Network + 2.0 Network Implementations
Quality of Service (QoS)
Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use.
Router
Primary function is to forward data packets between different computer networks, making decisions based on destination IP addresses
WPA2 Enterprise Encryption
Supports individual authentication to the wireless network.
Media Access Control (MAC) address Tables
Tables in network switches and routers that store MAC addresses and their associated switch ports
Voice over Internet Protocol (VoIP)
Technology that allows users to make telephone calls over the Internet
Duplexing
The ability for network data to travel inbound and outbound simultaneously.
Traffic Shaping
Traffic shaping delays excess traffic by buffering it as opposed to dropping the excess traffic. Think of queues.
Channel bonding
Two channels that do not overlap are used together in an effort to double the physical data rate. Typically used in 5ghz networks for double the bandwidith.
Wireless LAN controller
A central device that manages a network's WAPs
Layer 2 Switch
A data link layer switch. The primary function of a Layer 2 switch is to forward network traffic based on the hardware address, known as the Media Access Control (MAC) address, of the devices connected to it.
Load Balancer
A dedicated network device that can direct requests to different servers based on a variety of factors.
Auto-medium-dependent interface crossover (MDI-X)
A feature that automatically detects and configures the correct cable type (straight-through or crossover) for network connections
Power over Ethernet (PoE)
A feature that might be available on high-end wired network adapters that allows power to be transmitted over Ethernet cable to remote devices.
Border Gateway Protocol (BGP)
A hybrid routing protocol, combining hops and speed of connections, used in WAN. Main Protocol the Internet uses.
Data virtual local area network (VLAN)
A logically segmented network created by grouping devices together based on their functional roles, regardless of their physical location.
Printer
A machine that prints characters or other images on paper
Port Aggregation
A method for joining two or more switch ports logically to increase bandwidth. Requires manual configuration
Port Mirroring
A monitoring technique in which one port on a switch is configured to send a copy of all its traffic to a second port.
Service Set Identifier (SSID)
A network name that wireless routers use to identify themselves.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
A network protocol where a collision will automatically be detected and the device will wait a random amount of time to try to send their traffic again.
Spanning Tree Protocol (STP)
A protocol that enables switches to detect and repair bridge loops automatically.
Dynamic Routing
A set of protocols which allows routers to automatically communicate with one another in order to select optimal paths for packets to travel
Power over Ethernet Plus (POE+)
A specific PoE standard which uses two wire pairs to supply power with a maximum of 30 watts as supplied by the PSE
Supervisory Control and Data Acquisition (SCADA)
A system of hardware and software components that enables the monitoring and control of industrial processes, facilities, and infrastructure.
Port Tagging
A technique of adding a VLAN ID into an Ethernet frame. The tag identifies which VLAN the frame is coming from or going to. A tagged frame is called an 802.1q frame
Open Shortest Path First (OSPF)
An interior gateway routing protocol developed for IP networks based on the shortest path first or link-state algorithm.
Static Routing
An type of routing used by a network administrator to manually specify the mappings in the routing table.
Physical access control devices
Devices used to control and restrict access to physical locations, such as card readers, biometric scanners, and electronic locks.
Port Security
Disabling unused application/service ports to reduce the number of threat vectors.
Routing Internet Protocol (RIP)
Distance vector protocol, determines the amount of hops to the destination and uses that route. Ignores how fast a connection is, so not ideal with large networks.
Exterior vs interior (Routing)
Distinguish between two types of gateway routing protocols based on their scope and function within a network. Interior: A single organization's network. exterior: They are used to exchange routing information between separate and potentially independent networks or organizations.
Media Converter
Enables networks running on different media to interconnect and exchange signals.
Jumbo Frames
Ethernet frames that exceed the IEEE 802.3 limit of a 1,500 byte payload and can carry a payload of up to 9,000 bytes.
WiFi Channels
Every WIFI network communicates on a channel, a portion of the spectrum available. 2.4 ghz channels 1-11 5ghz channels 1-24
Flow control
Flow control in networking refers to mechanisms implemented to manage the rate of data transmission between devices, preventing issues like congestion and ensuring efficient communication
Address Resolution Protocol (ARP)
IMaps IP addresses to MAC addresses Operates at layer 2 (Data Link) ARP Request: The requesting device sends an ARP request broadcast packet containing the target IP address, asking, "Who has this IP address, and what is the corresponding MAC address?" Step 1: The ARP request is broadcasted to all devices on the local network. Step 2: ARP Reply: The device with the matching IP address sends an ARP reply packet directly to the requesting device, providing its MAC address. Step 3: Requesting Device Caches the information in an ARP table In IPv6 Neighbor Discovery Protocol replaces ARP.
