Chapter 1: Networking today
Disadvantages of a peer to peer network
-No centralized administration -Not as secure -Not scalable -All devices may act as both clients and servers which can slow their performance
Advantages of a peer to peer network
-easy to set up -less complex -lower cost -can be used for simple tasks such as transferring files and sharing printers
Network Security
3 primary requirements: -Confidentiality- Only the intended & authorized recipients can access data -Integrity- assures users the info has not been altered in transmission from orgin to destination. -Availability- assures users of timely and relaible access to data service for authorized users.
LAN (Local Area Network)
A Network Infrastructure that spans a small geographical area. -Interconnect end devices in a limited area -Administeres by a single organization or individual -Provide high-speed bandwith to internal devices.
WAN (Wide Area Network)
A Network infrastructure that spans a wide geographical area. -Interconnect LANs over wide geographical areas. -Typically administered by one or more service providers -Typically provide slower speed links between LANs
Physical Port
A connector or outlet on a networking device where the media connects to an end device or another networking device
End device
A device such as a desktop or mobile device that is used by an end user
Threat actor attacks
A malicious person attacks user devices or network resources
Poweline Networking
Allow decvices to connect to a LAN where data network cables or wireless communications are not a viable option. -using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet by sending data on certain frequencies. -useful when wifi cant reach
Cloud Computing
Allows us to store personal files or backup our data on servers over the internet. -Applications can also be accessed using the cloud. -Allows businesses to deliver to any device anywhere in the world. -Made possible by data centers -Contains options sucha as private, public, custom and hybrid.
Dial-up telephone Connection
An inexpensive, low bandwith option using a modem.
Scalability
Can expand quickly and easily to support new users and applications without impacting the performance. Designers follow accepted standars and protocols.
Online Collaborations
Collaborate and work w/ others over the network on joint projects. Is a very high priority for business and education Ex:: Cisco WebEx
Network Media
Communication across a network is acarried through a medium which allows a message to travel from source to destination. Metal wires within cables- Uses Electrical impulses Glass or plastic fibers within cables (Fiber optic)- Uses pulses of light Wireless transmission- Uses modulation of specific frequencies of electromagnetic waves.
Quality of service
Focus is to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what's important. ex: phone calls is prioritzed over a video
Cable Connection
High bandwith,always on, internet offered by cable television service providers.
Logical Topology Diagram
Illustarates devices, ports and the addressing scheme of the networking. (Like IP address and allows you to see which end devies are connected to whice intermediary device & what media is playing)
Physical Topology Diagram
Illustarates the physical location of intermediary devices and cable installation
Intermediary Device
Interconnet end devices. Management of data as it flows through a networks also the role, including: -notify of failure -regenerate and retransmit data signals -Maintain info about what pathway exist in the network EX: switches, wireless access points, routers and firewalls
Fault Tolerance
Limits the impactof failure by limiting the number of affected devices. Multiple paths are required. Reliable networks provide REDUNDANCY by implementing a packet switched network: -Packet switching splits traffic into packets that are routed over a network -Each packet could theoretically take a different path to the destination
Satellite Connection
Major benefit to rural areas without Internet Service Providers. Require a clear line of sight to the satellite.
Wireless Broadand
More commonly found in rural environments, a Wireless Internet Service Provider (WISP) is a ISP that connects subscribers to designated access points or hotspots. -Uses the same cellular tech used by smart phone
NIC(Network Interface Card)
Physically connects the end device to the network (Connectes to wifi)
Network Architecture
Refers to the technologies that support the infrastructure that move data across the network. 4 Basic characteristics that are needed to meet user expectations: -Fault tolerance -Scalability -QoS (Quality of Service) -Security
Interface
Specialized ports on a networking device that connect to individual network.Because routers connect networks the ports on a router our networking interface
Dedciated Leased Line (For business)
These are reserved circuits within the service providers network that connect distant offices with private vocie and/or data networking.
Denial of service attacks
These attacks slow or crash applications and processes on a network device
Ethernet WAN (for business)
This extends LAN access technology into the WAN
Cellular Connection
Uses a cell phone network to connect to the internet.
Video Communication
Video calls are made to anyone regardless of where they are located. Powerful took for communicating w/ others.
Intranet
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization.ONLY accessible by organization members, employees, or others w/ authoriztaion.
BYOD (Bring your own Device)
allows users to use their own devices giving them more opportunities and greater flexibility. ex: laptop, netbook, tablet,phone
Converging Network
capable of delivering data, voice, and video between many different types of devices over the same network infrastructure w/ same set of rules and standards
DSL Connection (Digital Subscriber lines)
high bandwith, always on, internet connection that runs over a telephone line.
Viruses, worms, and Trojan horses
malicious software and arbitrary code running on a user device
Extranets
networks that allow companies to exchange information and conduct transactions with outsiders by providing them direct, web-based access to authorized parts of a company's information system -EX: a company that is providing access to outside suppliers and contractors
zero-day attacks
occurs on the 1st day that vulnerability is known
Peer-to-peer network
one computer to be used for both roles of client and server.
Spyware/Adware
software installed on a user device that secretly collects information about the user
Data interception and theft
this attack captures private information from an organization's network
identity theft
this attack steals the login credentials of a user in order to access private data.
Security Solutions
• Antivirus and antispyware - These are used to protect end devices from becoming infected with malicious software. • Firewall filtering - This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network. • Dedicated firewall systems - These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity. • Access control lists (ACL) - These are used to further filter access and traffic forwarding. • Intrusion prevention systems (IPS) - These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks. • Virtual private networks (VPN) - These are used to provide secure access to remote workers.