Professional Documents
Culture Documents
Network Architecture
Router
Operates on the Network layer of the OSI Model (Layer 3), uses IP addresses to
send/“route” packet between different IP networks.
Switch
Operates on the Data Link layer (Layer 2) of the OSI Model, uses MAC addresses to
transfer frames between nodes on the same network.
Multilayer Switch
A network device that operates at layers 2-7 of the OSI model. Can perform the functions
of a switch as well as a router. Has the ability to look get higher layer information from
within network frames.
Firewall
HIDS
Host Based Intrusion Detection System (HIDS), is an Intrusion Detection System that
resides on individual hosts (Computers). HIDS are used to monitor systems, enforce
system policy, gather statistics, log anomalies, etc.
IDS/IPS
Like an IDS they monitor Hosts or Networks, but have additional capabilities to stop
attacks such as block IP addresses.
Access Point
A Network Device that allows clients to connect to the network. Wireless network have a
Wireless Access Point, likewise wired networks have devices such as switches that allow
clients to connect to the network. A Switch that computers are using to access the
network is an access point.
Content Filter
Hardware or software that is used to traffic on the internet based on content. Content
Filters typically filter web site, and email traffic.
Hub
A network device that the Physical Layer of the OSI Model (Layer 1). Hubs repeat
everything received in one port to every other port on the device.
Analog Modem
A network device that converts analog phone signals into digital signals for use by
computers. The conversion goes both ways from digital to analog and from analog to
digital. Commonly used to convert digital signals to analog phone signals.
Packet Shaper
Hardware or software that assures the traffic being sent out on a network complies with
what is required for input on the distant end. Used to prevent latency and optimize
performance
VPN Concentrator
A network device that establishes and maintains a VPN connect for use by clients.
Clients then do not have to establish their own VPN.
VPN
PPTP
Uses Port 1723 to create secure tunnels. This technology has many known security
vulnerabilities
An authentication and accounting system used to provide remote access. Usernames and
passwords are passed to Remote Access Servers and then authenticated against a central
database.
Generally Refers to VPN Technologies built into the Microsoft Windows Operating
Systems since Windows NT.
Web Services
A standardized way of creating communications using SOAP, XML, WSDL, and UDDI.
XML tags the data, SOAP transfers the data, WSDL describes the available services and
UDDI lists the available services.
Methods to bring voice services (phone calls, voice mails, audio conferencing, etc)
together. For instance VoIP can integrate many of these aspects together.
Network Controllers
DHCP
Static vs Dynamic IP addresses
Reservations
Reserving an IP address for a particular host, defined by that host’s MAC Address.
Scopes
Leases
DHCP Relay
Typically DCHP packets are not passed between networks. If the administrator wants to
pass DHCP requests across networks they use a relay agent to send the request to a
DHCP server on a separate logical network.
DNS
DNS Servers
Dynamic DNS
A computer that is used to connect to and send/receive requests. A web proxy for
instance sits between a user's web browser and sites on the internet. Web proxies can be
used to filter content, or for privacy/security.
In use on many home routers today, provides a way for a multiple LAN IP Addresses to
be translated into a single WAN IP address. PAT assigns LAN connections a Socket
based on IP Address and Port number.
Port Forwarding
Opening ports on a firewall and assigning that port to a specific internal IP. If you
forward port 80 to the internal address of 192.168.1.10 all traffic that hits the WAN
interface on the router on port 80 will be forwarded to 192.168.1.10.
Fiber
CWDM
Frame Relay
A scalable WAN solution often used as an alternative to leased lines. Frame Relay
operates at the physical and datalink layers of the OSI model. Customers purchase leased
lines to frame relay nodes, and data is sent over Virtual Circuits between the nodes.
Satellite
Broadband Cable
Broadband internet utilizing existing POTS (Plain Old Telephone System) lines
ATM is WAN technology that utilizes a 53-byte cell. 155.520 or 622.080 Mbps
An encapsulation protocol for transporting network layer traffic over point-to-point links.
Multilink PPP
Variant of PPP. Aggregates multiple WAN links into a single aggregate. Enables load
balancing and redundancy.
GSM/CDMA
Edge
LTE/4g
HSPA+
WiMax
Dialup
Uses POTS lines and a 56k MODEM to convert Digital Computer Signals to Analog
Metro-Ethernet
Leased lines
Circuit switched
Packet switched
Install and Terminate Cables and Connectors using the Proper Tools
Copper Connectors
RJ-48C
The same as RJ45, commonly used for T1 and the transmit/receive pins are different.
Usually uses Shielded Twisted Pair (STP) Cable.
DB-9/RS-232
DB-25
UTP Coupler
Has two female ends used to connect two Unshielded Twisted Pair cables
BNC Coupler
Used to couple two BNC cables together can be male-to-male, female-to-female, or male-
to-female.
F-connector
Copper Cables
Shielded Cable
Copper cable that is covered by a shielding, can be made of many metal types or
polymer. Used to prevent electromagnetic interference.
Unshielded Cable
Plenum refers to plenum spaces, where fire travels quickly. Plenum cabling is coated
with a more fire resistant skin than regular PVC.
