Network + Flashcards
what are networks used for ?
networks are used to make connections between machines
server
a device that provides resources to the rest of the network
what is a client ?
a device used by an end-user to access the network
what is a wireless access point
a device that allows wireless devices to connect into a wired network
what is a switch?
a device that connects network devices together
operates at layer 2 of the OSI model
switches learn MAC address’s by analyzing incoming traffic, when it sees a mac address not in its table it adds it
what can switches learn ?
switches can learn what devices are on what ports
What is the primary function of a Router?
used to connect two different networks together and forwards traffic to and from the network
what is Media in a network?
connects two devices or a device to a switch port
what is the point of a Wide Area Network or WAN?
physically connects two geographical dispersed networks
how does the client server model work?
uses a dedicated server to provide access to files, scanners, printers and other resources
benefits of the client to server model ?
- administration and backup are easier under this model
- centralized administration
- easier management
- better scalability
disadvantages of the client server model
-higher cost
- requires specialized OS
-requires dedicated resources
what is the peer to peer model?
peers share resources files/printers directly with others
benefits of the peer to peer model
- lowcost
- no dedicated resource
- No specialized OS
drawbacks of the peer to peer model
decenetralized managament
inefficient for large networks
poor scalability
Pan?
personal area network
examples of a Pan network ?
bluetooth devices
Usb devices
explain a LAN or local area network ?
connects components within a limited distance
up to a few hundred feet
small offices
what standard does ethernet use ?
ethernet uses the IEEE 802.3 standard
what standard does wifi use ?
wifi uses the 802.11 standard
what is a CAN or campus area network ?
connects LANs that are building centric across a university, industrial park or business park
what does a MAN metropolitian area network connect?
connects scattered locations across a city or metro area ?
WAN wide area network
connects geographically disparate internal networks and consists of leased lines or VPNs
covers a large geographic area
the internet is the largest WAN avaliable
Wan distance?
world wide
MAN distance
city or county
CAN distance
campus area or business park
LAN distance
room or building
PAN distance
around a person
what does phsical mean in a network
how devices are connected by media
what does logical mean in a network
how the actual network traffic flows
Bus topology ?
uses a single cable where each device taps into by using either a vampire tap or a T connector
Ring topology ?
uses a cable running in a circular loop where each device connects to the ring but data travels in a singular direction
Ring topology: Token ring ?
ring topology that uses an electronic token to prevent collosions when communicating on the network
Ring topology: what does FDDI use ? explain FDDI
uses two counter rotating rings for redundancy
star topology ?
- most popular phsical LAN topology
- the central point of a star network is most likely going to be a switch
what is a drawback to a star topology ?
if the central device fails the whole network fails
Wireless: infastructure mode ?
uses a wireless access point as a centralized point and supports wireless security controls
Wireless: Ad Hoc mode ?
decentralized wireless network which creates P2P connections and does not require a router or access
Wireless mesh topology ?
interconnection of different types of nodes, devices, or radios
what does OSI stand for ?
OSI stands for open systems interconnection model
what are the 7 layers of the OSI model starting from Layer 1?
- phsical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
what is the phsical layer?
- where transmission of bits across the network occurs includes phsical and electrical network characteristics
what does the phsical layer decide ?
the phsical layer decides the topology of the network
what is asynchronous communication?
uses start and stop bites to indicate when transmissions occur from the sender to the reciever
what is a good example of asynchronous communication ?
something like a voicemail is a good example
what is synchronous communication ?
uses a refrence clock to coordinate the transmissions by both the sender and the reciever
broadband communication ?
divides our bandwidth into seperate channels
what is baseband communication ?
uses all availiable frequencies on a medium (cable to transmit data)
what is time division multiplexing ?
each session takes a turn using time slots to share the medium between users
what is multiplexing ?
multiplexing is getting more out of a limited network
what are some examples of Physical layer devices ?
