Cloud + Flashcards
(262 cards)
Hub
A network hub is a basic networking device that connects multiple devices within a LAN. It is a central point where devices can be connected to share data and communicate with each other. However, network hubs have been largely replaced by more advanced devices such as switches.
Network hubs operate at the physical layer of the network and work by receiving data packets from one device and broadcasting them to all other connected devices, regardless of destination. This means that all devices on a hub’s network share the same bandwidth, and collisions are likely to occur if multiple devices transmit data simultaneously. Drawbacks of the network hub include: not having the capability to manage or prioritize network traffic, filter data, or make intelligent routing decisions. Hubs are commonly not used in modern network setups.
Bridge
A network bridge is a networking device or software component that connects multiple network segments or LANs (Local Area Networks) together. It operates at the data link layer (Layer 2) of the OSI (Open Systems Interconnection) model and is used to forward network traffic between different network segments.
The primary function of a network bridge is to selectively transmit data packets between network segments based on their destination MAC (Media Access Control) addresses. When a bridge receives a packet, it examines the MAC address of the packet and determines whether to forward it to the other network segment or discard it. The bridge maintains a table called the bridge forwarding table or MAC table, which associates MAC addresses with the network segments they belong to. Unlike network hubs, which broadcast data to all connected devices, a bridge is more selective and intelligent in its forwarding process. It only forwards packets across network segments if the destination MAC address is located on the other segment, thus reducing unnecessary traffic and improving overall network efficiency.
Network bridges have been largely replaced by more advanced technologies such as switches and routers. Switches, in particular, offer similar functionality to bridges but with additional features and improved performance. However, bridges still have their uses in specific networking scenarios, such as connecting legacy equipment or extending the range of a network.
Switch
A network switch is a networking device that connects multiple devices within a Local Area Network (LAN) and facilitates communication between them. It operates at the data link layer (Layer 2) and sometimes at the network layer (Layer 3) of the OSI (Open Systems Interconnection) model. The primary function of a network switch is to receive incoming network packets and forward them to their intended destination based on the MAC (Media Access Control) addresses of the devices connected to the switch. When a switch receives a packet, it examines the destination MAC address and looks up its forwarding table to determine the port to which the packet should be sent. This process is known as switching, and it allows devices within the LAN to communicate directly with each other.
Network switches offer several advantages over network hubs and bridges. Unlike hubs, which broadcast data to all connected devices, switches create dedicated connections between devices, allowing for simultaneous communication without collisions. This improves network performance and bandwidth utilization. Additionally, switches can handle simultaneous traffic across multiple ports, providing full-duplex communication.
Switches come in various configurations, such as unmanaged, managed, and Layer 3 switches.
Switching
When a switch receives a packet, it examines the destination MAC address and looks up its forwarding table to determine the port to which the packet should be sent.
Unmanaged Switch
Unmanaged switches are plug-and-play devices that operate with default settings, making them easy to use but with limited configuration options.
Managed Switch
Managed switches provide more control and configuration capabilities, allowing network administrators to monitor and manage the network traffic, implement security features, and optimize performance.
Layer 3 Switch / Multi-layer Switch
Layer 3 switches, also known as multi-layer switches, can perform routing functions in addition to switching, making them capable of forwarding packets based on IP addresses.
vNIC
A vNIC (virtual Network Interface Card) is a software-based representation of a physical network interface card within a virtualized environment. It emulates the functionality of a physical NIC, allowing virtual machines (VMs) or containers to connect to virtual networks and communicate with other devices and systems.
A vNIC is created and assigned to each virtual machine or container running on a hypervisor or containerization platform. It provides the necessary network connectivity for the virtual instance to send and receive data over the virtual network infrastructure. From the perspective of the virtual machine or container, a vNIC appears and behaves like a physical NIC, enabling network communication.
Virtualization technologies such as VMware, Hyper-V, or KVM, as well as container platforms like Docker or Kubernetes, utilize vNICs to establish network connectivity and enable virtual instances to access the underlying physical network infrastructure or communicate with other virtual machines or containers within the same virtual environment.
