Networking Reviewer Module 1-3 PDF

Summary

This document provides a basic overview of network concepts, including host roles, different network architectures, security goals, and recent networking trends. It also includes aspects of network media, types of networks, network security, and cloud computing, along with a detailed description of the operating system.

Full Transcript

Networking Reviewer Converging Network Module 1 - Used different technologies to carry the Host Roles signal - Every computer on a network is called a - Converged data n...

Networking Reviewer Converging Network Module 1 - Used different technologies to carry the Host Roles signal - Every computer on a network is called a - Converged data network carry multiple host or end device. services in on one link including: data, Server Type voice and video 1. Email Network Architecture 2. Web Fault Tolerance 3. File Scalability Peer-to-Peer Quality of Service - It is possible to have a device be both Security client and a server in a P2P network. Goals of Network Security Only recommended for very small 1. Confidentiality networks 2. Integrity End Devices 3. Availability - Where a message originates from or Network Trends where it is received. 1. Bring Your Own Device (BYOD) Intermediary Network Devices 2. Video Communication - Interconnects end devices. 3. Online collaboration - Regenerate and retransmit data signals 4. Cloud Computing - Maintain information about what Cloud Computing pathways exist in the network. 1. Public - Notify other devices of errors and 2. Private communication failures. 3. Hybrid Network Media 4. Custom - Communication across a network is Security Threats carried through a medium which allows External a message to travel from source to Viruses, worms, and Trojan horses destination. Spyware and adware 1. Metal wires within cables - uses Zero-day attacks electrical impulses Denial of service 2. Fiber-optic Cable - uses pulses of light Identity theft 3. Wireless Transmission - uses Internal modulation of specific frequencies of Lost or stolen electromagnetic waves. Accidental misuse by employees Common Types of Networks Malicious employees 1. Small Home Networks 2. Small Office/Home Office 3. Medium/Large 4. World Wide 5. Local Area Network (LAN) 6. Wide Area Network (WAN) Intranet - is a private collection of LANs and WANs (company) Extranet - Suppliers, Customers, Collaborators Module 2 3. [x] - optional element Operating Systems 4. {x} - required element 1. Shell 5. [x {y | z}] - required choice - Allows users to request specific tasks Ping ip-address - for user destination device from the computer. Either thru CLI or Traceroute ip-address GUI Device Names 2. Kernel Switch# configure terminal - Communicates between hard and Switch(config)# hostname Sw-Floor-1 software of a computer Sw-Floor-1(config)# 3. Hardware Configure Passwords GUI Securing user EXEC mode access: - Allows the user to interact with the Sw-Floor-1# configure terminal system using an environment of Sw-Floor-1# line console 0 graphical icons, menus and windows Sw-Floor-1# password cisco Access methods Sw-Floor-1# login 1. Console Sw-Floor-1# end - A physical port used to access a device Securing privileged EXEC mode access: 2. Secure Shell Sw-Floor-1# configure terminal - Establishes a secure remote CLI Sw-Floor-1# enable secret class connection to a device Sw-Floor-1# exit 3. Telnet Securing VTY line access: - Establishes an insecure remote CLI - Enable remote access using Telnet or Terminal Emulation Programs SSH - Used to connect a network device by Sw-Floor-1# configure terminal either a console port or by an Sw-Floor-1# line vty 0 15 SSH/Telnet connection Sw-Floor-1# password cisco Primary Command Modes Sw-Floor-1# login User EXEC Mode Sw-Floor-1# end - Allows access to only by a limited Encrypt Passwords number of basic monitoring commands Sw-Floor-1# configure terminal Ex. Router>, Switch> Sw-Floor-1# service pass-word Privileged EXEC Mode encryption - Allows access to all commands Sw-Floor-1# exit Ex. Router#, Switch# Banner Messages Global Configuration Mode - Warn unauthorized personnel from - Used to access configurations attempting to access the device Ex. Switch(config)# Sw-Floor-1# configure terminal Line Configuration Mode Sw-Floor-1# banner motd #Authorized - Used to configure console, SSH Access Only!# Ex. Switch(config-line)# Configuration Files (save) Interface Configuration Mode: 1. Startup-config - saved config file - Used to configure a switch port stored in NVRAM Ex. Switch(config-if)# 2. Running-config - stored in Random IOS Command Syntac Check Access Memory (RAM) 1. Boldface - literally shown 2. Italics - supply values Networking Reviewer Internet Standards Module 3 1. Internet Architecture Board (IAB) - Network Protocol Requirements responsible for management 1. Message encoding 2. Internet Engineering Task Force 2. “” formatting and encapsulation (IETF) - develops and maintains 3. “” size internet 4. “” timing 3. Internet Research Task Force Flow Control - manages the rate of (IRTF) - focused on long term data transmission and how much 4. Internet Society (ISOC) - open Response Timeout - manages how development and evolution of internet long a device wait when it does not hear The OSI Reference Model a reply 1. Physical Layer - describes means to Access Method - determines when can activate someone send a message 2. Data Link Layer - methods for 5. “” delivery options exchanging data frames over a common Network Protocol Type media 1. Network Communications - enable 3. Network Layer - exchange individual two or more devices to communicate pieces of data 2. Network Security - secure data 4. Transport Layer - defines to segment, 3. Routing - exchange route information transfer and reassemble the data 4. Service Discovery - used for the 5. Session Layer - provides services to automatic detection of devices segment Network Protocol Functions 6. Presentation Layer - provides 1. Addressing - identifies S&R common representation of the data 2. Reliability - provides guaranteed 7. Application Layer - contains protocols delivery used for process-to-process comms 3. Flow Control - ensures data flows The TCP/IP Reference Model 4. Sequencing - labels each transmitted 1. Application Layer - represents data to segment of data user, plus encoding and dialog control 5. Error Detection - determines if data 2. Transport Layer - supports comms became corrupted during transmission 3. Internet - determines best path 6. Application Interface - 4. Network Access - controls the process-to-process communications hardware Protocol Interaction File Transfer Protocol (FTP) 1. Hypertext Transfer Protocol (HTTP) - standard network protocol used to - governs web server/client interact transfer of files from one host to 2. Transmission Control Protocol another over a TCP-based network (TCP) - manages individual convo. Encapsulation: a top down process (PDU) 3. Internet Protocol (IP) - delivers Five different PDUs: data, segment, packet, messages globally, most common frame and bits 4. Ethernet - delivers messages from one Open Standards (protocol suite) NIC to another on the same LAN - are freely available to the public Protocol Suites encourage - A group of inter-related protocols 1. Interoperability necessary to perform a communication 2. Competition function 3. Innovation

Use Quizgecko on...
Browser
Browser