- cable
- ethernet
- coaxial
- hubs
- access points
- media converters
what do layer 1 devices primarily do ?
usually they repeat what they are told.
what is the primary function of the data link layer?
packages data into frames and transmit those frames on the network
what do the first and second parts of a MAC address represent ?
the first 6 digits in a MAC address are the vendor code the second 6 are the unique value
Logical link control LLC ?
provides connection services and allows acknowledgment of receipt of messages
what are some examples of devices at the data link layer?
NIC’s
Bridges
Switches
what is the primary function of layer 3 the network layer?
forwards routing traffic with logical addressing
- the routing layer
- fragments frames to travers different networks
what are two common layer 3 protocols ?
IPV4 and IPV6
what is the big question at layer 3?
the big question at layer 3 is how data should be forwarded or routed.
how does Packet switching / routing work ?
data is divided into packets and then forwarded based on IP address
what is circuit switching ?
dedicated communication link is established between two devices for the duration of the communication
Like a phone call
what is message switching ?
data is divided into messages which may be stored then forwarded
what do routers maintain ?
a routing table
what is ICMP?
sends error messages and operational info to an IP address
most commonly used ICMP is ping
what are common devices found on layer 3?
Routers
multi-layer switches
ip and routers are the most common
what do we call the transport layer?
the transport layer is the dividing line between what we call the upper layers of the OSI model and the lower layers of the OSI model
when we talk about segments and datagrams what layer are we talking about?
we are talking about the transport layer
what are two protocols in the transport layer?
- TCP
-UDP
transmission control protocol ?
connection oriented protocol that is a reliable way to transport segments across the network
what is the UDP user datagram protocol ? EXPLAIN
connectionless protocol that is an unreliable way to transport segments across the network
what does connectionless mean ?
connectionless means it doesn’t have to wait for connections
EXAM: layer 4 what is layer 4 associated with
layer 4 is associated with segments almost exclusively because we use it with TCP
- TCP and UDP operate at layer 4
what is UDP very good for ?
udp is very good for audio and visual streaming
windowing ?
allows the clients to adjust the amount of data in each segment
what are some examples of layer 4 devices?
- TCP & UDP
- WAN accelerators
- Load balancers and firewalls
what is the primary function of the session layer ?
keeps conversations separate to prevent intermingling of data
- manages communication between devices start, stop ,restart
- tunneling occurs at this layer
how do sessions work in three steps ?
set up
maintain
tear down
explain setting up a session
checking of user credentials and assigning numbers to sessions to help identify them
explain tearing down a session
ending of a session after the transfer is done or when the other party disconnects
what is the primary focus of the presentation layer?
formats the data to be exchanged and secures the data with proper encryption
- Character encoding
what should we remember when we think about layer 6?
when you think about layer 6 remember data formatting and encryption
the presentation layer is responsible for formatting and encryption
what is data formatting ?
data is formatted by the computer to have compatibility between different devices
encryption ?
used to scramble the data in transit to keep it secure from prying eyes and provide data confidentiality
what is the primary function of layer 7?
provides application level services where users communicate with the computer
what are some things found on layer 7?
- email applications
- web browsing
- DNS
- FTP
-RDP
what are the 4 layers of the tcp ip model >
- network interface
- internet
- transport
- application
what makes up the application layer in the tcp/ip model?
the top three layers of the OSI model are all called the application layer in the TCP/IP model
so the session presentation and application layers
what is the network interface layers function in the TCP/ip model ?
describes how to transmit bits across the network and determines how the network medium is going to be used
what is the function of the internet layer in the TCP/IP model ?
data is taken and packaged into IP datagrams
what are some examples of protocols in the internet layer for the TCP/IP model
IP
ICMP
ARP
Reverse ARP
this is essentially the network layer of the OSI model so IP’s - ARP etc
what is the transport layers function in the TCP/IP model ?
defines the level of service and the status of the connection being used by TCP, UDP, or RTP
-support for end to end services
- support fo multiplexing
- support for port numbers mapping
what is the application layer’s function in the TCP/IP model ?
dictates how programs are going to interface with the transport layer by conduction session management
what is a port ?
logical opening on a system representing a service or application thats listening and waiting for the traffic
how many ports are there
65,535
how many well known or reserved ports are there ?
the well known or reserved port are 0-1023
ephermal ports ?
