Networking Concepts (Chapter 1) Flashcards
What is a network
A connection between 2 or more nodes that can communicate to eachother
IP address
- A unique number that identify a node on a network.
- Can change by node changing network or by DHCP
- a node can have multiple IP addresses
- IPv4/IPv6
MAC Address
Media Access Control
A unique physical address that identifies the node on the network, issued by NIC
Source/Destination
Is the sender and recipient of data transmission, both nodes form a connection where they both switch back and forth from being source and destination
Protocol
Set or rules or language used for communication
Port
A logical source/destination for a network service
0 - 1023 used by common services
1024 - 49151 used by services processes
49152 - 65535 used by client processes
Socket
A identification number that signifies a port that is in use which is made up of protocol, IP address and port that uniquely identifies a connection on a network
OSI Model
7 layers
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application Layer (OSI)
Responsible for requesting network services for a specific apps via a specific protocol (Mail = SNMP/POP3, web browser = HTTP/HTTPS)
Data
Presentation Layer (OSI)
Layer responsibility for communicating the correct data format (MP3, JPG)that will be transmitted
Data
Session Layer (OSI)
Responsible for managing and separating different network “conversations” by assigning ports for each process
Data
Transport Layer (OSI)
Layer responsible for establishing, managing and tearing down a session as well as encapsulating data into either segments (TCP) or datagram (UDP) with a header that has embedded information
Network Layer (OSI)
Layer responsibility for adding the logical address to the header and encapsulating the TCP or UDP into an IP packet
Data Link Layer (OSI)
Responsible adding the physical address of the source and destination to the header and encapsulating the packets into frames.
Adds a trailer with CRC to check that data hasn’t been corrupted
Data Link Layer Sub layers
Logical Link Control
- describes the network payload
Media Access Control
- adds physical address
Physical Layer (OSI)
Responsible for transmitting the frames in terms of bits over a network medium
DoD Model
Aka TCP/IP Model
4 Layers that map to OSI model
Application Layer (DoD)
Incorporates OSI Application Layer, Presentation Layer and Session Layer
Host-to-Host Layer (DoD)
Incorporates OSI Transport layer
Internet Layer (DoD)
Incorporates OSI Network layer
Network Access Layer (DoD)
Incorporates OSI Data Link Layer and Physical Layer
TCP/IP Protocols
Host-to-Host Layer
- TCP, UDP
Internet Layer
- IP, ICMP, IGMP
Network Layer
- ARP
Connection-Orientated
Attempts to ensure reliability and completeness of transmission via the uses of acknowledgement flags during data transmission, resends data dependent on recipient sequence acknowledgement in its segment header.
- sequence used to reconstruct data
- TCP protocol
- session is established via a 3way handshake (SYN - SYN/ACK - ACK)
- Session is broken down via 4way handshake (FIN - ACK - FIN - ACK)
Connectionless Orientated
No attempts to ensure completeness of data transmission, uses application or higher level protocols to request data lost in transmission.
- Used for performance
Router
Responsible for making forwarding decisions between routers based on Layer 3 (Network layer) IP addresses.
- can learn routes location and store them in routing table
- can use rewrite layer 2 (Data Link Layer) depending on the network medium type ( WiFi, ethernet, ect)
- built in Wireless Access Points
Switch
Makes forwarding decisions based on Layer 2 MAC address, builds MAC address tables based on frames coming into its ports
Layer 3 switch allows for routing capabilities.
Firewall
Software or hardware appliance that separate the untrust network (internet) from your trusted network by enforcing rules to filter out unwanted traffic.
- Usually provides Network Address Translation (NAT)
- can work from layer 2-7
IDS
Intrusion Detection System (IDS) Is a software or hardware appliance that is responsible for analyzes network traffic for malicious signatures which is log to a dashboard
- software (Hosts IDS/ HIDS)
- network appliance ( Network IDS/ NIDS)
IPS
Intrusion Prevention System (IPS) Is a software or hardware appliance that is responsible for analyzing packets and reports findings to a dashboard, placed at strategic location on the network to act as a choke point to cut off malicious traffic from the network.
- Uses signatures database
- can detect zero base attacks
- can be software (Host IPS/ HIPS) or network appliance (Network/ NIPs)
Load balancer
A device that distributes incoming traffic among multiple servers based on quantity of traffic, which is used to improve the over all performance of the service and provides redundancy.
Proxy Server
Service that fetched content on behalf of the client, prevents the client from accessing the internet.
