B3 – Networking Infrastructure Services and Resources Flashcards

B – Use of Networking Architectures and Principles for Security

1
Q

Protocol

A

👉 A set of rules that manage the communication between different computers on a network. The most important of these are the Transmission Control Protocol and the Internet Protocol.

👉 More commonly known as TCP/IP, these are the protocols that are used to connect network devices over the internet.

👉 When transmitting data over a network we use something called the TCP/IP model. This model has four layers that must each be followed through when transmitting data over a network like the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol 4 layers

A

👉 Application Layer– This is the top layer that directly interfaces with your applications software, such as your web browser, and passes data from the application to the transport layer.

👉 Transport Layer– The next layer is where TCP is used. TCP will split our data up into small chunks of the data called packets. It will also attach a header that contains information on sender/recipient ports, packet order information & a checksum that is used for error detection when received. These packets can then be sent to the internet layer.

👉 Internet Layer– This layer is where IP is used. This protocol will format the packets into something called an IP datagram and attaches the origin and destination IP addresses. This ensures that the data will be sent to the correct destination. This can then be passed to the network interface layer.

👉 Network Interface Layer– This final layer will add mac addresses to each packet to ensure the data arrives at the correct physical device. It will also convert the data into a form that can actually be transported over the physical cables of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

network port

A

👉 the endpoint of a network communication. The network port identifies the application that is being used so that our computer can handle data coming from many applications at once (e.g. web browsing & email).

👉 It’s important to note that these are nothing like the physical ports you have on your computer, such as the HDMI port. These ports are a logical port, they exist in software, not hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ports examples

A

Port 80– The HTTP port that is used for transferring web pages.

Port 443– The HTTPS port that is used for transferring web pages with encryption.

Port 25– The SMTP port that is used for sending and routing emails.

Port 143– The IMAP port that is used for retrieving emails.

Port 20/21– The FTP ports that are used for uploading and downloading files.

The practical purpose of these ports is that when we send a data packet we don’t just need the IP address of the destination; we also identify the port being used.

That way when the recipient device receives the data it will know which application to forward the data to. So, if it is port 80, it will pass it to the web browser.

If we didn’t have ports the receiver wouldn’t know which application requires the data, so we would only be able to use one application at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Packets

A

👉 A piece of data or message that we are sending across a network. However, each packet contains more than just a chunk of the data.

👉 Each packet contains a header that contains information that will ensure the packet arrives correctly at the destination, as well as a piece of the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP address

A

👉 An IP address is a string of numbers that will uniquely identify a computer that is connected to the internet (or any network that uses the IP protocol). Earlier this lesson we learnt about the Internet Protocol. For a long time, we used a version of the IP called IPv4.

👉 IP addresses when using IPv4 were made up of a 32-bit number, which we usually express in dot-decimal notion, made up of 4 decimal numbers each between 0 & 255. This allowed for a little under 4.3 billion addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domains

A

👉 A key part of the role of the network operating system is to centrally administrate our network and control access for security purposes. We can do this through using the NOS to setup domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Domain Controller

A

👉 any user that tries to connect a device with our network will need to authenticate themselves (through a username & password) in order to access the domain, and thus the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

subdomains

A

👉 By creating multiple domains, we can decentralise the administration of the network, so rather than having one giant network to administrate, we can have several smaller ones. This will also limit access for better security.

👉 By making these domains a subdomain though, we can still perform administration on the parent network that will apply to the subdomains.
An example of where we would use this is a large organisation with offices in many cities. We can define each cities domain as a subdomain of the head office. This way each city will have some semi-autonomous control over the network, while the company can still make administrative changes to all domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

network segmentation.

A

When creating a single large network though, we can split a network into multiple subnetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages of network segmentation

A

👉 Performance– it reduces the amount of network traffic by dividing that traffic over multiple networks.

👉 Security– it can minimise the impact when a malicious user gains access to a network as they will only have access to devices & data on one segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain Name System (DNS)

A

👉 The Domain Name System (DNS) is used to translate domain names into IP addresses.