The configuration and properties of vNICs can be managed and adjusted within the virtualization or containerization platform, allowing network settings, such as IP addresses, subnet masks, VLAN tags, or quality-of-service parameters, to be defined and customized for each virtual instance. This flexibility enables administrators to tailor network connectivity to meet the specific requirements of virtual machines or containers within the virtual environment.
vSwitch
A vSwitch (virtual switch) is a software-based networking component used in virtualized environments to connect and manage network traffic between virtual machines (VMs) or containers running on a hypervisor or containerization platform. Similar to a physical network switch, a vSwitch operates at the data link layer (Layer 2) of the OSI model and performs the following functions:
Network connectivity: A vSwitch provides vPorts (virtual network ports) to which virtual machines or containers can be connected. It enables communication between virtual instances within the same virtual network or across different virtual networks
Packet forwarding: Incoming network traffic from virtual machines or containers is received by the vSwitch, which makes forwarding decisions based on the MAC (Media Access Control) addresses of the virtual instances. It forwards packets to the appropriate destination vPorts, ensuring proper delivery.
VLAN support: A vSwitch often includes support for Virtual LANs (VLANs), allowing network segmentation and isolation within the virtual environment. VLANs help to enhance network security, optimize network performance, and provide logical separation between different groups of virtual instances.
vSwitches are integral components of virtualization platforms such as VMware vSphere, Microsoft Hyper-V, or KVM, as well as containerization platforms like Docker or Kubernetes. They enable virtual machines or containers to access the physical network infrastructure and communicate with other virtual instances, while also providing network management capabilities within the virtual environment. The configuration and management of vSwitches are typically done through the virtualization or containerization platform’s management interfaces, allowing administrators to define network settings, monitor network traffic, and apply network policies to efficiently manage the virtual network infrastructure.
vPorts
(Virtual Network Ports) Enables communication between virtual instances within the same virtual network or across different virtual networks.
Packet Forwarding
Packet forwarding is the process of routing network packets from a source to a destination within a computer network. When a packet arrives at a network device (such as a router or switch), the device examines the packet’s destination address and determines the optimal path for forwarding the packet to its intended destination. This involves looking up routing tables or forwarding rules to identify the next hop or outgoing interface for the packet. The device then encapsulates the packet in a new frame with appropriate addressing information and transmits it toward the next network device in the path
VLAN
A VLAN (Virtual Local Area Network) is a logical network that is created within a physical network infrastructure. It allows network devices to be grouped together, even if they are not physically connected on the same network switch. VLANs provide isolation, security, and flexibility by segmenting a network into smaller, virtual subnetworks. Devices within the same VLAN can communicate with each other as if they were connected to the same physical network, while traffic between VLANs requires routing through a router or Layer 3 switch. VLANs enable network administrators to efficiently manage network traffic, implement security policies, and optimize network performance by logically separating devices and controlling communication between them
Traffic Shaping
Traffic shaping is a network management technique used to control and prioritize network traffic flows. It involves managing the bandwidth allocation and transmission rates of different types of network traffic to ensure optimal network performance and avoid congestion. By shaping traffic, administrators can regulate the flow of data based on predefined policies, such as prioritizing critical applications or limiting bandwidth for specific types of traffic. This helps to enhance network efficiency, minimize latency, and ensure fair usage of available network resources.
Traffic shaping is a specific technique within the broader concept of QoS
QoS
QoS, or Quality of Service, is a network management concept that aims to prioritize and control the delivery of network traffic based on specific requirements. It involves techniques and mechanisms to ensure that critical traffic receives preferential treatment in terms of bandwidth, latency, and reliability.
QoS focuses on delivering a consistent level of service to different types of network traffic, such as voice, video, data, or real-time applications. It involves setting priorities, allocating resources, and implementing policies to meet specific performance targets and ensure a satisfactory user experience.
Traffic shaping, on the other hand, is a specific technique within the broader concept of QoS. It involves controlling the flow of network traffic to smooth out peaks and prevent congestion.
HTTPS
(Hypertext Transfer Protocol Secure ) is a secure communication protocol used for secure and encrypted data transfer over computer networks, especially the internet. It is an extension of the standard HTTP protocol and adds an extra layer of security by using SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption protocols.
HTTPS ensures that the data transmitted between a client (such as a web browser) and a server is encrypted and protected from eavesdropping or tampering. This encryption is achieved through the use of digital certificates, which authenticate the identity of the server and establish a secure connection.