1024-65,535
what does an IPv4 packet consist of ?
- source address
-destination address - ip flags
- protocol
secure shell ssh
port 22
provides secure remote control of another machine using a text based environment
secure file transfer protocol SFTP
port 22
provides secure file transfers
Telnet
port 23
provides insecure remote control of another machine . remote access via the command prompt
simple mail transfer protocol SMTP
port 25
provides the ability to send emails over the network
Domain name services DNS
port 53
converts domain names to IP addresses and IP addresses to domain names
what port does Dynamic host control protocol or DHCP run on ?
ports 67,68
automatically provide network parameters to your clients such as their assigned ip address, subnet mask, default gateway, and the DNS server they should use
what port is trivial file transfer protocol TFTP?
What is TFTP typically used for ?
port 69 UDP
used as a lightweight file transfer method for sending configuration files or network booting of an operating system
usually used for sending or recieving config file from a router or switch
Hyper text transfer protocol HTTP
port 80
used for insecure web browsing
what port is POP3?
what is POP3 used for ?
port 110
used for recieving incoming emails
Network Time protocol NTP
port 123 UDP
used for keeping accurate time within a network
Network basic input/output system NetBios
port 139 TCP
used for file or printer sharing in a windows network
internet mail application protocol IMAP
port 143 TCP
a newer method of retrieving incoming emails which imporves upon the older POP3
simple network management protocol SNMP
ports 161,162 UDP
used to collect data about network devices and monitor there status
Lightweight directory access protocol LDAP
ports 389 TCP
used to provide directory services to your network
Hypertext transfer protocol secure HTTPS
port 443 used for secure web browsing
server message block SMB
port 445 TCP
used for windows file and printer sharing services
system logging protocol syslog
port 514 UDP
used to send logging data back to a centralized server
simple mail transfer protocol transport layer security SMTP TLS
port 587 TCP
secure and encrypted way to send emails
Lighweight directory access protocol secure
port 636 provide directory services in a secure way
POP3 over SSL
port 995 secure and encrypted way to recieve emails
structured query language server protocol SQL
port 1433 used for communication from a client to the database engine
Microsoft structured query language
port 3306 used for communication from a client to Mysql database engine
Remote Desktop protocol RDP
port 3389 provides graphical remote control from another client to a server
what is TCP what layer of the OSI model is it on?
TCP is a transport layer protocol that operates at layer 4 of the OSI model
how does TCP work ?
TCP operates by conducting a three way handshake between a client and a server and then establishes the connection
what is TCP considered?
TCP is considered connection oriented
what is UDP considered ?
UDP is considered fast and easy to use
what is ICMP
ICMP is used to communicate information about network connectivity isssues back to the sender ping is a great example of ICMP
Generic routing encapsulation or GRE?
used as a simple and effective way to create a tunnel called a GRE tunnel over a public network
do GRE tunnels provide us with any encryption ?
They do not
Internet Protocol Security IPsec
used to protect one or more data flowes between peers and it uses encryption
what security controls will implemeting IPSec accomplish for us ?
- data confidentiality
- data integrity
- origin authentication
- Anti-replay
what two protocols does IPSec use to achieve encryption ?
AH and ESP
IPSec: AH authentication header?
a protocol within IPSec that provides integrity and authentication
IPSec: Encapsulating Security Payload or ESP?
provides encryption and integrity for the data packets sent over IPSec
what are the three types of media?
- copper
- fiber optic
- wireless
what is media ?
matariel used to transmit data over the network
what are the three types of copper media ?