Works at layer 7
NAS
Network Attached Storage (NAS) a set of storage devices that are set up in a Raid that act as a file storage system on a network
Storage Area Network
An array of disks that are connected to network servers, that acts as the dedicated storage for all devices on the network. The storage can be divided into smaller Logical Unit Numbers that act as a partitions which the servers use as their dedicated storage
iSCSI
iSCSI is a common interface type that is used to connect to Storage Array by send sending SCSI commands as IP payloads
WAP
Wireless Access Point
- acts as bridge between wireless and wired networks
Access Point Modes
Standalone
- independent, acts as a single AP with one SSID
** Controller-Based**
- Lightweight, centrally managed via a controller, with multiple SSIDs
Cloud-Managed
- multi-site, remote management
Mesh AP
- Multiple APs that uses the same SSID on different channels, large coverage area
Wireless LAN Controller
Used to manage multiple wireless access points (WAP), by centrally controlled configuration and allows for load balancing of client load or radio interference.
Wireless Range Extender
A WiFi repeater that connects to a WAP and repeats the signal and extends it’s coverage
Content Delivery Network
Is a distributed network of servers that are strategically placed around the globe that cache web content and services to be accessed quickly from nearby users.
CDN key features
Caching & Distribution
- caches static content
- reduces latency
Availability & Reliability
- provides redundancy and load balancing
Security features
- protection against malicious attacks
Traffic Offloading
- handles request for static content this reducing load for original server
Virtual Private Network (VPN)
A stream of network packets that are hidden inside of other encrypted packets
Quality of Service (QoS)
A set of networking techniques that prioritizing network traffic of a certain type (voice, video, data)
Time To Live (TTL)
A limited amount of hops that a packet can take via routers to reach it’s destination before that packet is destroyed
Network Function Virtualization (NFV)
The act of taking functionality of network components (routing, switching, load balancing, firewalls, ect) and implementing each part as a software rather than hardware.
- defacto approach of cloud based networking services
Virtual Private Cloud
Is a secure, isolated environment within a public cloud that allows users to perform tasks that would normally require a data centre
VPC key features
Isolated Network Environment
Customizable Network Configuration
Enhanced Security
Scalable & flexible
** Direct Connectivity Options**
Cost Effective
Network Security List
A type of Access Control List for cloud networking that is used to allow or deny traffic to and from a specific resource on the virtual network.
Cloud Gateways
Are network contents that provides connectivity between cloud resources and external network (internet) by enabling secure and efficient data transfer.
Cloud Connectivity Methods
Public Internet
VPN
Direct Connect
- dedicated link to a cloud environment
Cloud Model Types
Public
- shared environment managed by a cloud provider
Private
- dedicated, single-tenant environment
Hybrid
- combines public and private clouds, often with data and applications moving between them based on workload and needs
Community
- a provider-based cloud designed for a group or organisation with shared concerns, requirements or compliance needs
Cloud Service Models
Defines the level of control, management and responsibilities shared between the cloud provider and customer
IaaS, PaaS, SaaS
Iaas
Infrastructure as a Service,
Is a could model that provides a client with the hardware required
PaaS
Platform as as Service is a cloud Model that provides development tool to build an application
SaaS
Software as a Service is a cloud model that allows a end user to access a application
Vertical Scaling
Increasing or decreasing the capacity of an existing instance, suitable for a server that needs more processing power to handle increased loads
Horizontal Scaling
Adding or removing instances of virtual machines, suitable for load balancing
Elasticity
Ability for a cloud environment to expand or contract resources in real time based on demand
Multitenancy
A key architectural feature of cloud computing that allows multiple users (VM) to share the same computing resources
Transmission Control Protocol (TCP)
A layer 4 protocol (transport layer) that is connection Orientated that provides reliable communication over IP network. By breaking the data down into segments with identified sequence IDs.
Protocol ID 6
Sliding window
Embedded data on a TCP header that communicated to the sender how big the data segment can be
Handshake
Is a protocol used in TCP headers to start and end a session between two endpoints with the use of flags
Start
Three way handshake
SYN -> SYN/ACK -> ACK
END
Four-way handshake
FIN-> ACK -> FIN -> ACK
Acknowledge Number
Is a number embedded into a TCP header that the destination uses to tells the source what the next segment sequence should be.
TCP header
In the transport layer (Host-to-Host) the data is encapsulated in to segments and a 20-byte header is attached to each that contain:
- Source port
- Destination port
- Sequence Number
- Acknowledging Number
- Windows Size
- Flags
- checksum