Voice Gateway
Means of translating between a VoIP system and legacy voice equipment and networks.
Default Route
A backup route, usually to another router, used when a router cannot determine a path to a message's destination.
Hub
A basic networking device that connects multiple devices in a network. It operates at a simple level, broadcasting data to all connected devices, which causes data collisions. Legacy device no longer used (a switch would be)
MIMO (multiple input-multiple output)
wireless communication technology that uses multiple antennas at both the transmitter and receiver to improve communication performance.
Enhanced Interior Gateway Routing Protocol (EIGRP)
-A dynamic link state protocol (developed by Cisco) -Records transmission capacity, delay time, reliability and load for all paths -Keeps the routing tables for its neighbors and uses this information in its routing decisions as well
Neighbor Discovery Protocol (NDP)
1. Address Resolution: Resolves IPv6 addresses to link-layer (MAC) addresses. 2. Router Discovery: : Routers periodically send Router Advertisement messages to announce their presence and provide information about the network. 3. Duplicate Address Detection (DAD): used to check if an IPv6 address is already in use on the network to avoid address conflicts. 4. Router Redirection (RR): Routers can send Router Redirection messages to inform hosts about a better next-hop router for a specific destination. 5. Routers include Prefix Information Options in Router Advertisement messages to inform hosts about address prefixes for the network. NDP functions are carried out through ICMPv6
802.11b
11 Mbps, 2.4 GHz
2.4-GHz band
11 unlicensed channels, and is used by WLANs that follow the popular 802.11b and 802.11g standards. 1, 6, and 11) are recommended to avoid interference. 20 MHz Band Wifth
802.11a
54 Mbps - 5 GHz
802.11g
54 Mbps, 2.4 GHz
802.11ac
5GHz 1300mbps
802.11n
600 Mbps - 5GHz and 2.4GHz
Voice VLAN
A VLAN defined for use by IP Phones, with the Cisco switch notifying the phone about the voice VLAN ID so that the phone can use 802.1Q frames to support traffic for the phone and the attached PC (which uses a data VLAN).
VPN headend
Centralized endpoint or gateway of a VPN network. It is the location where remote users or branch offices connect to establish a secure and encrypted connection to the private network.
Layer 3 Switch
Combines the features of a traditional Layer 2 switch with routing capabilities typically found in routers.
IoT (Internet of Things)
Refers to the interconnected network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity.
Distance Vector Routing
Routing based off how many hops/distance away the destination is. Good for smaller networks, but bad when you have thousands of routers to manage.
Link State Routing
Routing based off the speed of the network link. Used in large networks. OSPF is an example of this.-
Hybrid Routing
Routing protocol that uses the attributes of both distance vector and link state
WPA2 Personal Encryption
WPA2 Personal uses a pre-shared key (password) for authentication. Same Key for All Devices: All devices on the network use the same pre-shared key.
WPA Encryption
WiFi protected access strong authentication and data encryption replaced WEP
802.11ax
WiFi6, 5GHz or 2.4GHz, many different channel widths, 1201Mbits/channel, 8 bidirectional MU-MIMO, OFDMA
DSL modem
a broadband modem that sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line
Bridge
connects two or more network segments, making them function as a single network. Bridges are designed to filter and forward data based on MAC addresses, helping to reduce collision domains and improve overall network efficiency. Example: Switch
MU-MIMO (multiuser MIMO)
enables a wireless access point (AP) to communicate with multiple user devices simultaneously in the same frequency band
Proxy Server
intermediary server that sits between a user's device and its destination. Can be used for increased security, access control, load balancing.
5-GHz band
it consists of 24 unlicensed bands, each 20 MHz wide.
Firewall
monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.
Link Aggregation Control Protocol (LACP)
protocol used in computer networking to enable the automatic bundling or aggregation of multiple network links (Ethernet ports) into a single logical channel. Scenario: You need to increase the overall bandwidth between two devices to handle higher data transfer requirements. Use of LACP: LACP allows you to aggregate multiple links into a single logical link, providing increased bandwidth and improved data transfer capabilities.
Repeater
receives and repeats a signal to extend its attenuation or range
Intrusion Prevention System (IPS)
software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks
Access Point
the computer or network device that serves as an interface between devices and the network