- coaxial
- twisted pair
- serial
what are f-type connectors ?
F-type connectors are a screw on type of connector
what are the two types of twisted pair cabeling ?
UTP or STP
what does UTP stand for ?
UTP stands for unshielded twisted pair
what does STP stand for
shielded twisted pair
what are the two ways someone can get access to a network ?
Deterministic and Contention based
deterministic ?
very organized and orderly and requires an electronic token to transmit. Like a student in a classroom getting called on
contention based networks ?
very chaotic and can transmit whenever possible.
what is the problem with contention based networks ?
you can have collosions
does ethernet use a contention or deterministic method ?
contention
how does ethernet prevent collosions ?
Ethernet prevents colisions with CSMA/CD
Carrier sense multiple access with collision detection CSMA/CD?
prevents collosions by using carrier-sensing to defer transmissions until no other stations are transmitting.
what is a collision domain ?
each area of the network that shares a single segment is known as a collision domain
collision domain devices in a group whose frames can collide with each other
what does adding an ethernet switch do for our network ?
increases scalability of a network by creating multiple collision domains
bandwidth?
measures how many bits the network can transmit per second
how far can multi-mode fiber reach?
multimode fiber can reach distances of 200-500 meters
how far can single mode fiber travel ?
single mode fiber can go up to 40 kilometers
how far can copper cables transmit data ?
maximum distance of a 100 meters
Using cat 6 at 100 meters what will the speed be ?
Using CAT 6 at 100 meters will limit the speed from 10 Gbps to 1 Gbps
what speed will you get using CAT 6 at under 55 meters.
Using CAT 6 at under 55 meters can reach 10 Gbps of speed
what type of fiber should we use for long distances ?
single mode fiber
what sort of fiber do we need to use with long distances ?
fiber for long distances you need to use single mode
what is a hub?
also known as a multi-layer repeater it is a layer 1 device that connects multiple network devices and workstations.
what are the three types of hubs ?
- Passive hub
- active hub
- smart hub
Passive hub ?
repeats signal with no amplification
Active hub ?
repeats signal with amplification
smart hub ?
active hub with enhanced features like SNMP
how does a bridge make forwarding decisions?
analyzes source MAC address and makes intelligent forwarding decscions based on the destination MAC in the frames
switch ?
also known as a multiport bridge it is a layer 2 device that connects multiple network segments together .
what is a switch essentially?
a switch is essentially a multi-port bridge
what layer does a router operate at ?
a router is a layer three device
what is a router?
layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information
what is a layer 3 switch ?
makes layer 3 routing decisions and then interconnects entire networks not just the network segments
EXAM: switch ?
layer 2 device focused on MAC addresses
Exam: router ?
layer 3 device focused on IP addresses
what are some additional features switches can offer ?
- VLANs
- Trunking
- STP
- Link aggregation
- power over ethernet
- Port monitoring
- User authentication
what is link aggregation?
combines multiple phsical connections into a single logical connection to minimize or prevent congestion
what is the standard for link aggregation ?
IEEE 802.3ad
are switches full duplex ?
switches are full duplex which means every port can operate at 100mbps
power over ethernet ?
supplies electrical power over ethernet and requires cat 5 or higher copper cable.
what is the benfit of power over ethernet ?
the benefit of power over ethernet is instead of needing two seperate cables for power and data you can use one cord for both
port mirrioring ?
makes a copy of all traffic destined for a port and sends it to another port
switches can provide additional features such as ?
- port mirrioring
- secure shell ssh
- ot-of-band-management
- first hop redundancy
- MAC filtering
- traffic filtering
out-of-band management ?
keeps all network configurations devices on a seperate network
First hop redundancy
uses hot standby router protocol to create a virtual IP and MAC addresses to provide active and stanby routers
How do devices such as a switch do traffic filtering at layer 2 ?
permits or denies traffic based on a device’s MAC address
what is the standard for spanning tree protocol ?
