Network Concepts Flashcards
CSMA/CA
Carrier Sense Multiple Access/Collision Avoidance
It is a media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus or a band of the electromagnetic spectrum.
CSMA/CD
Carrier Sense Multiple Access/Collision Detection
It is a media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus or a band of the electromagnetic spectrum.
WAF
A Web Application Firewall protects web applications by monitoring and filtering traffic
WPA
WiFi Protected Access
DLP
Data Loss Prevention
UTM
Unified Threat Management
OSPF
Open Shortest Path First
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS).
OSI
Open System Interconnection Model
TPM
Trusted Platform Module
ACL
Access Control List.
Operates in levels 3 and 4 of the OSI model.
STP
Span Tree Protocol
SNAT
Source Network Address Translation or Static Network Address Translation
NAT
Network Address Translation
PAT
Port Address Translation
IDF
Intermediate Distribution Frame
ICMP
Internet Control Message Protocol
GSM
Global System for Mobile Communication
GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
TDM
Time Division Multiplexing
Time-division multiplexing (TDM) is a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern
CDMA
Code Division Multiple Access
Everybody communicates at the same time. Each call uses a different code. Codes are used to filter each call on the receiving side.
PSTN
Public Switched Telephone Network
ARP
Address Resolution Protocol
Banner Grabbing
When a malicious user gains access to an open port and uses it to probe a host to gain information and access, as well as learn details about running services
Sticky MAC
Port security feature where dynamically learned MAC address are retained when an interface comes back online
SIEM
Security Information and Event Manager
Software that can be configured to evaluate data logs from IDP and IPS firewalls and proxy servers in order to detect significant events that require the attention of IT staff.
DOCSIS
Data Over Cable Service Internet Specification
Speeds up to 70 Mbps download. 7 Mbps upload.
NDA
Non-Disclosure Agreement
IRP
Identity Registration Protocol
Protocol designed to eliminate conflicts with protocols using the same ports by allowing applications to register their name, email address, UserID, current IPv6 and other information with the company’s Domain Identity Registry server.
SLA
Service-Level Agreement
OTDR
Optical Time Domain Reflectometer
SIP
Session Initiator Protocol
It is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications.
Ports 5060 and 5061
NTP
Network Time Protocol
H.323
VoIP standard that handles initiation, setup, and delivery of VoIP sessions
Port 1720
SMB
Service Message Block
It is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network
RTP
Real-Time Transport Protocol
It is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications including WebRTC, television services and web-based push-to-talk features.
IPsec
IP Security
It is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session
CSU/DSU
Channel Service Unit/ Data Service Unit
It is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.
IP Helper
Internet Protocol Helper (IP Helper)
Assists network administration of the local computer by enabling applications to retrieve information about the network configuration of the local computer, and to modify that configuration. IP Helper also provides notification mechanisms to ensure that an application is notified when certain aspects of the local computer network configuration change.
Jumbo Frame
Usually 9000 bytes long or anything over 1500. Used in SAN systems.
MTU
Maximum Transmission Unit
DLP
Data Lost Prevention
AUP
Acceptable Use Policy
NDA
Non-Disclosure Agreement
SLA
Service-Level Agreement
Data Exfiltration
Unauthorized transfer of data from a computer or other device.
GRE
Generic Routing encapsulation
It is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.
LACP
Link Aggregation Control Protocol
It is a standards-based method to control the bundling of several physical network links together to form a logical channel for increased bandwidth and redundancy purposes.
EAP-PEAP
EAP-Protected Extensible Authentication Protocol (EAP-PEAP) is a protocol that creates an encrypted (and more secure) channel before the password-based authentication occurs.
Network Baselines
Network Baselines are ideal performance metrics obtained by measuring your network for a particular time period. Baseline statistics provide a way to validate your current network status by determining recommended performance standards, hence, helping admins to find the “normal” operating level of network devices.
MDIX
Medium Dependent Interface Crossover.
Automatically can convert a straight through connection to crossover.
BGP
Border Gateway Protocol (Advanced distance-vector or path vector. EGP Type)
Refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (AS). As networks interact with each other, they need a way to communicate. This is accomplished through peering. BGP makes peering possible.
LLDP
Link Layer Discovery Protocol
It is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network.
Performance Baseline
Performance measurements as the benchmark to compare all future measurements.
MITM
Man-In-the-Middle
SCP
Secure Copy Protocol
It helps to transfer computer files securely from a local to a remote host. It is somewhat similar to the File Transfer Protocol “FTP”, but it adds security and authentication.
IS-IS
Intermediate System to Intermediate System.
EGP Type. Advanced distance-vector or path vector. It is a single autonomous system (AS), also called a routing domain, that consists of end systems and intermediate systems. End systems are network entities that send and receive packets. Intermediate systems send and receive packets and relay (forward) packets.
VRRP
Virtual Router Redundancy Protocol
It is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.
OC-1 Circuit
Optical Carrier-1. It is a type of high-speed dedicated circuit.
The base speed for OC-1 is 51.84 Mbps. Using this as a base we have the following:
OC-2 circuit is 51.84 * 3 = 155.52 Mbps
OC-3 circuit is 51.84 * 12 = 622.08 Mbps
So on and so for
TDM
Time Division Multiplexing
It is a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern.
DSCP
Differentiated Services Code Point
(DSCP) is a means of classifying and managing network traffic and of providing quality of service (QoS) in modern Layer 3 IP networks. It uses the 6-bit Differentiated Services (DS) field in the IP header for the purpose of packet classification.
authPriv
Communication with authentication and privacy. SNMP option to ensure the data transferred is confidential.
Throttling
Limitation in the communication speed
Bandwidth Quota
QoS policy that allows to configure the bandwidth cap that a costumer can upload or download at a given time.
PRI
Primary Rate Interface
PRI and SIP are two methods used to connect a place of business to a regional telephone network. Both require PBX equipment where the interchange between the facility and the public can take place.
Session Hijacking
Also known as TCP session hijacking, is a method of taking over a web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
NAC
Network Access Control
It is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
UNC
Universal Naming Convention
UNC is a PC format for specifying the location of resources on a local area network (LAN). UNC uses the following format: \server-name\shared-resource-pathname.
For example, to access the file test.txt in the directory examples on the shared server silo, you would write: \silo\examples\test.txt.
Smurf Attack
A Smurf attack is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable. The Smurf program accomplishes this by exploiting vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).
SFP
SFP stands for small form-factor pluggable. It is a compact, hot-swappable optical transceiver module that used in telecommunications and data communications networks. IT IS THE OPTICAL TRANSRECEIVER WHERE FIBERS CONNECTS!
FQDN
Fully qualified Domain Name
VLAN Hopping
Virtual local area network hopping (VLAN hopping) is a method of attacking the network resources of the VLAN by sending packets to a port not usually accessible from an end system. The main goal of this form of attack is to gain access to other VLANs on the same network.
RSA
The Rivest Shamir Adleman (RSA) Authentication Mechanism is used to simplify the security environment for the Flexible Management Topology. It supports the ability to securely and easily register new servers to the Flexible Management topology.
NOC
A network operations center (NOC) is a centralized location where IT teams can continuously monitor the performance and health of a network.
SSL VPN
Establishes a secure session that can be initiated using a web browser.
PTP
Precision Time Protocol
Used to synchronize clocks throughout a computer network. At difference of NTP, PTP is accurate to microseconds.
PPTP
Point-to-point tunneling. Protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a VPN across TCP/IP networks. OUTDATED! UNSECURED!
NAS
Network Attached Storage