used to synchronize clocks to Coordinated Universal Time. 3. The __________ clock is the main time source in the PTP domain. Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 9 Lesson 7.2 Web, File/Print, and Database Services Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 10 Hyper Text Transfer Protocol (HTTP) Purpose Protocol for fetching resources (HTML documents, images, and videos) from the web Foundation Basis of any data exchange on the web Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 11 reserved. Hyper Text Transfer Protocol (HTTP) 3. Translates 5. Interprets request URL into HTTP and retrieves requested 1. User enters URL request data files 2. URL 4. HTTP Request User Browser Web Server 7. Webpage 5. HTTP Response 8. Displays webpage 6. Renders data 6. Sends status code on user screen into a webpage and webpage data Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 12 reserved. HTTP Secure (HTTPS) HTTP HTTPS Foundational protocol for Secure version of HTTP the Internet Uses TLS (SSL) encryption Does not encrypt data Uses port 443 Uses port 80 URL begins with https:// URL begins with http:// Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 13 reserved. File Transfer Protocol (FTP) FTP Server Authentication Require users to provide credentials Some allow anonymous access Channels Command channel for instructions and response Data channel for transferring files Transfer Modes (Active and Passive) Active: server connects back to the client to transfer data Passive: client initiates command/data connections to avoid firewall issues Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 14 reserved. FTP Diagram Computer Network Client Process Control Connection Server Process Data Connection Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 15 reserved. Secure File Transfer Protocol (SFTP) FTP SFTP Unencrypted data Encrypted data Uses two channels Uses one channel Uses ports 20 and 21 Uses port 22 Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 16 reserved. Server Message Block Protocol (SMB) SMB Purpose Allows computers in the same network to share resources SMB Usage Windows Linux using Samba Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 17 reserved. SMB Diagram Client requests access to SMB shared resource Client Server grants or denies Server access to SMB shared resource Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 18 reserved. Network Attached Storage (NAS) NAS Purpose Provides remote file access Concurrent resource access for multiple devices NAS Components Processor, memory, and hard drives Bespoke OS, usually Linux Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 19 reserved. NAS Diagram Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 20 reserved. RDBMS Database Service Relational Database Management Systems Structured storage (tables store data) SQL queries to retrieve/update dataConnected tables link data via unique IDsEncryption via TLS Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 21 reserved. NoSQL Database Service NoSQL Databases Stores data in different formats (key-value pairs/wide columns) Simple Access through APIs over HTTPSScalable Growth (Horizontal scaling) Supports wide range of data models Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 22 reserved. RDBMS vs NoSQL RDBMS NoSQL Requires predefined Schema-less or schema dynamic schemas Vertically scalable Horizontally scalable Simplicity/speed for Handles complex queries specific types of queries Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 23 reserved. Activity: Matching HTTP Protocol for web communication FTP Storage accessible over a network SMB Network protocol for file transfer NAS System for managing relational databases Protocol for network file sharing RDBMS Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 24 reserved. Lesson 7.3 Email and Voice Services Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 25 Simple Mail Transfer Protocol (SMTP) Purpose Used to send emails from one server to another Process Routes emails from sender’s email client to recipient’s email server Security Combinable with TLS to encrypt emails during transmission Ports Port 25, port 465 with implicit TLS, port 587 with explicit TLS Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 26 reserved. Internet Message Access Protocol (IMAP) Purpose Access and manage email remotely Stores emails on server Function Connecting to the mail server Synchronization Reading emails Managing emails Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 27 reserved. SMTP and IMAP Diagram Sender Receiver Internet SMTP IMAP SMTP Sender’s Email Receiver’s Server Email Server Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 28 reserved. Voice and Video Services VOIP PBX VoIP-Enabled PBX Transmits voice calls Private Branch Combines PBX over IP networks Exchange functions with VoIP Supports voice, Connects internal Operates over LAN video, and phone lines within or WAN multimedia sessions an organization Reduces reliance on Supports various Manages physical devices incoming/outgoing infrastructure calls, voicemail, and call forwarding Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 29 reserved. VoIP Protocols Real-Time Transport Session Initiation Real-Time Protocol Control Protocol Protocol (SIP) (TRCP) Provides out-of-band Transports audio/video Initiates, maintains, and statistics and control over the Internet in real terminates real-time information for an RTP time communication sessions session Uses even numbered Uses the next higher odd- Uses TCP/UDP ports 5060 UDP ports for streaming numbered port from RTP (non-encrypted) and 5061 media port (TLS-encrypted) Offers feedback on Manages call setup and Focuses on the delivery packet delivery, loss, and teardown, user location, and of data jitter messaging. Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 30 reserved. Activity: Trivia Which protocol allows you to access and manage emails remotely? Which protocol is used to send emails from one server to another? Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 31 reserved. Lesson 7.4 Disaster Recovery and High Availability Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 32 Disaster Recovery Concepts Disaster Business Tabletop Validation Recovery Continuity Exercises Tests Plan (BRP) Plan (BCP) Functional BCP team Guidelines and testing Simulation procedures Business impact Scenario testing analysis (BIA) Preparation Constrictive and prevention learning Crisis Full-scale communication testing plan Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 33 reserved. Disaster Recovery Metrics High availability (HA) Ensures consistent system uptime Maximum tolerable Longest disruption without severe impact downtime (MTD) Recovery time Time to restore services after disruption objective (RTO) Work recovery Time to confirm system/data integrity post-recovery time (WRT) Recovery point Maximum acceptable loss after an event objective (RPO) Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 34 reserved. Disaster Recovery Sites Cold Site Warm Site Hot Site Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 35 reserved. Fault Tolerance and Redundancy Fault Tolerance Maintains operation despite component failure Operates at reduced capacity instead of shutting down Uses replication, error checking, and failover Redundancy Duplicates key components for higher reliability Offers backup paths/capacity for failed components Prevents system collapse from any single failure Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 36 reserved. Key Performance Indicators (KPIs) Mean time Mean time to Mean time to between failures failure (MTTF) repair (MTTR) (MTBF) Expected lifespan Average time Average time to fix before a non- between system and restore a failed repairable system failure system fails Total operational Total time spent on Total operational time until failure repairs divided by time divided by # divided by # the number of of failures of units repairs Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 37 reserved. Load Balancers Purpose Functionality Benefits Types Distributes Acts as a “traffic Reduces downtime Can be hardware- network traffic cop” to route client and increases based or software- across multiple requests scalability based servers Improves Provides Uses various Ensures no single application redundancy/ algorithms like server is performance efficiency in Round Robin, Least overworked and reliability handling requests Connections, etc. Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 38 reserved. Load Balancer Diagram Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 39 reserved. High Availability Clusters High Availability Clusters Definition Systems that ensure continuous operation and minimize downtime via redundant components and failover mechanisms High Availability Clusters Function Ensure continuous service/minimal downtime for critical applications Automatically manage failovers to maintain operations Monitor system health and provide redundancy Ideal where uptime is crucial (e.g., databases, business services) Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 40 reserved. High Availability Clusters Diagram Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 41 reserved. First Hop Redundancy First Hop Redundancy Definition Ensures uninterrupted network service by automatically switching to a backup gateway if the primary one fails Functions Ensures uninterrupted gateway availability Multiple routers prevent single points of failure Quick failover with protocols like HSRP/VRRP Maintains network access and reliability Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 42 reserved. First Hop Redundancy Diagram Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 43 reserved. Activity: Hot, Warm, or Cold? A financial services company that processes high-volume transactions cannot afford more than a few minutes of downtime. Any downtime can result in significant financial loss and erosion of customer confidence. Which type of recovery site would be best for their situation? Copyright © 2024 The Computing Technology Industry Association, Inc. All rights reserved. 44 Summary HTTPS everywhere: Implement HTTPS (TLS/443) on web servers for secure communication Secure file transfer: Utilize secure protocols like SFTP/FTPS (SSL/TLS) for file transfers Limit unencrypted sharing: Restrict unencrypted services (SMB) to trusted internal networks Plan for disruptions: Develop DR/HA plans with dedicated resources for business continuity Copyright © 2024 The Computing Technology Industry Association, Inc. All rights 45 reserved.