Cisco Introduction to Networking Chapter 1
Intermediary Network Devices Some Responsibilities.
1. Classify and Direct Data. 2. Permit or deny flow of data. 3. Notify other devices if an error in the pathway exists 14 Maintain information.
Three types of media to interconnect devices.
1. Copper 2. Fiber-Optic 3. Wireless
Four basic characteristics of a reliable network
1. Fault Tolerance 2. Security 3. Quality of Service 4. Scalability
Some Intermediary Network Devices
1. Wireless Router 2. Multi-layer Switch 3. Firewall Application 4. Router 5. LAN Switch
Network Interface Card
A NIC, or LAN adapter, provides the physical connection to the network at the PC or other end device.
Physical Port
A connector or outlet on a networking device where the media is connected to an end device or another networking device.
What is a fault tolerant network.
A fault tolerant network is one that limits the impact of a failure, so that the fewest number of devices are affected. This means multiple paths for packets to take to get to their end destination.
Scalable Network
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
Hacker attacks
An attack by a knowledgeable person to user devices or network resources
Zero-day attacks, also called zero-hour attacks
An attack that occurs on the first day that a vulnerability becomes known
Data interception and theft
An attack to capture private information from an organization's network
Identity theft
An attack to steal the login credentials of a user in order to access private data
Wireless Broadband Service
Another wireless solution uses the same cellular technology used to access the Internet with a smart phone or tablet
Denial of service attacks
Attacks designed to slow or crash applications and processes on a network device
Three Components of Security
Confidentially Integrity Availability
Data encoding for each type of media that interconnects devices
Copper: Electric Pulses Fibre-Optic: Pulses of light Wireless: wavelengths
End Device
End device is either the source or destination of a message transmitted over the network
All computers connected to a network that participates directly in network communication are classified as.
Hosts known as end devices.
Wireless Internet Service Provider (WISP)
ISP that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area networks (WLANs)
One way reliable networks provide redundancy.
Implementing a packet switched network
Extranet
Individuals who do not work directly for the org but still need access to the organizations network.
Ports on a router are considered
Interfaces
Role of Intermediary Network Devices
Intermediary devices connect the individual end devices to the network and can connect multiple individual networks to form an internetwork
Man Size
Larger then a LAN Smaller then a WAN
LAN
Local Area Network
Viruses, worms, and Trojan horses
Malicious software and arbitrary code running on a user device
MAN
Metropolitan Area Network
Who owns the internet
Nobody
Intranet
Private collection of LANS and WANS that belong to an organization.
What is a server?
Servers are computers with s software that enable them to provide services to devices on the network.
Geographical location of LAN
Single
Three Main Characteristics of a WAN
Slower speeds between LANS Administrated by multiple providers WANS intro connect LANS
Spyware and adware
Software installed on a user device that secretly collects information about the user
Geographical location
Spans multiple geographical location
Interface
Specialized ports on a networking device that connect to individual networks.
SAN
Storage Area Network
File Server
Stores corporate and user files in a central location. Client devices access this media.
Access control lists (ACL)
These are used to further filter access and traffic forwarding.
Intrusion prevention systems (IPS)
These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
Dedicated firewall systems
These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Virtual private networks (VPN)
These are used to provide secure access to remote workers.
Peer to Peer Networking
When one computer carries out the role of both client and server.
WAN
Wide Area Network s
What is the Internet
Worldwide collection of intro connected networks.
Three Main Characteristics of a LAN
interconnects end devices. Administrated by a single org High speed bandwidth for internal devices and Intermediary devices.