Section 2: Networking Flashcards
2.1 - Ports and Protocols - Introduction to IP
Series of moving vans
- Efficiently move large amounts of data: Use a shipping truck
- The network topology is the road: Ethernet, DSL, cable system
- The truck is the Internet Protocol (IP): We’ve designed the roads for this truck
- The boxes hold your data: Boxes of TCP and UDP
- Inside the boxes are more things: Applicaton Information
2.1 - Ports and Protocols - Introduction to IP
TCP and UDP
- Transported inside of IP: Encapsulated by the IP protocol
- Two ways to move data from place to place: Different features for different applications
- OSI Layer 4: The transport layer
- Multiplexing: Use many different applications at the same time. TCP and UDP.
2.1 - Ports and Protocols - Introduction to IP
TCP - Transmission Control Protocol
- Connection-oriented: A formal connection setup and close
- “Reliable” Delivery: Recovery from errors. Can manage out-of-order messages or retransmissions
- Flow control: The receiver can manage how much data is sent.
2.1 - Ports and Protocols - Introduction to IP
UDP - User Datagram Protocol
- Connectionless: No formal open or close to the connection
- “Unreliable” delivery: No error recovery. No reodering of data transmissions.
- No flow control: Sender determines the amount of data transmitted. One-way communication
2.1 - Ports and Protocols - Introduction to IP
Why would you ever use UDP?
- Real-time communication: There’s no way to stop and resend the data. Time doesn’t stop for your network.
- Connectionless protocolas: DHCP (Dynamic Host Configuration Protocol) and TFTP (Trivial File Transfer Protocol)
- The data might not get through: The application keeps track and decided what to do. It might do anything.
- UDP is fast.
2.1 - Ports and Protocols - Introduction to IP
Communication using TCP
- Connection-oriented protocols prefer a “return receipt”: HTTPS (Hypertext Transfer Protocol Secure) and SSH (Secure Shell).
- The application doesn’t worry about out of order frames or missing data. TCP handles all of the communication overhead. The application has one job.
2.1 - Ports and Protocols - Introduction to IP
Speedy delivery
- The IP delivery truck delivers from one (IP) address to another (IP) address: Every house has an address, every computer has an IP address.
- Boxes arrive at the house / IP address: Where do the boxes go? Each box has a room name.
- Port is written on the outside of the box: Drop the box into the right room.
- Port 80: web server unencrypted data (HTTP)
- Port 443: web server encrypted data (HTTPS)
- Port 25: mail server
- Port 123: time server.
2.1 - Ports and Protocols - Introduction to IP
Lots of ports
- IPv4 sockets: Server IP address, protocol, server application port number. Client IP address, protocol, client port number.
- Non-ephemeral ports: Permanent port numbers. Ports 0 through 1023. Usually on a server or service.
- Ephemeral ports: Temporary ports. Ports 1024 through 65,535. Determined in real-time by the client.
2.1 - Ports and Protocols - Introduction to IP
Port Numbers
- TCP and UDP ports can be any numer between 0 through 65,535.
- Most servers (services) use non-ephemeral port numbers. This isn’t always the case. It’s just a number.
- Port numbers are for communication, not security.
- Service port numbers need to be well known.
- TCP port numbers aren’t same as UDP port numbers. TCP 80 is not the same as UDP 80.
2.1 - Ports and Protocols - Introduction to IP
Ports on the network
Web server - TCP/80
VoIP server - UDP/5004
Email server - TCP/143
2.1 - Ports and Protocols - Common Network Ports
Port Numbers
- Well-known port number: Client and server need to match
- Important for firewall rules: Port-based security
- A bit of rote memorization: Becomes second nature after a while.
- Make sure you know port number, protocol and how the protocol is used .
2.1 - Ports and Protocols - Common Network Ports
FTP - File Transfer Protocol
- tcp/20 (active mode data), tcp/21(control): Transfers files between systems.
- Authenticates with a username and password. Some systems use a generic/anonymous login
- Full-featured functionality: List, add, delete, etc.
2.1 - Ports and Protocols - Common Network Ports
SSH - Secure Shell
- Encrypted communication link - tcp/22
- Looks and acts the same as Telnet.
