Module 1 - Networks Today Flashcards
What is an end device?
An end device is either the source or destination of a message transmitted over the network.
Peer-to-Peer Network Advantages
Easy to set up, less complex, lower cost, simple tasks
Peer-to-Peer Network Disadvantages
No centralized administration
Not as secure
Not scalable
All devices may act as both client and server, slowing performance.
What are Intermediary Devices?
Intermediary devices connect the individual end devices to the network. They can connect multiple individual networks to form an internetwork. These intermediary devices provide connectivity and ensure that data flows across the network.
Criteria for Choosing Media
Maximum distance media can carry signal
Environmental requirements for media install
How much data and at what speed will it be transmitted
What is the cost of the media and installation
Which of the following is the name for all computers connected to a network that participate directly in network communication?
Hosts
When data is encoded as pulses of light, which media is being used to transmit the data?
Fiber Optic Cable
Name two intermediary devices
Routers, Switches
Network Interface Card (NIC)
A NIC physically connects the end device to the network. It is a specialized port on a networking device that connects to individual networks.
Physical Port
A connector or outlet on a networking device where the media connects to an end device or another networking device
Interface
Specialized Ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
Physical Topology Diagrams
Physical topology diagrams illustrate the physical location of intermediary devices and cable installation
Logical Topology Diagrams
Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network, They show which devices connect by which media.
What is a WAN
A WAN is a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet Service Providers (ISPs).
What is an intranet?
Company only network
What is an extranet?
Network allowing access for company, but also suppliers, customers, and collaborators.
Cable
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
DSL
Digital Subscriber Lines providing high bandwidth, high availability, always-on connection. Asymmetrical DSL has higher download than upload. Symmetrical DSL has equal speeds up and down, but is more expensive generally and used primarily by businesses.
Cellular
Performance is limited by capabilities of phone and tower. Allows connection where there is signal.
Satellite
Depends on line of sight and provides connection to places where there would otherwise be no connection. Rural areas are a good example.
Dial-up Telephone
Inexpensive low bandwidth internet. Not usually used for large transfers, but can allow access while traveling.
Dedicated Leased Line
Leased lines are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
Metro Ethernet
This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN.
Four characteristics of networks that an architect must address
FAult tolerance, Scalability, Quality of Service, Security
Fault Tolerance
A fault tolerant network is one that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages are instantly sent over a different link. Having multiple paths to a destination is known as redundancy.
Scalability
A scalable network expands quickly to support new users and applications. It does this without degrading the performance of services that are being accessed by existing users.
QoS
Quality of Service. With a QoS policy in place, the router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.The focus of QoS is to prioritize time-sensitive traffic. The type of traffic, not the content of the traffic, is what is important.
Network Security
Confidentiality - Data confidentiality means that only the intended and authorized recipients can access and read data.
Integrity - Data integrity assures users that the information has not been altered in transmission, from origin to destination.
Availability - Data availability assures users of timely and reliable access to data services for authorized users.
Cloud Types
Public Clouds, Private Clouds, Hybrid Clouds, Community Clouds
Public Clouds
Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.
Private clouds
Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization’s private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.
Hybrid clouds
A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.
Community clouds
A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.
Powerline Network
Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet. No data cables need to be installed, and there is little to no additional electricity used. Using the same wiring that delivers electricity, powerline networking sends information by sending data on certain frequencies.
Types of Security Threats
Viruses, Worms, Trojan Horses; Spyware and adware; zero-day attacks; threat actor attacks; denial of service attacks; data interception and theft; identity theft.
Zero-Day Attacks
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Spyware and adware
Types of software which are installed on a user’s device. Secretly collects information about the user.
Denial of Service Attacks
These attacks slow or crash applications and processes on a network device.
Access Control Lists
Provide additional filtering and traffic forwarding base don IP addresses and applications
Intrusion Prevention Systems
Identify fast-spreading threats such as zero-day or zero-hour attacks.