ITNW 1325 Exam 1 - Chapter 1
Cloud Computing
Allows users to store personal data, even backup entire hard disk drives on servers over the internet. (Types of clouds can be found on page 38 of the textbook.)
BYOD
Bring Your Own Device; End users having the freedom to use personal tools to access information and communicate across a business or campus network.
Scalability
Can expand quickly to support new users and applications without impacting the performance of the service being delivered to end users.
Converged network
Capable of delivering data, voice & video between many different types of devices over the same network infrastructure.
End devices
Computers, Printer, IP Phone, Wireless Tablet, TelePresence Endpoint
Primary goals of network Security - maintaining Confidentiality, Integrity, Availability (CIA)
Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data. Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Availability - Data availability means having the assurance of timely and reliable access to data services for authorized users.
Home options for connecting to the Internet
DSL, Cable, Cellular, Satellite, Dial-Up Telephone.
Corporate options for connecting to the Internet
Dedicated Leased Lines, Metro Ethernet, DSL, Satellite.
Circuit switched networks
Establishes a dedicated circuit between the source and destination before the users may communicate. Traditionally used for voice communications.
4 basic requirements of a reliable network
Fault Tolerance, Scalability, QoS, Security
Logical topology
Identify devices, ports, and addressing scheme.
Physical topology
Identify the physical location of intermediary devices and cable installation.
LAN
Local Area Network - A network infrastructure that provides access to users and end devices in a small geographical area, which is typically an enterprise, home, or small business network owned and managed by an individual or IT department.
MAN
Metropolitan Area Network - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization.
Peer-to-Peer networks
Not as reliable, good for home/small business
Packet switched networks
Packet switching splits traffic into packets that are routed over a shared network.
Intranet
Private connection of LANs and WANs that often belong to an organization and is designed to be accessible only by the organization's members, employees, or others with authorization.
Extranet
Provides secure and safe access to individuals who work for a different organization, but require access to the organizations data.
QoS
Quality of Service; With a QoS policy in place, the router can manage the flow of data and traffic, giving priority to certain communications if the network experiences congestion.
Intermediary network devices
Router, Firewall, Switch
SAN
Storage Area Network - A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.
Types of attacks
Virus, worms and Trojan horses - Malicious software and arbitrary code running on a user device. Spyware and adware - Software installed on a user device that secretly collects information about a user. Zero-day attacks AKA Zero hour attacks - An attack that occurs on the first day that a vulnerability becomes known. Hacker Attacks - An attack by a knowledgeable person to user devices or network resources. Denial of service - Attacks designed to slow or crash applications and processed on a network device. Data interception and theft - An attack to capture private information from an organization's network. Identity theft - An attack to steal the login credentials of a user in order to access private data.
Client/server networks
Web Client & Server, Email Client & Server, File Client & Server.
WAN
Wide Area Network - A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider.
WLAN
Wireless LAN - Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
Be able to use the following commands as necessary in a scenario • Ping • Tracert • ipconfig
ping - Test connectivity to a switch tracert - Used to trace the path that an Internet Protocol (IP) packet takes to its destination. ipconfig - displays the current configuration of the installed IP stack on a networked computer. When used with the /all switch, it displays a detailed configuration report for all interfaces