Coaxial (coax) cables RG6 is larger and the inner core is bigger than that of RG59. RG6
has a better frequency range and can usually be used in place of RG59 but not the other
way around.
Straight-through Cable
Computer to switch
Router to switch
Crossover Cable
Computer to Computer
Rollover Cable
Fiber Connectors
ST - Straight Tip
2.5mm Ferrule with round plastic body. Uses a Twist On/Off style mechanism.
SC
2.5mm Ferrule with a plastic clip
LC
Small Form Factor (SFF) connector that uses a plastic retaining clip that commonly holds
two connectors.
a SFF connector that has a single plug holding two wires. (Always Duplex)
FC
Like the ST uses a 2.5mm ferrule with a twist on connector. Have mostly been replaced,
can be tricky to connect as they use ceramic inside a stainless tube ferrule.
Fiber Coupler
Fiber Cables
Single Mode
Sends and receives a single signal down the core of the glass.
Multimode
Sends signal down the core and bouncing down the sides of the glass
APC vs UPC
With a UPC Connector the light is reflected straight back to the source. With an APC
connector the light is reflected back at an angle. Has more return loss.
Media Converters
Tools
Cable Crimpers
Punch Down tool
Wire Strippers
Snips
OTDR - Optical Time Domain Reflectometer
Cable Certifier
Full or Partial
Bus
Ring
Nodes to connect to neighbors in a ring fashion to transmit. Each node has two neighbors
and all messages travel through the ring.
Star
All nodes connect to a central connection point. Much like a home network.
Hybrid
Point-to-Point
Point-to-Multipoint
Client-Server
Clients connect to servers. Servers provide services to clients. (File Shares, Printers, FTP,
SSH, Telnet)
Peer-to-Peer
ICS Server
DCS/Closed Network
An interface between the physical world and the SCADA/ICS. They transmit data back to
the central station.
Monitors the state of input devices and makes decisions based on programming to control
output devices
Medianets
VTC
ISDN
IP
Session Initiation Protocol (SIP)
Addressing Schema
IPv6
Auto-Configuration
EUI 64
The last 64 bits of an IPv6 address created by using the MAC address and putting FF:FE
in the middle.
DHCP6
Link-Local
An automatically configured address for IPv6. The scope is the local subnet. They all
start with FE80::/64
Address Structure
Address compression
You can compress IPv6 address blocks that contain only zeros to simplify configuring
and reading.
Example FE80:0000:0000:0000:00FF:FE28:9C5A can be expressed as
FE80:0:0:0:00FF:FE28:9C5A
You can also compress multiple blocks of continuous zeros with a double colon
Example FF02:0000:0000:0000:0000:0000:0000:0002 can be expressed as FF02::2
Teredo, Miredo
IPv4
Address Structure
Subnetting
When an interface is configured to receive its address dynamically and no DHCP server
can be found it automatically configures an address in the range of 169.245.0.0-
169.254.255.255
Classful IP addressing
Class A
Class B
Class C
Class D
Classless
Classless IP addresses do use variations of IP addresses and Subnet masks that do not
follow the standard classifications.
Example: Address 10.0.0.1 Subnet Mask 255.255.255.0
Private vs Public
Private addresses do not route onto the internet. All routers are configured to drop these
packets once they hit the edge of the internet.
Ranges include 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
MAC Addressing - Media Access Control
Multicast
Unicast
Broadcast
Broadcast Domains
Collision Domains
Loopback Interface
Routing Loops
A routing error where a packet is sent in a loop and never reaches the destination
Routing Tables
Default Route
This is the route that all packets are sent to unless specified by another route
15 hop limit
Not the best in large networks
Hybrid Routing Protocols - Combine Distance Vector and Link State Capabilities
Used by various routing protocols to distinguish between autonomous systems. They are
assigned to Regional Internet Registries by IANA, and given to compliant network
operators from there.
Route Redistribution
Routing protocols advertising routes that have been learned by a means other than
standard; static routes, directly connected routers, other broadcasts, etc.
High Availability
Virtual IP
Route Aggregation
Combining groups of routes with common addresses into a single entry in a routing table.
Decreases the size of the routing table, and the amount of data sent during router
advertisements.
Example: 128.100.192.0/19 and 128.100.67.0/24 can be aggregated into 128.100.0.0/16 if
they use the same interface on the router.
Routing Metrics
Hop Counts
Bandwidth
Costs
Routers put cost values on paths between nodes and the route with the greatest total cost
is used. Different routers/protocols use different metrics to determine the cost for a link.
Latency
Any of several delays incurred when processing network data.
Administrative Distance
Routing protocols all have their own default administrative distance that is used by the
router when determining what route to send packets.
The smaller the value the more reliable the protocol
Presence
A type of technology that makes it possible to locate and communicate with a computer
system wherever it may be.
Examples: GPS Enabled Phones, IM clients, etc
Devices
UC Servers
UC Devices
UC Gateways
Virtualization
Virtual Switches
Allows virtual machines to communicate with one another and physical hosts.
Virtual Routers
Virtual Firewall
Layers of software created and put in place to control network functions. A blanket term
describing technologies aimed at making networking as flexible and agile as virtual
computing.
Jumbo Frame
Fibre Channel
Cloud Concepts