Final Exam - Networking
HIPAA
(Health Insurance Portability and Accountability Act) Protect medical records security and privacy
SNMPv3
(SNMP) most secure version of the protocol
SNMPv1
(SNMP) original version; rarely used today
SNMPv2
(SNMP) still widely used
SIP (Session Initiation Protocol)
- Application layer signaling and control protocol for multiservice, packet-based networks. - Signalling protocol to set up an IP communication session
Disadvantages of virtualization
- Compromised performance - Increased complexity - Increased licensing costs - Single point of failure
Advantages of virtualization
- Efficient use of resources - Cost and energy savings - Fault and threat isolation - Simple backups, recovery, and replication
When first VM's NIC is selected
- Hypervisor creates a connection between that VM and the host - This connection might be called a bridge or switch
STP (Spanning Tree Protocol) - Operates in which layer?
- Operates in Data Link layer - Prevents traffic loops
Softphones
A computer programmed to act like an IP phone
LWAPP (Lightweight Access Point Protocol)
Direct all wireless frames to the controller by adding extra headers to the frames
Segmentation
Dividing a network into multiple smaller networks
Greatest advantage to packet switching
Does not waste bandwidth by holding a connection open until a message reaches its destination
....are commonly used on multiservice networks that support a number of media gateways
MGCP and Megaco
Switch Dependent Mode
MIC teaming accomplished with a single switch (intelligent).
VMware
Makes the most widely implemented virtualization software
DiffServ (Differentiated Service)
Modifies actual IP datagram (header and data) and Accounts for all network traffic
MPLS (Multiprotocol Label Switching)
Modifies data streams at Network Layer. Replaces IP datagram header with label. fast forwarding.
Performance management
Monitor links and devices' ability to keep up with demand
Web caching
Most common caching type, highly customizable.
IPv4 address is divided into two parts:
Network ID and host ID
ISP cache engine
Network device devoted to storage, frequently requested file delivery. Lowers WAN traffic.
VLAN hopping attack
Occurs when an attacker generates transmission that appear to belong to a protected VLAN
RTP (Real-time Transport Protocol)
Operates at Application layer. Provides end-to-end delivery services for delay-sensitive data, such as voice and video.
Unmanaged switch
Provides plug-and-play simplicity with minimal configuration
CoS (Class of Service)
Refers to techniques performed at Layer 2 on Ethernet frames.
Baseline
Report of network's current operation state
Unicast transmissions
Single node issues data stream to one other node
Network Management agent
Software routine that collects information about device's operation. Provides info to NMS
Hypervisor
Software that allows you to define and manage virtual machines (aka virtual machine manager)
Syslog function
Standard for generating, storing, and processing messages about events on Linux or UNIX. Data written to system log.
Transport Layer protocols
TCP and UDP
Unicast transmission
a single node issues a stream of data to one other node
Virtual switch
a switch that is created within a NAS or a server that has VMS. It lets you extend the amount of VMs. - Operates at Data Link layer - Passes frames between nodes
Numbers of 1s in the subnet mask determines the number of.... in the IP address belong to the network ID
bits
Trunk port
capable of managing traffic among multiple VLANs
Hot spare
component already installed in a device that can assume control at failure
Cold spare
component, not installed, but can be in the the event of failure
TCP
connection oriented protocol. Delivery guaranteed
UDP
connectionless protocol. Packet loss tolerable, preferred for real-time applications.
Managed switch
Can be configured via a command-line interface and are usually assigned an IP address
Network Management System
Central collection point
Public Switched Telephone Technologies
Circuit-switched model, carries telephone calls/faxes
Supernetting
Combine contiguous networks that all use the same CIDR block into one supernet (aka classless routing or IP address segmentation)
CALEA
Communications Assistance for Law Enforcement Act) Telecommunications carriers, equipment manufacturers must provide for surveillance capabilities
MGC (media gateway controller)
Computer managing multiple media gateways. Facilitates exchange of call signalling information. aka softswitch. Good for large VoIP networks
WAN link
Connection between one WAN site and another site
Circuit-switched networks
Connection is established between two network nodes before transmitting data
Management Information Base
Contains managed devices definition, data
MGCP (Media Gateway Control Protocol)
Converts analog signals into VoIP format. Translates between different signaling protocols.