👉 If we want to visit a website, we would write the domain name of the website, e.g. Facebook.com. However, as we’ve learnt in earlier lessons, the address for a device, such as a web server, is actually an IP address.

👉 Thankfully, DNS will take the domain name you have entered and sends it to a domain name server which will lookup the correct IP address associated with the name. This allows us to use easy to remember text-based addresses for web sites, rather than the difficult to remember IP addresses.

👉 We can also use DNS on our private network to assign names to the domains and subdomains we setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Directory Services (DS)

A

👉 Directory services are used to organise information on network objects such as users & computers. This way all information about the network is available from a single repository making it easily accessible to users to allow for centralised administration, authorisation and authentication.

👉 The server that is running directory services is called the Domain Controller. You should remember this from when we learnt about domains. The directory services are what allows us to create & manage our domains.

👉 Some common directory services include:

Active Directory– the directory service included in the Windows Server NOS.

Open Directory– the directory service included in the macOS Server NOS.

OpenLDAP– a free open source directory service included in many Linux NOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication Services

A

👉 Authentication services provide username/password login authentication based on the details in your directory services on your domain controller.

👉 When a user wants to connect a device to a network they will need to first authenticate themselves. This prevents malicious users from connecting unauthorised devices to the network in order to launch an attack.

👉 This can also allow for users to connect to the network domain from outside the organisation to support remote working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dynamic Host Configuration Protocol (DHCP)

A

👉 DHCP is a protocol that is used to automatically assign IP addresses to the different devices connected to a network and allows a network administrator to centrally manage them.

👉 The device that is used to issue the IP addresses is known as the DHCP server. In a small home network, this will likely be the router. However, larger networks run by organisations will have a dedicated computer as the DHCP server.

👉 Dynamically assigning IP address helps to prevent clashes in IP addresses (which can happen when using only static IP addresses) and allows you to use a small number of IP addresses as you can reuse them on different devices as they connect & disconnect from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Routing

A

👉 Routing is the process of directing data packets between multiple networks to reach its destination.

👉 Routing is performed through the use of “Routing Tables”. Each router maintains a routing table that contains a few pieces of information, most notably, the final destination and gateway.

👉 When a router receives a data packet it will read the recipient IP address from the packet header. It can then lookup that IP address in its routing table and identify the IP address of the next gateway the data packet must move to in order to reach its final destination.

👉 This happens from router to router until the data packet reaches its destination.

17
Q

Remote Access Services

A

👉 Remote access services provide access to a network from outside the organisation. This is built into many network operating systems.

👉 To do this the network will setup a remote access server, which the user will need to authenticate itself with in order to access network resources.

👉 The remote access services will often come with VPN features that can be configured to ensure a VPN connection is used between the client device and the remote access server to ensure the privacy of the data being accessed.

18
Q

File servers

A

👉 used for the centralised storage & management of files so they can be accessed by clients over a network. The file server stores the files and manages access to them through the use of user or group credentials.

👉 These credentials will manage the access permissions of different users to the files, folders & network drives. These are usually managed through the use of directory services

19
Q

Print servers

A

👉 provide access to printers to client devices over the network. The print server will accept print jobs from the clients and sends these print jobs to the appropriate printer. This way a printer can be shared between hundreds of devices.

👉 The print server will also make the print queue (stored locally on the printer) available to the clients so users and administrators to allow for print jobs to be managed, such as removing a job or viewing the number of pages to be printed.

20
Q

Web servers

A

👉 used for the storage and access of web pages and their relates files to users. All websites are hosted on a web server. When a user types in a URL this will send a request to the web server which will find the relevant file and return it to the client for display in the browser.

21
Q

Mail

A

servers provide the ability to send and receive emails over a network. When we send an email from our mail client it is transferred to our outgoing mail server. This will then forward the email over the internet to the recipients mail server. The recipient then logs into their mail server and the email will be downloaded to their client.

22
Q

Communication

A

servers are used to provide internet access to all the clients on a network. It acts as the public gateway for the network and ensures that all the devices will not require they’re own private internet connection.