2.1 - Ports and Protocols - Common Network Ports
Telnet
- Telnet -Telecommunication Network: tcp/23
- Loging to devices remotely: console access
- In-the-clear communication (unencrypted): Not the best choice for production systems.
2.1 - Ports and Protocols - Common Network Ports
SMTP: Simple Mail Transfer Protocol
- SMTP (Simple Mail Transfer Protocol): Server to server email transfer. tcp/25
- Also used to send email from a device to a mail server. Commonly configured on mobile devices and email.
- Other protocols are used for clients to receive email. - IMAP, POP3
2.1 - Ports and Protocols - Common Network Ports
DNS - Domain Name System
- Converts names to IP addresses - udp/53: www.professormesser.com = 162.159.246.164
- These are very crictical resources. Usually multiple DNS servers are in production.
2.1 - Ports and Protocols - Common Network Ports
DHCP - Dynamic Host Configuration Protocol
- Automated configuration of IP address, subnet mask and other options: udp/67, udp/68. Requires a DHCP server. Server, appliance, integrated into a SOHO router etc.
- Dynamic / pooled: IP addresses are assigned in real-time from a pool. Each system is given a lease and must renew at set intervals.
- DHCP reservation: Addresses are assigned by MAC address in the DHCP server. Manage address from onle location.
2.1 - Ports and Protocols - Common Network Ports
HTTP and HTTPS
- Hypertext Transfer Protocol: Communication in the browser. And by other applications.
- In the clear or encrypted: Suppoted by nealy all web servers and clients.
- HTTP: tcp/80. Hypertext Transfer Protocol. Web server communication.
- HTTPS: tcp/443 Hypetext Transfer Protocol Secure. Web server communication with encryption.
2.1 - Ports and Protocols - Common Network Ports
POP3 / IMAP
- Receive emails from server: Authenticate and transfer.
- POP3 - Post Office Protocol version 3. tcp/110. Basic mail transfer functionality. Receive message for one email.
- IMAP4 - Internet Message Access Protocess v4. tcp/143. Includes management of email inbox from multiple clients.
2.1 - Ports and Protocols - Common Network Ports
SMB - Server Message Block
- Protocol used by Microsoft Windows: File sharing, printer sharing. Also called CIFS (Common Internet File System)
- Using NetBIOS over TCP/IP (Network Basic Input/Output System): udp/137 - NetBIO name services (nbname). udp/139 - NETBIO session service (nbsession)
- Direct over tcp/445 (NetBIOS-less): Direct SMB communication over TCP without NetBIOS transport.
2.1 - Ports and Protocols - Common Network Ports
SMNP - Simple Network Management Protocol
- Gather statistics from network devices: Queries - udp/161. Traps - udp/162
- v1 - The original: Structured tables. In-the-clear.
- v2 - A good step ahead: Data type enhancements. Bulk transfers. Still in-the-clear.
- v3 - A secure standard: Message integrity. Authentication. Encryption.
2.1 - Ports and Protocols - Common Network Ports
LDAP
- LDAP (Lightweight Directory Access Protocol): tcp/389
- Store and retrieve information in a network directory. Commonlu used in Microsoft Active Directory.
2.1 - Ports and Protocols - Common Network Ports
RDP - Remote Desktop Protocol
- Share a desktop from a remote location over tcp/3389
- Remote Desktop Services on many Windows versions
- Can connect to an entire desktop or just an application
- Clients for Windows, macOS, Linux, Unix, iPhone, Android, and others.
2.2 Network Devices
Network devices
- Many different devices and components: All have different roles.
- Some of these functions are combined together: Wirelss router/switch/firewall
- Compare different devices: Understand when they should be used
2.2 Network Devices
Router
- Routes traffic between IP subnets: Makes forward decisions based on IP address. Routers inside of switches sometimes called “layer 3 switches”
- Often connects diverse network types: LAN, WAN, copper, fiber
2.2 Network Devices
Switches
- Bridging done in hardware: Application-specific integrated circuit (ASIC). Forwards traffic based on data link (MAC) address
- Many ports and features: The core of an enterprise network. May provide power over ethernet (PoE)
- Multilayer switch: Includes routing functionality. Known as layer 3 switch.
