Network + Part 5

  1. IaaS
    Infrastructure as a Service. Also, Hardware as a Service. Outsource your equipment. Still responsible for the management and security. Good for hosting your website on a 3rd party server where you provide the site.
  2. SaaS
    Software as a Service. On demand software with no local installation. Central management of data and applications. Examples are email servers.
  3. PaaS
    Platform as a service. No servers, no software, no maintenance team, someone else handles the platform while you handle the development. No direct control over infrastructure. Help build an app with less coding. An example is salesforce.
  4. Chart that shows IaaS, PaaS, SaaS
    Image Upload 2
  5. Public
    Available to everyone on the internet.
  6. Community
    Several organizations share the same resource.
  7. Private
    You own a virtualized local data center.
  8. Hybrid
    A mix of public and private.
  9. DaaS
    Desktop as a Service. Virtual desktop infrastructure over a network. Does not have a big impact on memory or CPU but needs high bandwidth.
  10. Elasticity
    Scale up or down as needed.
  11. Infrastructure as code
    Define servers and hardware as code. Can be duplicated.
  12. Orchestration
    Entire application instances can be instantly provisioned.
  13. VPN
    Site to site private network to encrypt through the internet.
  14. Virtual Private Cloud Gateway
    Connects users on the Internet.
  15. VPC Endpoint
    Virtual private cloud endpoint. Direct connection between cloud provider networks.
  16. VM Sprawl
    When you lose control of which Virtual Machines are connected to which applications. You have more open than necessary. This is why detailed documentation is necessary.
  17. VM Escape
    When something malicious breaks out of the VM and attacks the host.
  18. VoIP Phone
    Voice over Internet Protocol.
  19. IoT
    Internet of Things
  20. SCADA
    Supervisory Control and Data Acquisition System. PC manages the industrial equipment and receives feedback. Security Risk.
  21. ICS
    Industrial Control Systems
  22. HUB
    • Similar to a Multiport Repeater. Traffic going in one port is repeated to every other port. OSI Layer 1.
    • Everything is half-duplex, send or receive. Less efficient as more devices are added.
  23. Bridge
    An oldschool switch. The ports on a modern switch are all bridges. An OSI Layer 2 device because it distributes traffic based on MAC addresses.
  24. Switch
    • Each port is a bridge. Application specific integrated circuit. (ASIC) Makes forwarding decisions based on MAC addresses so it is a layer 2 device. Has many ports and features such as (PoE) Power over Ethernet.
    • There are router Layer 3 hybrids available called a multi-layer switch.
  25. Router
    Routes traffic between IP subnets. OSI Layer 3 device. Can also connect different types of cabling and networks, such as fiber to copper, WAN to LAN.
  26. Access Point
    A wireless access point that acts like a bridge between a wired router and wireless device. Uses MAC addresses so it is Layer 2.
  27. Cable Modem
    Broadband transmission across multiple frequencies. Different traffic types for different devices such as phone, internet, TV. This is called DOCSIS, Data Over Cable Service Interface Specification.
  28. DSL Modem
    ADSL, Asymmetric Digital Subscriber Line. Uses telephone lines. Download speed is faster than the upload speed.
  29. Repeater
    Receives a signal, regenerates, and resends. Can connect one type of wire to another such as fiber to copper. Layer 1.
  30. Layer 3 capable switch
    A switch and router in one device.
  31. Wireless LAN controllers
    Centralized management of access points. Performance and security monitoring. Configure and deploy changes to all sites. Generate reports.
  32. Load balancer
    Distributes the load by sending traffic through the least used ports. Allows for multiple servers and is invisible to the end user. Allows for larger scale and fault tolerance. Data can also be cached.
  33. IDS and IPS
    Intrusion Detection System. Intrusion Prevention System.
  34. Proxies
    A device in between users and the external network. The proxy acts as a relay that handles sending and receiving of data. A proxy just for applications is called an application proxy.
  35. VPN concentrator
    Handles the VPN’s encrypted data traversing a public network. Often integrated into a firewall.
  36. PBX
    Private branch exchange. Similar to a switch but for phones. Replaced by VoIP PBX.
  37. Firewall
    Filter traffic by port number or application. Next generation firewalls, NGFW will recognize the applications being used. Encrypt traffic by enabling a VPN between sites. Layer 3 device, can also be built into a router, allowing for dynamic routing and NAT.
  38. Distance vector routing protocols
    Chooses the connections based on the number of hops throughout the network. Even if it is not the fastest way.
  39. Link state routing protocols
    Information is passed between routers that is related to the current connectivity. Will choose the fastest connection. One version is OSPF, Open Shortest Path First.
  40. Hybrid routing protocols
    A combination of distance vector and link state protocols.
  41. BGP
    Border Gateway Protocol. Determines route based on paths, network policies, or configured rule sets.
  42. Routing Tables
    A list of directions for your packets. A table with many routes to your destination. Packets stop at every router and ask for directions.
  43. Hop
    When a packet passes through a router. Has TTL in IPv4 and a hop limit in IPv6 to avoid a packet looping forever.
  44. Default route
    A route to use when no other routes are found. Destination of 0.0.0.0/0
  45. Administrative distance
    • Used by the router to determine which routing protocol has priority.
    • Image Upload 4
  46. Traffic shaping / packet shaping
    Controls bandwidth usage or data rates. Set important applications to have higher priorities than other applications.
  47. The Ethernet frame
    | Preamble | SFD | Destination MAC | Source MAC | | Type | FCS |
  48. Preamble
    7 bytes. 56 ones and zeros that says this is the beginning of the Ethernet frame.
  49. SFD
    Start Frame Delimiter. 1 byte. Designates the end of the preamble.
  50. Destination MAC Address
    6 bytes.
  51. Source MAC Address
    6 bytes.
  52. Ethertype
    2 bytes. Describes the data contained in the payload.
  53. Payload Size in bytes
    46-1500 bytes. Layer 3 and higher data.
  54. FCS
    Frame check sequence. 4 bytes. Checks that the frame was not corrupted.
  55. Collision
    When 2 devices on a half-duplex Ethernet hub sends information simultaneously.
  56. CSMA/CD
    • CS – Carrier sense. Is there a signal available that we can use to send some data.
    • MA – Multiple Access. More than one device.
    • CD – Collision Detect. Sends a jam to clear the collision.
    • Used in Half Duplex Ethernet.
Author
dsagent
ID
363226
Card Set
Network + Part 5
Description
Cloud Models Cloud Deployment Models Designing the cloud Networked Devices Networking Devices Advanced Networking Devices Dynamic routing protocols Routing Technologies Introduction to Ethernet
Updated