Module 1: Networking Today
Client
A type of host that has software for requesting and displaying the information obtained from the server.
Host
All computers that are connected to a network are classified as hosts. Hosts can also be called end devices. "Host" specifically refers to devices on the network that are assigned a number (IP address) for communication purposes.
Community Clouds
Cloud created for exclusive use by specific entities or organizations. Similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance restrictions. Ex: healthcare organizations that must comply with HIPPA regulations might have this type of cloud.
Public Clouds
Cloud-based applications and services available to the general population.
Private Clouds
Cloud-based applications and services intended for a specific organization or entity, such as a government.
Servers
Computers with software that allow them to provide information, like email or web addresses, to other end devices on the network.
CIA - (3) Primary requirements to achieve network security goals
Confidentiality Integrity Availability
Describe CIA as related to network security
Confidentiality - only the intended and authorized recipients can access and read data Integrity - assures user that information has not been altered in transmission from origin to destination Availability - assures users of timely and reliable access to data services for authorized users.
Network Fault Tolerance
Describes network characteristic that limits the number of affected devices during a failure. Built to allow quick recovery, and depends on multiple paths between source and destination of a message. If one path fails, the messages are instantly sent over a different link.
Intermediary Devices
Devices that connect individual end devices to the network and provide connectivity to ensure that data flows across the network. They can also connect multiple networks.
Logical Topology Diagram
Diagram that illustrates devices, ports, and the addressing scheme of the network. Depicts which end devices are connected to which intermediary devices and what media is being used.
(Home and Small Office Internet Connections) - DSL
Digital Subscriber Line. Internet connection where internet data runs over a telephone line. Most small office and home users connect using Asymmetrical DSL (download speed faster than upload)
Wireless Broadband
Internet connection where a Wireless Internet Service Provider (WISP) connects subscribers to a designated access point using similar technologies found in home WLANs. Usually found in rural environments where DLS or cable services are not available. WISP transmitter connects to small dish or antenna on the roof of a facility, which is connected to a wired network inside the facility.
(Home and Small Office Internet Connections) - Cable
Internet connection where internet data signal transmits on same cable that delivers cable television. High bandwidth, high availability, alway-on connection to internet.
(Home and Small Office Internet Connections) - Cellular
Internet connection where internet data used a cell phone network to connect. Performance limited by capabilities of the phone and cell tower used to connect.
LAN
Local Area Network. A network infrastructure that provides access to users and end devices in a small geographical area
Cloud Computing
Method of accessing and storing data that allows us to store personal files or even back up entire drives on servers over the internet. This method is made possible by data centers - facilities used to house computer systems and associated components where the data is stored.
Extranet
Provides secure and safe network access to individuals who work for a different organization but require access to the organization's data. ex: a company creates and uses this to provide access to outside suppliers and contractors.
Firewall filtering
This blocks unauthorized access into and out of the network. May include a host based system that prevents unauthorized access to the end device, or basic filtering service on a home router to prevent unauthorized access from the outside world into the network.
Powerline Networking
Uses existing electrical wiring in a facility to connect devices. Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet. Using the same wiring that delivers electricity, this type of networking send info by sending data on certain frequencies.
Characteristics of Network Reliability (4)
(1) Fault Tolerance (2) Scalability (3) Quality of Service (QoS) (4) Security
(4) Criteria for choosing network media
(1) Max distance media can successfully carry a signal (2) Environment in which media will be installed (3) Amount of data and at what speed it must be transmitted (4) Cost of the media installation
Types of Topology Diagrams (2)
(1) Physical Topology Diagram (2) Logical Topology Diagram
General terms commonly used to categorize different network sized
(1) Small Home Networks (2) (SOHO) Small Office and Home Office Networks (3) Medium to Large Networks (4) World Wide Networks
NIC
A Network Interface Card (NIC) physically connects the end device to the network
Physical Port
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Threat actor attacks
A malicious person attacks user devices or network resources
Zero-day attacks
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known
Network Quality of Service (QoS)
Describes mechanism used to manage congestion and ensure reliable delivery of content to all users. The router manages the flow of data giving priority as assigned by the type of traffic. For example, voice communication may be prioritized over web page data delivery.
Bring Your Own Device
Enables en users the freedom to use personal tools/devices to access information and communicate across a business or campus network.
Physical Topology Diagram
Illustrates the physical location of intermediary devices and cable installation. Labels things such as rooms, racks, and shelves, etc. where items are located
What does an IP address identify
Internet Protocol Address identifies the host and the network to which the host is attached.
(Business Internet Connections) - Business DSL
Internet connection similar to consumer version of DSL but used by businesses. Popular choice is Symmetric Digital Subscriber Line (SDSL)
(Business Internet Connections) - Metro Ethernet
Internet connection sometimes referred to as Ethernet WAN - ethernets are used extend LAN access technology into WAN.
(Home and Small Office Internet Connections) - Dial-up Telephone
Internet connection that uses any phone line and a modem to connect to internet. low bandwidth not sufficient for large data transfer.
(Home and Small Office Internet Connections) - Satellite
Internet connection that uses satellite to connect to internet, useful in remote areas that might otherwise not have connectivity. Requires line fo sight to the satellite.
(Business Internet Connections) - Dedicated Lease Lines
Internet connection where reserved circuits within a service provider's network that connect geographically separated offices for private voice and/or data networking. Typically rented at a monthly or yearly rate
Hybrid Clouds
Made up of two or more clouds (ex: part private, part public), where each part remains a distinct object but both are connected using a single architecture. Individuals on this type of cloud would be able to have various degrees of access based on user access rights
Peer-to-Peer Network
Network where computers function as both the servers and clients on the network (typically in small businesses and homes)
Network Media Types (3)
Provides the channel over which a message travels from source to destination (1) Metal wires within cables - data in encoded into electrical impulses (2) Glass or plastic fibers within cables (fiber-optic cable) - data is encoded into pulses of light (3) Wireless transmission -data is encoded via modulation of specific frequencies of electromagnetic waves
Intranet
Refers to a private collection of LANs and WANs that belongs to an organization. Designed to be accessible only by the organization's members, employees, or others with authorization.
Interface
Specialized ports on a networking device that connects individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
Smart Home Technology
Technology that integrates into every-day appliances, which can then connect with other devices, to make appliances more "smart" or automated.
Network Scalability
Term that describes the capacity of a network to expand quickly to support new users and applications without degrading the performance of services being accessed by existing users.
Network Security
Term that encompasses the measures taken to physically secure devices that provide network connectivity, prevent unauthorized access to management software, and protect information contained within packets being transmitted over a network, etc.
Converged Networks
Term used to describe how previously separate data, telephone, voice, and video networks came together with technological developments that allowed delivering various forms of communication over the same network infrastructure using the same set of rules, agreements, and implementation standards.
Online Collaboration
The act of working with another or others on a joint project using online tools connected within a network.
Antivirus and antispyware
These applications help to protect end devices from becoming infected with malicious software
Spyware and adware
These are types of software which are installed on a user's device. The software then secretly collects information about the user.
Intrusion prevention systems (IPS)
These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
Denial of service attacks
These attacks slow or crash applications and processes on a network device.
Viruses, worms, and Trojan horses
These contain malicious software or code running on a user device.
Access control lists (ACL)
These further filter access and traffic forwarding based on IP addresses and applications.
Dedicated firewall systems
These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity
Virtual Private Network (VPN)
These provide secure access into an organization for remote workers using an encrypted connection over the internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted.
Data interception and theft
This attack captures private information from an organization's network.
Identity Theft
This attack steals the login credentials of a user in order to access private data
WAN
Wide Area Network. A network infrastructure that provides access to other networks over a wide geographical area. Used to interconnect LANs
The Internet
Worldwide collection of interconnected networks.