2.2 Network Devices
Unmanaged devices
- Very few configuration options: Plug and play
- Fixed configuration: No VLANs
- Very little integration with other devices: No management protocols.
- Low price point: Simple is less expensive.
2.2 Network Devices
Managed switches
- VLAN support: Interconnect with other switch via 802.1Q
- Traffic prioritization: Voice traffic gets a higher priority
- Redundancy support: Spanning Tree Protocol (STP)
- Port Mirroring: Capture packets.
- External management: Simple Network Management Protocol (SNMP)
2.2 Network Devices
Access point
- Not a wireless router: A wireless router is a router and an access point in a single device.
- Asn access point is a bridge: Extends the wired network onto the wired network. Makes forwarding decisions based on MAC address.
2.2 Network Devices
Patch panels
- Combination of punch-down blocks and RJ-45 connectors
- Runs from desks are made once: Permanently punched down to patch pane.
- Patch panel to switch can be easily changed. No special tools. Use existing cables.
2.2 Network Devices
Firewalls
- Filters traffic by port number: OSI layer 4 (TCP/UDP). Some firewalls can filter based on the application.
- Can encrypt traffic into/out of the network: Protects your traffic between sites.
- Can proxy traffic: A common security technique.
- Most firewalls can be layer 3 devices (routers)
- Usually sits on the ingress/egress of the network.
2.2 Network Devices
Power over Ethernet (PoE)
- Power provided on an Ethernet cable: One wire for both network and electricity. Phones, cameras, wireless access points. Useful in difficult-to-power areas.
- Power provided at the switch: Built-in power - Endspans. In-line power injector - midspans.
2.2 Network Devices
PoE switch
- Power over Ethernet: Commonly marked on the switch or interfaces.
2.2 Network Devices
PoE, PoE+, PoE++
- PoE: IEEE 802.3af-2003: The original PoE specification. Now part of the 802.3 standard. 15.4 watts DC power., 350 mA max current.
- PoE+: IEEE 802.3at-2009: Now part of the 802.3 standard. 25.5 DC power, 600 mA max current.
- PoE++: IEEE 802.3bt-2018. 51 W (Type 3), 600 mA max current. 71.3 (type 4) , 960 mA max current. PoE with 10GBASE-T
2.2 Network Devices
Hub
- “Multi-port repeater”: Traffic going in one port is repeated to every other port.
- Everything is half-duplex
- Becomes less efficient as network traffic increases.
- 10 megabit / 100 megabit
- Difficult to find today
2.2 Network Devices
Cable modem
- Broadband: Transmission across multiple frequencies. Different traffic types.
- Data on the “cable” network: DOCSIS (Data Over Cable Service Interface Specification)
- High-speed networking: Speeds up to 1Gigabit/s are available.
- Multiple service: Data, voice, video
2.2 Network Devices
DSL modem
- ADSL (Asymmetric Digital Subscriber Line): Use telephone lines
- Download speed is faster than the upload speed (asymmetric): 10,000 foot limitation from the central office (CO). 52 Mbit/s downstream / 16 Mbit/s upstream are common. Faster speeds may be possible if closer to the CO.
2.2 Network Devices
ONT
- Optical network terminal: Fiber to the premises
- Connect the ISP fiber network to the copper network: Demarcation poit (demarc) in the data center. Terminal box on the side of the building.
- Line of responsibility: one side of the box is the ISP. The other side of the box is your networl.
2.2 Network Devices
Network Interface Card (NIC)
- The fundamental network device: Every device on the network has a NIC. Computers, servers, printers, routers, switches, phones, tablets, cameras, etc.
- Specific to the network type: Ethernet, WAN, wireless etc.
- Often built-in to the motherboard: Or added as an expansion card.
- Many option: singel port, multi-port, copper, fiber.
2.2 Sofware Defined Networking
SDN (Softwar Defined Networking)
- Networking devices have different functional planes of operation: Data, control, and management planes.
- Split the functions into separate logical units: Extend the functionality and management of a single device . Perfectly built for the cloud.
- Infrastructure layer / Data plane: Process the network frames and packets. Forwarding, trunking, encrypting, NAT.
- Control layer / Control plane: Manages the actions of the data plane. Routing tables, session tables, NAT tables. Dynamic routing protocol updates.