Port 443
SSL
(Secure Sockets Layer) is a cryptographic protocol that provides secure communication over computer networks, especially the internet. It was widely used to establish secure connections between a client (such as a web browser) and a server, encrypting the data transmitted between them. SSL operates at the transport layer (Layer 4) of the OSI model and ensures confidentiality, integrity, and authentication of data. It uses asymmetric encryption (also known as public-key cryptography) to establish a secure session between the client and the server.
The SSL initiation process, also known as the SSL handshake, is the initial exchange between a client and a server to establish a secure SSL/TLS connection. It involves the client and server exchanging information about supported SSL versions, selecting cipher suites, authenticating certificates, and exchanging cryptographic keys. Once the handshake is complete, a secure session is established, enabling encrypted communication between the client and server.
SSL provides encryption, data integrity, authentication, and forward-secrecy through support of TLS (if the private-key of the server is compromised in the future, the previously recorded SSL communications cannot be decrypted).
Though there are some differences, the terms “SSL” and “TLS” are used interchangeably.
Forward Secrecy
Forward secrecy, also known as perfect forward secrecy (PFS), is a cryptographic property that ensures the confidentiality of past communication even if the long-term private key of a system is compromised in the future. It achieves this by generating unique session keys for each communication session, preventing the decryption of past sessions even if the private key is obtained.
TLS
(Transport Layer Security) is a cryptographic protocol designed to provide secure communication over computer networks, such as the internet. It is the successor to SSL (Secure Sockets Layer) and operates at the transport layer (Layer 4) of the OSI model.
TLS differs from SSL in that it features it’s own versions (SSL v1.0, 2.0, 3.0 vs. TLS 1.2, 1.3, etc. ), incorporating stronger cryptographic algorithms. Additionally, more secure algorithms and cipher suites are used for key exchange, authentication, and encryption. TLS also provides forward-secrecy to SSL. TLS is designed to be backwards-compatible with SSL, allowing it to negotiate using SSL protocols and cipher suites.
Though there are some differences, the terms “SSL” and “TLS” are used interchangeably.
IPSEC
(Internet Protocol Security) is a suite of protocols used to secure Internet Protocol (IP) communications by providing authentication, integrity, and confidentiality services. It is commonly used for creating virtual private networks (VPNs) and ensuring secure communication between network devices over potentially insecure networks, such as the internet.
Operates in two modes: Transport and Tunnel
Transport Mode (IPSEC)
IPSEC secures only the payload of the IP packet while leaving the IP headers intact. This mode is typically used for securing end-to-end communication between two hosts.
Tunnel Mode (IPSEC)
The entire IP packet, including the original IP headers, is encapsulated within a new IP packet. This mode is commonly used for secure communication between networks or for remote access VPN’s.
SSH
Secure Shell) is a network protocol that provides a secure and encrypted method for remote login, command execution, and data communication between two networked devices. It is commonly used to establish a secure remote connection to a server or network device over an unsecured network, such as the internet.
SSH provides secure communications through the use of strong encryption algorithms that protect against eavesdtopping, tampering, etc. SSH requires authentication of users (through generated key pairs) before establishing a connection, and once a connection has been formed, remote command execution can be accomplished. SSH also provides secure file transfer capabilities, allowing users to securely transfer files between the local and remote systems. Lastly, SSH incorporates port forwarding, which allows users to securely tunnel other network protocols or services through the SSH connection.
Port 22
RDP
(Remote Desktop Protocol) is a proprietary protocol developed by Microsoft that allows users to remotely connect and control a Windows-based computer or server from another device. It provides a graphical user interface (GUI) for accessing and interacting with a remote computer as if you were sitting in front of it.
Port 3389
Hardware Based VPN
A type of VPN implementation that relies on dedicated hardware devices to establish secure connections between remote networks or individual devices.
Hardware-based VPNs offload the VPN processing tasks to specialized devices, typically known as VPN appliances or VPN gateways. Hardware-based VPNs are particularly suitable for organizations that require high-performance, scalable, and secure VPN solutions. They are commonly deployed in enterprise networks, data centers, and large-scale VPN deployments where dedicated hardware resources can optimize VPN performance and manage large volumes of VPN traffic effectively.
Uses IPSEC for secure communications.