Paker

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 27

S

Small Home Networks – connect a few computers to each


other and the Internet
Small Office/Home Office – enables computer within a home
or remote office to connect to a corporate network
Medium to Large Networks – many locations with hundreds or
thousands of interconnected computers
World Wide Networks – connects hundreds of millions of
computers world-wide – such as the internet
Two most common types of networks:
 Local Area Network (LAN)
 Wide Area Network (WAN).
Popular services for home users and small offices
include broadband cable, broadband digital subscriber line
(DSL), wireless WANs, and mobile services.
Bring Your Own Device (BYOD) allows users to use their own
devices giving them more opportunities and greater flexibility.
BYOD allows end users to have the freedom to use personal tools
to access information and communicate using their:
 Laptops
 Netbooks
 Tablets
 Smartphones
 E-readers
BYOD means any device, with any ownership, used anywhere.
Four types of Clouds:
 Public Clouds
 Available to the general public through a pay-per-use
model or for free.
 Private Clouds
 Intended for a specific organization or entity such as
the government.
 Hybrid Clouds
 Made up of two or more Cloud types – for example,
part custom and part public.
 Each part remains a distinctive object but both are
connected using the same architecture.
 Custom Clouds
 Built to meet the needs of a specific industry, such
as healthcare or media.
 Can be private or public.

In addition to DSL and cable, wireless is another option used to connect


homes and small businesses to the internet.
 More commonly found in rural environments, a Wireless Internet
Service Provider (WISP) is an ISP that connects subscribers to designated
access points or hotspots.
 Wireless broadband is another solution for the home and small
businesses.
 Uses the same cellular technology used by a smart phone.
 An antenna is installed outside the house providing wireless or wired
connectivity for devices in the home.

External Threats:
 Viruses, worms, and Trojan horses
 Spyware and adware
 Zero-day attacks
 Threat Actor attacks
 Denial of service attacks
 Data interception and theft
 Identity theft


Internal Threats:
 lost or stolen devices
 accidental misuse by employees
 malicious employees

Network security components for home or small office network:


 Antivirus and antispyware software should be
installed on end devices.
 Firewall filtering used to block unauthorized access
to the network.

Larger networks have additional security requirements:


 Dedicated firewall system
 Access control lists (ACL)
 Intrusion prevention systems (IPS)
 Virtual private networks (VPN)
 Shell - The user interface that allows users to request
specific tasks from the computer. These requests can
be made either through the CLI or GUI interfaces.
 Kernel - Communicates between the hardware and
software of a computer and manages how
hardware resources are used to meet
software requirements.
 Hardware - The physical part of a computer including
underlying electronics

 A GUI allows the user to interact with the system using an


environment of graphical icons, menus, and windows.
 A GUI is more user-friendly and requires less knowledge of the
underlying command structure that controls the system.
 GUIs can fail, crash, or simply not operate as specified. For these
reasons, network devices are typically accessed through a CLI.

 Secure Shell (SSH) – Establishes a secure remote CLI


connection to a device, through a virtual interface, over
a network. (Note: This is the recommended method for remotely
connecting to a device.)
 Telnet – Establishes an insecure remote CLI connection to a
device over the network. (Note: User authentication, passwords and
commands are sent over the network in plaintext.)

Global Configuration Mode:


 Used to access configuration options on the device

Line Configuration Mode:


 Used to configure console, SSH, Telnet or AUX
access

Interface Configuration Mode:


 Used to configure a switch port or router interface

 Keyword – This is a specific parameter defined in the operating
system (in the figure, ip protocols).
 Argument - This is not predefined; it is a value or variable defined by
the user (in the figure, 192.168.10.5)
 The command is traceroute and the user-defined argument is
the ip-address of the destination device. For example, traceroute
192.168.254.254.
To Secure VTY lines, create a standard ACL that only permits the IP addresses
you want to allow and apply this ACL to the VTY lines that you want to protect.
Once the ACL is applied, the router will permit only the allowed IP addresses to
access the VTY lines.
 Internet Society (ISOC) - Promotes the open
development and evolution of internet
 Internet Architecture Board (IAB) - Responsible

for management and development of internet


standards
 Internet Engineering Task Force (IETF) -

Develops, updates, and maintains internet and


TCP/IP technologies
 Internet Research Task Force (IRTF) - Focused

on long-term research related to internet and TCP/IP


protocols
 Internet Corporation for Assigned Names and Numbers
(ICANN) - Coordinates IP address allocation, the management
of domain names, and assignment of other information
 Internet Assigned Numbers Authority (IANA) - Oversees
and manages IP address allocation, domain
name management, and protocol identifiers for ICANN
 Institute of Electrical and Electronics
Engineers (IEEE, pronounced “I-triple-E”) -
dedicated to creating standards in power and energy,
healthcare, telecommunications, and networking
 Electronic Industries Alliance (EIA) - develops

standards relating to electrical wiring, connectors,


and the 19-inch racks used to mount networking
equipment
 Telecommunications Industry Association

(TIA) - develops communication standards in radio


equipment, cellular towers, Voice over IP (VoIP)
devices, satellite communications, and more
 International Telecommunications Union-

Telecommunication Standardization Sector (ITU-


T) - defines standards for video compression, Internet
Protocol Television (IPTV), and broadband
communications, such as a digital subscriber line
(DSL)
Network layer source and destination addresses - Responsible
for delivering the IP packet from original source to the final
destination.
Data link layer source and destination addresses – Responsible
for delivering the data link frame from one network interface card
(NIC) to another NIC on the same network
Standards for UTP are established by the TIA/EIA. TIA/EIA-568
standardizes elements like:
 Cable Types
 Cable Lengths
 Connectors
 Cable Termination
 Testing Methods

Electrical standards for copper cabling are established by the IEEE,


which rates cable according to its performance. Examples include:
 Category 3
 Category 5 and 5e
 Category 6
1. Enterprise Networks - Used for backbone cabling
applications and interconnecting infrastructure devices
2. Fiber-to-the-Home (FTTH) - Used to provide
always-on broadband services to homes and small
businesses
3. Long-Haul Networks - Used by service providers to
connect countries and cities
4. Submarine Cable Networks - Used to provide
reliable high-speed, high-capacity solutions capable of
surviving in harsh undersea environments at up to
transoceanic distances.
Wireless Standards:
 Wi-Fi (IEEE 802.11) - Wireless LAN (WLAN) technology
 Bluetooth (IEEE 802.15) - Wireless Personal Area
network (WPAN) standard
 WiMAX (IEEE 802.16) - Uses a point-to-multipoint
topology to provide broadband wireless access
 Zigbee (IEEE 802.15.4) - Low data-rate, low power-
consumption communications, primarily for Internet of Things
(IoT) applications

In general, a Wireless LAN (WLAN) requires the following


devices:
 Wireless Access Point (AP) - Concentrate
wireless signals from users and connect to the
existing copper-based network infrastructure
 Wireless NIC Adapters - Provide wireless
communications capability to network hosts

You might also like