802.1d
spanning tree protocol STP ?
permits redundant links between switches and prevents loopong of network traffic
STP is the IEEE 802.1d standard
shortest path bridging SPB
used instead of STP for larger network environments
VLAN ?
allows different logical networks to share the same phscial hardware and provides added security and efficiency
when do routers start to come into play ?
Routers start to come into play once we leave our local area network
Definition: Router
forwards traffic between subnets, between an an internal and external network or between two external networks
what makes a broadcast domain
each subnet or external network is going to be its own broadcast domain
can a multi layer switch function as a router ?
if you are using an external switch it is functioning as a router
how do routers make decisions?
routers make there routing decisions by using a routing table
Routing table?
helps determine which route entry is the best fit for the network
how do routers map an IP address to a MAC address?
routers use an arp cache to map an IP address to a given MAC address
what are the three different sources that a router can use ?
- Directly connected route
- Static route
- Dynamic route
Routing: Directly connected route ?
learned by physical connections between routers
Routing: static route ?
- manually configured by an admin
- there is always one default standard route in every router that is 0.0.0.0/0
Routing: Dynamic routing ?
learned by exchanging information between routers
routers send routes to other routes
what are the two ways we can prevent routing loops ?
- split horizon
- Poising reverse
Split Horizon ?
prevents a route learned on one interface from being advertised back out on the same interface.
Poising reverse ?
causes a route received on one interface to be advertised back out on the same interface with a metric considered to be infinite
what are the two different types of dynamic routing protocols ?
- internal
- external
Internal dynamic routing protocols?
- interior gateway protocol IGP
- operates within an autonomous system
- Example: Intranet
We use this routing protocol to route within our internal networks
External dynamic routing protocols ?
- Exterior gateway protocol EGP
- operate between autonomous systems
- example Internet
BGP is one of the most commonly used routing protocols for EGP
Routing: Distance vector ?
Distance vector routing algorithm simplifies the routing process by assuming the cost of every link is one unit. Therefore, the efficiency of transmission can be measured by the number of links to reach the destination. In Distance vector routing, the cost is based on hop count
Routing: convergence ?
time it takes for routers to update their routing table in response to a topology change
Routing: hold down timer ?
prevents updates for a specific period of time and speeds up convergence
Routing: hop count ?
number of routers from the source router through which data must pass to reach the destination network
Routing: Link state routing protocol ?
requires all the routers to know about the paths that all other routers can reach in the network
every node constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes.
Examples of link state routing protocols include OSPF and ISIS
Routing: what is RIP or the routing information protocol?
Interior routing protocol
a distance vector protocol that uses hop count - maximum number of hops it can do is 16
RIP features
- updates every 30 seconds
- easy to configure
- Runs over UDP
open shortest path first OSPF?
- a link state protocol that uses cost
- interior gateway protocol
Routing: OSPF?
OSPF is known as a classless protocol, classless routing protocols are those protocols that include subnet mask information when the routing table or updates are exchanged
Routing: intermediate system to intermediate system or IS-IS?
interior or exterior protocol ?
a link state protocol that also uses cost and functions like the OSPF protocol but is not widely popular
- interior routing protocol
Routing: Enhanced interior gateway routing protocol EIGRP?
hybrid of distance vector and link state protocols that uses bandwidth and delay
- interior routing protocol
cisco protocol
Routing: what is BGP or border gateway protocol?
Is BGP an interior or exterior routing protocol ?
a path vector that uses the number of autonmous system hops instead of router hops/ bgp is an external routing protocol - this is more concerned with how many systems you have to go through
Routing: route belivability ?
if a route has a lower administrative distance the route is more believable
network address translation NAT?
translates private IP addresses to public IP addresses for routing over public networks
What are the three different types of address translation ?