Virtual network
Created to consist solely of virtual machines on a physical server
EF (Expedited Forwarding)
Data stream assigned minimum departure rate. Circumvents delays
AF (Assured Forwarding)
Data streams assigned different router resource levels. No guarantee of on time, in sequence packet arrival
Fault management
Detection and signaling of device, link, component faults
Switching
Determines how connections are created between nodes
Thin AP
simple devices that must be configured from the wireless controller's console
Interfaces that share a network prefix belong to the same....
subnet
Each VLAN is assigned its own....
subnet of IP addresses
CIDR (Classless Interdomain Routing)
- Provides additional ways of arranging network and host information in an IP address. - Takes the network ID or a host's IP address and follows it with a forward slash (/), followed by the number of bits used for the network ID
SDN (Software Defined Networking)
- The virtualization of network services - integrates all of the network's virtual and physical devices into one cohesive system -Control plane (protocols handle process of making decisions) - Data plane (make actual contact with data transmissions)
Host-only Mode
- VMs on one host can exchange data with each other and the host - Cannot communicate with nodes beyond the host - never receive or transmit data with host's physical NIC
NAT Mode
- vNIC relies on host to act as NAT (Network Address Translation) device - Obtains IP addressing information from host
3 benefits of subnetting in IPv6
1.) Simpler than IPv4, 2.) Classes not used, 3.) Subnet masks not used
CIDR Block
192.168.89.127/24 24 represents the number of 1s in the subnet mask and the number of bits in the network ID
192.168.89.127/24 The 24 (CIDR block) represents the number of .... in the subnet mask and the number of .... in the network ID
1s .... network ID
Trunk
A single physical connection between switches through which many logical VLANs can transmit and receive data
Network connection types
Bridged, NAT, and Host-only
IP telephony (VoIP)
Any network carrying voice signals using TCP/IP
Load balancing
Automatic traffic distribution over multiple components or links
Packet-switched networks
Break data into packets before they are transported
DiffServ has two forwarding types
EF (Expedited Forwarding) and AF (Assured Forwarding)
Virtualization
Emulation of a computer, OS, environment, or application. Running one OS on top of another. Allows IT to be more efficient.
Most common examples of packet-switched networks
Ethernet networks and the Internet
VLAN (virtual local area network)
Groups ports on a switch so that some of that local traffic on the switch is forced to go through a router
Subnetting in.... is simpler than subnetting in....
IPv6....IPv4
H.23
ITU standard describing architecture, protocols. Establishing, managing packet-switched network multimedia sessions
WAN site
Individual geographical locations connected by WAN
Signaling
Information exchange between network components or system. Establish, monitor, and release connections.
Caching
Local storage of frequently needed files. Allows quick access.
PCI DSS (Payment Card Industry Data Security Standard)
To protect credit card data and transactions
Interface monitor
Tool that can monitor traffic at a specific interface between a server or client and the network
Network monitor
Tool that continually monitors network traffic
IP telephones
Transmit and receive only digital signals
VRRP (Virtual Router Redundancy Protocol)
Used to assign a virtual IP address to a group of routers
Simple Network Management Protocol
Used to communicate managed device information. part of TCP/IP suite
Virtualization purpose
makes computer act and perform like multiple computers
A VLAN can include ports from....
more than one switch
First four blocks in subnetting normally identify the...
network
WANS connect...
networks
LANS connect...
nodes
on a VoIP, logical channels are identified as ..... at each IP address
port numbers
UDP is preferred over TCP for .....
real-time services (e.g. telephone conversations and video conferences)
Link aggregation
seamless combination of multiple network interfaces or ports to act as one logical interface
Thick AP
self-contained without relying on a higher level management device
Signaling protocol
set up and manage sessions between clients
One way to consider availability is by measuring a system or network's....
uptime
Access port
used for connecting a single node
Subnet mask
used so devices can determine which part of an IP address is network ID and which part is the host ID
Bridged Mode
vNIC (virtual Network Interface Controller) accesses physical network using host machine's NIC - Obtains own IP address, default gateway, and netmask from DHCP server on physical LAN
Hypervisor controls...
virtual switches