Les 1 Flashcards
6 x 2
mac adres
IPv6
128 bit
LAN
VLAN Virtual
WAN
local area network
port forwarding
Port forwarding of port mapping is het doorsturen van een TCP- of UDP-pakket(User Datagram Protocol) in een
NAT-gateway om een intern netwerk aan een extern netwerk te koppelen door middel van poortnummers.
ISP
Internet Service Provider which is a company providing Internet access.
23
telnet is open
22
SSH Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network
25
SMTP
simple mail transfer protocol
53
DNS
80
http
110
pop3 email ontvanger
443
https
143
imap mail synchronisatie
TCP
Transmission Control Protocol (TCP) – a connection-oriented communications protocol that facilitates the exchange of messages between computing devices in a network. It is the most common protocol in networks that use the Internet Protocol (IP); together they are sometimes referred to as TCP/IP.
UDP
User Datagram Protocol
In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite.
NAT
Network address translation (NAT) is a method of remapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
MAN
Metropolitan Area Network (MAN) - A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (a city). MANs are typically operated by a single entity such as a large organization.
SAN
Storage area network
A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.
The Internet Engineering Task Force (IETF)
Internet Corporation for Assigned Names and Numbers (ICANN)
The Internet Architecture Board (IAB)
internet
Intranet
Company only
Extranet
Customers
Internet
The world
DSL
Digital subscriber line
A system for sending and receiving information at high speeds over ordinary telephone lines
In some respects, DSL is superior to cable for Internet access.
Common conections HOHO
Cabel DSL Cellular (Phone) Satellite Dial-up-phone
Businesses Internet Connections
Dedicated Leased Line
Ethernet WAN
DSL
Satelite
Dedicated Lease Line
Leased lines are actually reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
Network Architecture
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
Fault Tolerance
Use a packet-switched network
Having multiple paths to a destination is known as redundancy.
circuit-switched networks
A circuit-switched network is one that establishes a dedicated circuit between the source and destination before the users may communicate
QoS
Quality of Service
Congestion occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).
When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability, creating network congestion.
When the volume of traffic is greater than what can be transported across the network, devices queue, or hold, the packets in memory until resources become available to transmit them. In the figure, one user is requesting a web page and another is on a phone call. With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.
Security
Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data.
Integrity - Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination.
Availability - Data availability means having the assurance of timely and reliable access to data services for authorized users.
BYOD
Bring your own device
Cloud Computing
Public Clouds for the general public like iCloud Private Clouds goverment expensive Hybrid Clouds both private and public Custom Clouds for health care/media for special needs
Powerline Networking
That uses existing electrical wiring to connect devices. The concept of “no new wires” means the ability to connect a device to the network
PLC
data communicate using the electricitynet.
Wireless Broadband
Wireless Internet Service Provider (WISP)
Security Threads
Viruses, worms Trojan horses
malicious software and arbitrary code running on a user device
Spyware and adware
software installed on a user device that secretly collects information about the user
Zero-day attacks also called zero-hour attacks - an attack that occurs on the first day that vulnerability becomes known
Hacker attacks
an attack by a knowledgeable person to user devices or network resources
Denial of service attacks
attacks designed to slow or crash applications and processes on a network device
Data interception and theft
an attack to capture private information from an organization’s network
Identity theft
an attack to steal the login credentials of a user in order to access private data
Security Solutions
Antivirus and antispyware
Are used to protect end devices from becoming infected with malicious software.
Firewall filtering
This is used to block unauthorized access to the network. This may include a host-based firewall system that is implemented to prevent unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world.
Dedicated firewall systems
Are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Access control lists (ACL)
Are used to further filter access and traffic forwarding.
Intrusion prevention systems (IPS)
Are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
Virtual private networks (VPN)
Are used to provide secure access to remote workers.
WLAN
Wireless LAN