Cloud+ Outline – Module 3

April 15, 2017 | Views: 1981

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Module 3: Network Structure and Configuration

Unit Overview

Network Topologies

Network Types

Network Optimization

Network Ports and Protocols

Routing and Switching

 

Network Topologies

Bus Topology

Ring Topology

Mesh Topology

Star Topology

Tree Topology

 

Multiple LANs make a WAN

 

Bus Topology

  • Connected in line – any break in line, the network goes down.
  • Must be terminated on ends.

 

Ring Topology

  • Connected in a circular pattern, any break in line, the network goes down.

 

Mesh Topology

  • Every computer connected to every computer
  • Redundancy, no one computer takes the computer down.
  • Negative is each computer requires as many NICs as computers.

 

Star Topology

  • Every computer connects to a central node
  • No one computer takes the computer down.
  • If hub goes down, all network connectivity stops.

 

Tree Topology

  • Hierarchical structure
  • Central node for each hub, star connected to a star connected to a star.

 

Network Types

Intranet

Internet

Extranet (Perimeter Network, DMZ)

 

Intranet

  • Private network
  • Created by a company to host internal resources
  • Isolated network
  • Protected by firewalls or proxies

 

Internet

  • Global networks of interconnected network devices
  • Not controlled by any organization
  • Networks relying on protocols to send information
  • Commercial and private organization by an IP

 

Extranet (Perimeter network, DMZ)

  • Extension of an intranet
  • Allows the organization that created the extranet to share resources outside the intranet
  • Owned by the organization that created it

 

Network Optimization

Load Balance

Bandwidth

Latency

Compression

Caching

 

Load Balancing

  • Distribute requests across devices
  • Used to lighten the load

 

Bandwidth

  • Bandwidth is the speed of the network
  • 10 MB/sec10 MB is the bandwidth
  • 100 MB/sec100 MB is the bandwidth

 

Latency

  • Is the time delay while data is being sent (in ms = milliseconds)
  • The higher the latency, the slower the network

 

Compressions

  • Shrinking a file
  • ZIP and RAR are common file extension types

 

Caching

  • Allows for a storage of frequently accessed data
  • Servers typically have a cache that allows a temp storage of internet files for quick recall

 

Network Ports and Protocols

Common Ports

FTP 20/21 TCP File Transfer Protocol

Telnet 23 TCP

SSH 22 TCP Secure Shell

SMTP 25 TCP Simple Mail Transfer Protocol

DNS 53 TCP UDP Domain Name Server

DHCP 67/68         UDP Dynamic Host Control Protocol

TFTP 69         UDP Trivial File Transfer Protocol

HTTP 80 TCP Hyper Text Transfer Protocol

POP 110 TCP Post Office Protocol

NNTP 119 TCP Network News Transfer Protocol

NTP 123         UDP Network Time Protocol

IMAP4 143 TCP UDP Internet Message Access Protocol

SNMP 161/162 TCP UDP Simple Network Management Protocol

LDAP 389 TCP UDP Lightweight Directory Access Protocol

HTTPS 443 TCP UDP Hyper Text Transfer Protocol Secure

RDP 3389 TCP UDP Remote Desktop Protocol

 

Routing and Switching

Network Address Translation (NAT)

Port Address Translation (PAT)

Virtual Local Area Network (VLAN)

Routing Tables

 

Network Address Translation (NAT)

  • Allows a network to share one IP in the internet

 

Port Address Translation (PAT)

  • Provides many internal devices mapping of a single IP address

 

Virtual Local Area Network (VLAN)

  • Virtual LANs to create a logical separation on a physical network
  • VLANs are usually created in a switch

 

Routing Tables

  • Tables that are stored on the router
  • Used to route network packets
  • Contains information about the internal network and the next hop

 

Unit Overview

Described Network Topologies

Described Network Types

Described Network Optimization

Described Network Ports and Protocols

Described Routing and Switching

 

 

 

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
1 Comment
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel