Internet Appliances Facts Flashcards
(38 cards)
_____ is responsible for ensuring network uptime, security, and access to network resources.
network administrator
Internet appliances can be implemented to help make the network administrator’s job easier by:
-automating tasks
-providing network security
-monitoring the network for potential issues.
Internet appliances can come in two forms:
-One form is an embedded system that contains all hardware and software in one device.
-The other form is software running on a server.
You can use a _____ to monitor the servers and distribute traffic so one server does not get overwhelmed
load balancer
_____ work by reading the information in the packet headers of incoming traffic and using algorithms to determine the best flow of traffic.
Network layer load balancers
Round robin
is the most basic algorithm. the servers handle network requests in sequential order. The load balancer does not monitor each server’s current load, as it assumes the servers can handle each request in the same amount of time.
This can still lead to a server getting overwhelmed.
This algorithm works the same as the round robin, but takes the server’s power into consideration. A more powerful server is sent more traffic than less powerful servers.
Weighted round robin
_____ algorithm looks at the active connections each server is handling and sends the network traffic to the server that currently has the lowest number of connections.
The least connections
Least connections treats each network request equally.
Does not take into account that some requests require more time.
Does not take into account the power of each server.
facts
Example of least connections is
if a request comes in that will take a long time to process, the load balancer can’t take this into consideration. It might direct that traffic to the next server in line, but that server might already be dealing with another request. This can cause that server to get backed up and slow down the network.
Example of least connections is
if a request comes in that will take a long time to process, the load balancer can’t take this into consideration. It might direct that traffic to the next server in line, but that server might already be dealing with another request. This can cause that server to get backed up and slow down the network.
This algorithm distributes traffic based on the active connections and the processing power of each server.
weighted least connections
This algorithm creates a hash key based on the source and destination IP addresses. The hash key is assigned to a server and all requests for the remainder of the active session are handled by that same server.
Source IP hash
-makes decisions based solely on the data in the packet header which results in a lot of guesswork.
-This can lead to inefficient distribution of traffic between the servers.
network layer load balancer
_____ can distribute traffic based on the content of network packets including the HTTP header, HTTP message, and the session cookies.
application layer load balancer
The application layer load balancer also tracks the responses from the servers, so it can keep track of whether the session will continue or not. This allows the load balancer to make routing decisions based on data and not guess work. (true or false)
true
The application layer load balancer most commonly uses the least pending request (LPR) algorithm. This algorithm monitors all pending requests and routes them to the most available server. This algorithm allows the load balancer to continue to monitor all server loads and instantly make adjustments in case there’s a sudden surge of incoming connections.
facts
Spam email can be extremely dangerous to the network as it can introduce malware and clog the network. (true/false)
true
You can use a _____ internet appliance to monitor incoming and outgoing emails to reduce the amount of spam affecting the network.
spam gateway
The spam gateway can block incoming spam emails using these methods: (1/3)
1) Comparing sender addresses to a blocklist.
Example: If the sender is on a blocklist, the email is blocked. The problem with using this method is that it is fairly easy to bypass the blocklist by spoofing (faking) the sender’s email address.
The spam gateway can block incoming spam emails using these methods: (2/3)
2) Using email authentication technologies on the spam gateway.
The spam gateway can block incoming spam emails using these methods: (3/3)
3) Checking embedded links in the email.
Explain: If the link redirects to a malicious site, the email will be blocked.
Some spam gateways monitor outgoing emails to prevent spam emails from leaving the network. If spam emails come from the organization’s domain, the domain can be added to other organizations’ blocklists. (true/false)
true
DMARC:
-Verifies the email sender.
-Tells the recipient what to do if neither authentication method passes.
-Allows the recipient to tell the sender about messages that pass or fail DMARC authentication.