- DNAT Dynamic NAT
- SNAT static NAT
- PAT port address translation
NAT: DNAT dynamic nat
automatically assigns an IP address from a pool and gives a one to one translation
NAT: SNAT static nat
manually assign an IP address and gives one to one translation
static Nat was primarily used as a security feature
NAT: PAT port address translation
most common one used today
sharing on one public IP by multiple private IP addresses which gives a many to one translation
inside local ?
private ip address refrencing an inside device
inside global ?
public IP address refrencing from an inside device
outside global?
public IP address referencing an outside device
Outside local ?
private IP address refrencing an outside device
Outside local
private ip address refrencing an outside device
multicast routing ?
multicast sender sends traffic to a class D IP address known as a multicast group
main goal of multicast routing is to send the traffic only to devices that wish to recieve the traffic
the two primary protocols used for multicast routing are IGMP and PIM
what are the two primary ways of doing multicast routing ?
IGMP internet group management protocol
PIM protocol independent multicast
IGMP internet group management protocol
lets routers know which interfaces have multicast recievers and allow clients to join a multicast group
PIM protocol independent multicast ?
routes multicast traffic between multicast enabled routers
Virtualization
allows multiple virtual instances to exist on a single physical server
Hypervisor
enables virtualization to occur and emulates the physical hardware
Popular hypervisors
VMWare ESXi
Microsoft Hyper-V
Virtual box
Vmware Workstation
what is a bare metal hypervisor ?
bare metal hypervisor is when you just run the hypervisor as the OS
Network attached storage NAS?
disk storage delivered as a service over TCP/IP
Storage area network SAN?
specialized LAN that transfers data at block level with a special protocol
To the users it looks and acts like a local drive
A storage area network or storage network is a computer network which provides access to consolidated, block-level data storage. SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage
Fiber channel FC?
special purpose hardware providing 1-16 GBPS of storage area network speed
what is Fiber channel over ethernet or FCOE
what purpose does it serve in our networks?
removes the need for specialized hardware and runs FC over ethernet frames
IP small computer systems interface ISCSI
lowers cost and relies on configuration that allows jumbo frames over the network
InfiniBand ?
virtualized storage technology that uses a switched fabric topology and features very high throughput and very low latency
what problem does a virtual switch solve?
overcomes the problem of all virtual servers being on one broadcast domain
Virtual desktop?
a desktop computer that is run on a browser using the web
software defined networking SDN?
provides an easy to use front end to configure physical and virtual devices through a network
what is the purpose of VOIP?
What does VOIP do for our networks?
digitizes voice traffic to be treated like other traffic on the network
what protocol does VOIP use ?
VOIP uses a protocol known as SIP
Sip is used to setup and manage voip sessions
SIP can also extend voice communication to include video conferencing, instant messaging, file transfers and more
Session initiation protocol SIP?
used to setup, maintain, and tear down calls
private cloud ?
systems and users only have access with other devices inside the same private cloud or system
public cloud ?
systems and users interact with devices on public networks such as the internet and other clouds
Hybrid cloud ?
combination of public and private clouds
community cloud ?
collaborative effort where infrastructure is shared between several orgs from a specific community with the same concerns
Network as a service Naas
allows for the outsourcing of a network service provider
Infrastructure as a service IaaS
allows for the outsourcing of infrastructure of the servers and desktops to a service provider
Software as a service SaaS
users interact with a web based application and the details of how it works are hidden – examples of Saas products include m065 and google docs
Platform as a service Paas
provides a platform for companies that develop applications without the need for infrastructure – digital ocean
Desktop as a service Daas
provides a desktop environment that is accessible through the internet in the form of a cloud desktop or virtual desktop environment
Cloud: elasticity?
attempts to match the resources allocated with the actual amount of resource needed at any given point and time
Cloud: what is elasticity focused on ?
elasticity is focused on meeting the sudden increase and decreases in a workload
Cloud: scalability ?
handles the growing workload required to maintain good performance and efficiency for a given software or application
Is scalability a long term approach ?