- Application layer/ Management plane: Configure and manage the device. SSH, browser, API.
2.2 Network Devices
SDN data flows
- Between Application layer/ Management Plane: SSH, SNMP, API
- Between Control layer / Control plane: Dynamic routing protocols
- Between Infrastructure layer / Data plane: Network traffic.
2.3 Wireless Network Standards
Wireless Network Standards
- Wireless networking (802.11): Managed by the IEEE LAN/MAN Standard Committee (IEE 802)
- Many updates over time: Check with IEEE for the latest.
- The Wi-Fi trademark: Wi-Fi Alliance handles interoperability testing
2.3 Wireless Network Standards
802.11a
- One of the original 802.11 wireless standards. October 1999
- Operates in the 5 Ghz range. Or other frequencies with special licensing.
- 54 megabits per second.(Mbit/s)
- Smaller range than 802.11b. Higher frequency is absorbed by objects in the way.
- Not commonly seen today.
2.3 Wireless Network Standards
802.11b
- Also an original 82.11 standard. October 1999.
- Operates in the 2.4 GHz range
- 11 megabits per second (Mbit/s)
- Better range than 802.11a. Less absorption problems.
- More frequent conflict: Baby monitors, cordless phones, microwaves, ovens, bluetooth
- Not commonly seen today.
2.3 Wireless Network Standards
802.11g
- An “upgrade” to 802.11b. June 2003
- Operaties in the 2.4 GHz range
- 54 megabits per second (Mbit/s). Similar to 802.11a
- Backwards-compatible with 802.11b.
- Same 2.4 GHz frequency conflict problems 802.11b.
2.3 Wireless Network Standards
802.11n (Wi-Fi 4)
- The update to 802.11g, 802.11b, and 802.11a. October 2009
- Operates at 5 GHz and/or 2.4 GHz. 40 MHz channel widths.
- 600 megabits per second (Mbit/s): 40 MHz mode and 4 antennas.
- 802.11n uses MIMO: Multiple input multiple-output. Multiple transmit and receive antennas.
2.3 Wireless Network Standards
802.11ac (Wi-Fi 5)
- Approved in January 2014. Significant improvements over 802.11n
- Operates in the 5 GHz band. Less crowded, more frequencies (up to 160 MHz channel bandwidth)
- Increaed channel bonding: Larger bandwith usage.
- Denser signaling modulaation: Faster data transfers.
- Eight MU-MIMO downlink streams: Twice as many streams as 802.11n. 6.9 gigabits per second
- Maximum theortetical throughput per stream is 867 Mbit/s
2.3 Wireless Network Standards
802.11ax (Wi-Fi 6)
- Approved in 2021. The successor to 802.11ac/Wi-Fi 5
- Operates at 5 GHz and / or 2.4 GHz: 20, 40, 80, and 160 MHz widths.
- 1,201 megabits per second per channel: A relatively small increase in throughput. Eight bi-directional MU-MIMO stream.
- Orthogonal frequency-division multiple access (OFDMA): Works similar to cellular communication. Improves high–density installations.
- Maximum theoretical throughput of 9.6 Gbit/s
2.3 Wireless Network Standards
Long-range fixed wireless
- Wireless access point in a house with the stock antennas. You might get a range of 40 to 50 meters.
- Try connecting two buildings located miles from each other: Fixed directional antennas and increased signal strength.
- Outdoors: Minimal signal absorption or bounce.
- Directional antennas: Focused, point-to-point connection.
- Wireless regulations are complex. Refer to your country’s regulatory agency.
- Frequency use: Unlicensed 2.4 GHz or 5 GHz frequencies. Addtional frequencies may be availanle. Additional licensing may be requiree.
- Signal strength: Indoor and outdoor power is usually regulated.
- Outdoor antenna installation is not trivial. Get an expert. Be safe.
2.3 Wireless Network Standards
RFID (Radio-frequency identification)
- It’s everywhere: Access badges, inventory/ assembly line tracking, pet/animal identification, anything that needs to be tracked.
- Radar technology: Radio energy transmitted to the tag. RF powers the tag, ID is transmitted back. Bidirectional communication. Some tag formats can be active/powered.