Module 1 Review Exam PDF

Document Details

vnunez

Uploaded by vnunez

Tags

networking OSI model network devices computer networks

Summary

This document reviews the fundamental concepts of networking, including the OSI model, key network devices like proxy servers and routers, and the role of content delivery networks. The document details the functions and operations of each layer and component within the network.

Full Transcript

The **Data Link Layer** provides node-to-node data transfer and is responsible for error detection and correction from the Physical Layer. It ensures that data frames are properly formatted for transmission and reception between devices on the same network. This layer is divided into two sublayers:...

The **Data Link Layer** provides node-to-node data transfer and is responsible for error detection and correction from the Physical Layer. It ensures that data frames are properly formatted for transmission and reception between devices on the same network. This layer is divided into two sublayers: the Media Access Control (MAC) layer, which controls how devices on the network gain access to the data and permission to transmit it, and the Logical Link Control (LLC) layer, which controls frame synchronization, flow control, and error checking. This layer uses unique MAC addresses for each node on the same network and includes network interface cards (NICs), layer 2 switches, and bridges. The **Presentation Layer** translates data between the application layer and the network format. It handles data encryption, compression, and translation, ensuring that data is readable by the receiving system. This layer acts as a translator for the network, converting data into a format that the application layer can understand. Gateway devices operate at layer 6. The **Network Layer** is responsible for the logical addressing and routing of data packets between devices across different networks. It determines the best path for data transmission and manages the delivery of packets from the source to the destination. This layer uses IP addresses for routing and includes routers and layer 3 switches. The **Physical Layer** is the lowest layer of the OSI model and is concerned with the transmission and reception of raw data bits over a physical medium. It defines the hardware elements involved, such as cables, hubs, repeaters, and network interface cards (NICs). This layer handles the electrical, mechanical, and procedural aspects of network communication The **Transport Layer** ensures reliable data transfer between end systems and provides error recovery and flow control. It segments and reassembles data for communications between end devices and ensures complete data transfer. Common protocols operating at this layer include the Transmission Control Protocol (TCP), which ensures reliable, ordered delivery, and the User Datagram Protocol (UDP), which provides faster, but less reliable, data transmission. Load balancers, gateways, and layer 4 switches operate at this layer. The **Session Layer** establishes, manages, and terminates sessions between applications. It controls the dialog between systems, including session establishment, maintenance, and termination. This layer ensures that data streams are properly synchronized and maintained throughout the session. Gateway devices operate at layer 5. The **Application Layer** is the topmost layer and interacts directly with end-user applications. It provides network services to applications such as web browsers, email clients, and file transfer programs. This layer facilitates communication between software applications and the network, using protocols like HTTP, FTP, SMTP, and DNS. Devices that operate at layer 7 of the OSI model include firewalls, proxy servers, application load balancers, and multilayer switches. **Proxy servers **act as intermediaries for requests from clients seeking resources from other servers, enhancing security, privacy, and performance in network environments. One of the primary functions of proxy servers is to provide anonymity by masking the client\'s IP address, which helps protect user identity and sensitive information. Additionally, proxy servers offer content caching, storing frequently accessed content to improve load times and reduce bandwidth usage. They also enforce access control policies, such as blocking certain websites or content, to regulate and monitor user activity. **Routers** are critical networking devices designed to direct data packets between different networks. They use routing tables and protocols such as EIGRP, OSPF, and BGP to determine the most efficient paths for data transmission. One of their key features is Network Address Translation (NAT), which allows multiple devices on a local network to share a single public IP address, enhancing security and conserving IP addresses. Routers also implement Quality of Service (QoS) to prioritize certain types of traffic, ensuring optimal performance for critical applications. Commonly used to connect local area networks (LANs) to wide area networks (WANs) and facilitate internet access, routers are essential for interconnecting branch offices and different network segments. Additionally, virtual routers extend these capabilities into software, running on virtual machines or as virtual network functions (VNFs) within cloud environments, providing flexible and scalable routing solutions without the need for physical hardware. A **Content Delivery Network (CDN)** is a system of distributed servers designed to deliver web content and other digital assets to users based on their geographic location, thereby enhancing the performance, availability, and security of web services. CDNs cache content on strategically located servers, known as edge servers, around the world. When a user requests content, the request is routed to the nearest edge server, which reduces latency and improves load times. **Firewalls** are critical for network security, monitoring and controlling incoming and outgoing traffic based on predetermined security rules. They perform packet filtering, inspecting packets to allow or block them based on defined criteria. Stateful inspection is another key feature, where firewalls track the state of active connections and make filtering decisions based on the context of the traffic. Additionally, firewalls can perform application layer filtering, analyzing data at the application layer (Layer 7) for more granular control. Commonly used to protect networks from unauthorized access, malware, and other cyber threats, firewalls enforce security policies and safeguard sensitive information. **Intrusion Detection Systems (IDS)** play a crucial role in network security by detecting suspicious activities and policy violations. These systems employ signature-based detection, which uses known patterns of attack to identify threats, as well as anomaly-based detection, which identifies deviations from normal network behavior. An IDS operates passively, monitoring network traffic and generating alerts when potential threats are detected without taking direct action to block them. They are commonly used to complement other security measures by providing detailed insights into potential intrusions and enabling timely responses **Switches** are vital components in networking that connect devices within the same network, facilitating efficient communication and data transfer. They operate primarily at Layer 2 (Data Link) of the OSI model, using MAC addresses to forward data within the network. However, Layer 3 switches also incorporate routing functions using IP addresses. **Intrusion Prevention Systems (IPS)** are critical for network security, detecting and preventing suspicious activities in real-time. Unlike an IDS, an IPS is deployed inline, directly in the path of network traffic, allowing them to take immediate actions such as dropping malicious packets, resetting connections, and blocking IP addresses. Key features of IPS include active response capabilities and a combination of intrusion detection and firewall functionalities, providing both detection and proactive blocking of threats. Commonly used to protect networks by actively preventing detected threats from compromising systems, an IPS ensures that malicious activities are thwarted before they can cause harm. A **Virtual Private Network (VPN)** is a technology that creates a secure and encrypted connection over a less secure network, such as the internet. VPNs enable secure remote access to a private network, allowing users to transmit data securely over public networks. They create a \"tunnel\" that encrypts data between the user\'s device and the destination network, protecting it from interception and unauthorized access. VPNs use encryption protocols (e.g., IPsec, SSL/TLS) to secure data transmitted over the internet, ensuring that only authorized parties can access the information. Strong authentication mechanisms, such as multi-factor authentication, verify the identity of users and devices before granting access to the VPN. Additionally, VPNs utilize tunneling protocols to encapsulate and transmit data securely. This allows remote users to access resources on a private network as if they were directly connected to it, enabling secure remote work and collaboration. **Load balancers** are essential for distributing network or application traffic across multiple servers, ensuring the high availability and reliability of web applications and services. They utilize various load balancing algorithms, such as round-robin, least connections, and IP hash, to evenly distribute traffic and prevent any single server from becoming overwhelmed, **Quality of Service (QoS)** is a network feature that manages and prioritizes network traffic to ensure the performance of critical applications and services. By controlling the allocation of bandwidth, QoS helps maintain optimal performance for high-priority traffic even during periods of congestion. QoS ensures that important data traffic receives the necessary bandwidth, reduces latency, and avoids packet loss, enhancing the overall performance of critical applications and services within a network.

Use Quizgecko on...
Browser
Browser