Scalability is common to be used long term elastic approaches can change every day or every minute
Cloud: vertical scaling ?
increases the power of the existing resources in the working environment
cloud: horizontal scaling ?
adding additional resources to help handle the extra load being experienced
adding additional instances instead of moving to a larger instance size
cloud: multitenancy
allowing customers to share computing resources in a public or private cloud
what are the benefits of multitenancy solutions ?
- better storage
- better use of resources
- lower overall cost
Virtual machine VM escape ?
occurs when an attacker break out of one of the isolated VMs and begins to directly interact with the underlying hypervisor
infrastructure as code IAC ?
enables managing and provisioning of infrastructure through code instead of through manual processes
how do we use IAC effectively ?
To use IAC effectively we need to use scripted automation and orchestration
Cloud: orchestration ?
process of arranging or coordinating the installation and configuration of multiple systems
Snowflake system?
any system that is different from the standard configuration template
Cloud: private direct connection ?
extends pre-existing on premise data center into the providers network to directly connect to your virtual private cloud network
establishes a secure, dedicated connection from your infrastructure into AWS.
Cloud: datacenter ?
any facility that businesses and other orgs use to organize, process, store, and disseminate large amounts of data
Cloud: what are the three main layers in a three tiered hierarchy ?
- core
- Distribution aggregation
- access edge
Three tiered hierarchy: explain the Core
what is the core’s function in the three tiered hierarchy
- big fast expensive routers
- backbone of the cloud network
Three tiered hierarchy: distribution aggregation
what is the function of the distribution aggregation layer in the cloud three tired hierarchy
- provides boundary definitions by implementing ACL’s and policies
- layer three switches
- packets are being properly routed
Three tiered hierarchy: access edge
- connect to endpoint devices
- regular switches
what are the 4 layers we need to be aware of with SDN?
- Application layer
- control layer
- infrastructure layer
- management plane
SDN layer: application layer ?
focuses on the communication resource requests or info about the network as a whole
SDN layer: control layer?
uses the information from the application and decides how to route a packet on the network
SDN layer: infrastructure layer?
contains the network devices that receive information about where to provide the data and then perform those movements
SDN layer: Management plane?
used to monitor traffic conditions and the status of the network.
what can we achieve with a spine and leaf architecture
By using a spine and leaf architecture we can give faster speeds and lower latency than the traditional three-tiered hierarchy
Traffic Flows Datacenter: North-South?
North: traffic that is exiting the datacenter
South: traffic that is entering the datacenter
Traffic Flows Datacenter: East-west?
refers to dataflows within a datacenter
deterministic ?
very organized and orderly requires an electronic token to transmit.
Like a student raising his hand and getting called on
contention based ?
very chaotic and can transmit whenever possible
the problem with this method is you have collisions
what sort of network access method does ethernet use ?
ethernet uses contention based network access
how does ethernet prevent collisions?
ethernet prevents collisions with something known as CSMA/CD
Carrier sense multiple access collision detection CSMA/CD?
prevents collisions by using carrier sensing to defer transmissions until no other stations are transmitting
Collision domain ?
each area of the network that shares a single segment is known as a collision domain
What does ethernet switching do for our networks?
increases scalability of a network by creating multiple collision domains
what does bandwidth mean in networking ?
measures how many bits the network can transmit per second
what is the maximum distance of copper cables ?
100 meters
what are the metrics of CAT 6 cables?
Using CAT 6 at 100 meters will limit the speed from 10 Gbps to 1 Gbps
using CAT 6 at 55 meters what sort of speeds can you get ?
Using CAT 6 at under 55 meters can reach 10 Gbps of speed
what are the distances typically associated with multi mode fiber ?
Multimode fibers deal with shorter distances something in the 200 to 500 meter range
should we use multimode fiber or single mode fiber for long distances ?
use single mode fiber for long distances
what sort of fiber should we use for short distances ?
you need to use multimode fiber for short distances
Network Devices: Hub
also known as a multiport repeater it is a layer 1 device that connects multiple network devices and workstations
what are the three types of hubs ?
- passive hub
- active hub
- smart hub
Hubs: passive hub ?
repeats single with no amplification
Hubs: active hub ?
repeats signal with amplification
used for long distances
Hubs: smart hubs ?
active hub with enhanced features like snmp
Network devices: bridge ?
analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC in the frames
Network Devices: switch ?
also known as a multiport bridge, it is a layer 2 device that connects multiple network segments together. A switch is essentially a multi-port bridge
Network devices: Router?
Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information
Network Devices: layer 3 switch ?
makes layer 3 routing decisions and then interconnects entire networks not just network segments
what layer does a switch operate on and what does it focus on ?
layer 2 device focused on MAC addresses
what layer does a router operate on and what is it focused on ?
layer three device focused on IP addresses
what are the additional features switches can offer?
VLAN’s
Trunking
STP
Link aggregation
Power over ethernet
Port monitoring
User authentication
Switching Features: Link Aggregation ?
combines multiple physical connections into a single logical connection to minimize or prevent congestion
what is the standard for link aggregation ?
Link aggregation standard IEEE 802.3ad
what problem does link aggregation solve in a network ?
link aggregation is a solution for the problem of congestion. congestion can occur when all ports operate at the same speed
are switches full duplex or half duplex ?
switches are full duplex which means every port can operate at 100mbps
what is the standard for power over ethernet?
802.3at
Power over ethernet?
supplies electrical power over ethernet and requires cat 5 or higher copper cable.
the benefit of this is instead of needing two separate cables for power and data you can use one for booth
Port monitoring or mirroring ?
makes a copy of all traffic destined for a port and sends it to another port
what is out of band management ?
keeps all network configuration devices on a separate network
first hop redundancy ?
FHRP is used to prevent network failure at a default gateway. This is achieved by configuring multiple routers with the same IP address and Mac address, thus presenting an illusion of a single virtual router to the hosts in a Local Area Network (LAN).
this helps with redundancy
MAC filtering ?
permits or denies traffic based on a devices MAC address
Traffic filtering ?
permits or denies traffic based on IP address or application ports
what is IT governance ?
It governance is used to provide a comprehensive security management framework for the org
How is IT governance achieved ?
- Policies
- standards
- baseline
- Guidelines
- Procedures
what is a security policy ?
defines the role of security inside of an org and establishes the desired end state for the security program
what are the three different categories for security policies ?
- organizational
- system specific
- issue specific
what is an organizational policy ?
provides frameworks to meet the business goals and define the roles, responsibilities, and teams associated with it
what are system specific policies ?
these address the specific technology, application, network or computer
what are issue specific policies ?
addresses a specific security issue such as email privacy, employee termination procedures, or other specific issues
what are standards ?
implements a policy in an org
Baseline ?
creates a reference point in network architecture and design
Guideline ?
recommended action that allows for exceptions and allowances in unique situations and recommends actions
Procedures ?
detailed step-by-step instructions created to ensure personnel can perform a given task or series of actions
Change management ?
structured way of changing the state of a computer system, network, or IT procedure
incident response plan ?
contains instructions on how to help network and system admins, detect, respond to, and recover from network security incidents
incident response plans are broken into 6 core phases
- preparation
- identification
- containment
- Eradication
- recovery
- lessons learned
Disaster recovery plan ?
Documents how an org can quickly resume work after an unplanned incident
Business continuity plan ?
outlines how a business will continue operating during an unplanned disruption in service
System life cycle plan ?
describes the approach to maintaining an asset from creation to disposal
what is the 5 phase lifecycle used for all of our systems and networks.
- planning
- design
- transition
- operations
- retirement
standard operating procedure ?
a step-by-step instructions compiled by an org to help its employees carry out routine operations