COS2626 Exam Notes
COS2626 Exam Notes
c. Communications Services
Same network to deliver multiple types of communications (Video, voice, fax) is
convergence. Unified communications (UC) is centralized management of multiple
network-based communications. Use one software program to manage all the
applications.
- Conversational voice: (VoIP) allows voice conversation over network, use
point-to-point model, not client-server model, so each computer involved is
independent from the other computers. Conference call use point-to-
multipoint model with transmitter and multiple transceivers.
- Streaming live audio and video: video teleconference (VTC) like Skype or
Google Talk, point-to-point model. Watching live sport is client-server model,
client server called multicast distribution. Session layer protocol to transmit
audio and video in conjunction with VoIP is RTP (Real-time Transport
Protocol)
- Streaming stored audio or video: like videos on YouTube, client server model.
Voice and video transmission are delay sensitive- don’t want to hear breaks in
conversation. Loss of data can be tolerated (skipping a frame) = loss tolerant.
Operating system control how users and programs get access to resources on network using:
How it works:
Each computer has its own local account that works on that computer, each computer
has a list of the users and their rights on that PC, windows then allows a user to access
local resources. Using a homegroup, each computer shares files, folders, libraries and
printers with other computer in that homegroup. The homegroup limits how sharing
can be controlled for individual users.
Advantages:
b. HVAC Systems
Plenums or raised floors. Provide for network cabling, server rooms hotter
c. Protecting Against Static Electricity
Static electricity (or ESD Electrostatic Discharge) is an electrical charge at rest, 10 volt
can damage a component.
Components grounded inside computer case
NIC can be damaged by static electricity.
Catastrophic failure destroys beyond use, upset failure shorten the life of component
and cause intermittent errors.
Wear ESD strap around waist that clips onto the chassis of the computer case, it
eliminates any ESD
d. Installation safety.
Lifting heavy equipment.
Rack installations .
MAC Address
MAC address is stamped on the NIC card. Hexadecimal number, 48bits long, separated by
colon. First 24 bits (00:60:8C) is OUI (Organizationally Unique Identifier) or block ID/
company ID, identifies NIC’s manufacturer, is assigned by Institute of Electrical and
Electronics Engineers.
Last 24 bits of MAC address is extension identifier or device ID, identifies the device.
Time to Live field: how long a record should be saved in cache, included in zone
transfer. Depends on how volatile(how often IP address will change)
Class D: 1st octet = 224 – 239 used for multicasting, like video conferencing.
Class E: 1st octet = 240 – 254 reserved for research.
Address starting with 127 reserved for loopback and research addresses.
Reserved IP addresses:
255.255.255.255: Broadcast messages by TP/IP background processes, read by
every node
0.0.0.0: Not assigned
127.0.0.1: Own computer, loopback address.
Types of IP addresses:
Unicast address: single node on network
Global address: can be routed on the internet, similar to public IPv4
addresses.
Link local addresses: used to communicate with nodes in the same
link.
Tunneling
Network configured to use both IPv4 and IPv6protocols, it is dual stacked. Where dual stacking
is not used, tunneling is used, like with Internet.
6to4: most common protocol. IPv6 addresses indented to use this protocol always start
with same 16bit prefix: 2002::/16. Next 32bits are sending host’s IPv4 address.
ISATAP: Intra-Site Automatic Tunnel Addressing Protocol, works on single organizations
intranet.
Teredo:IPv6 addresses intended to use this protocol starts with 2001, written as
2001::/32
b. ipconfig
IP Configuration information, which local area connections are available on your
computer, which ones are connected, located your connection’s IPv4 or IPv6
address, subnet mask and default gateway.
ipconfig/all gives more detailed information
c. ifconfig
view and manage TCP/IP settings
d. nslookup
Name Space Lookup: query DNS database and find host name of a device. Used to
verify if host is configured correctly
Interactive mode: type nslookup, dos screen prompts for entry
Non-interactive mode: type nslookup plus IP address or domain name.
Chapter 3: How Data Is Transported Over Networks
Sequencing and checksums: TCP sends character string called checksum, the TCP on
destination host generates similar string, if 2 checksums don’t match, destination host
request re-transmittal. TCP also attach sequence number to each segment, if necessary
segments can be re-ordered at destination.
Flow control: process of evaluating right rate of transmission based on how quickly the
recipient can accept it
IPv4 Packets
Version: 4Bits: version of protocol, 4 or 6, looks at this field first, if it can’t read incoming
data, rejects the packet.
Internet Header length (IHL): 4Bits: length of TCP header, min of 20bytes, max of 60
bytes, groups of 20bytes increments.
Differentiated services (DiffServ): 8Bits: inform the router the level of precedence to
apply when processing incoming packet.
Total Length: 16Bits: total length of IP packet, including header and data, max 65 535
bytes.
Identification: 16Bits: Identifies messages to which a packet belongs and enables the
receiving host to reassemble fragmented messages.
Flags: 3Bits: indicate if message is fragmented. If it is, is it the last fragment.
Fragment offset: 13Bits: Identifies where the packet fragment belongs in the incoming
set of fragments.
Time To Live (TTL): 8Bits: maximum duration packet can remain on network before it is
discarded. Set to 32 or 64, each time packet passes a router, TTL is reduced by 1. L When
router receives a packet with TTL = 0, rejects the packet and sends ICMP TTL expired
message back to source.
Protocol: 8 Bits: Identify type of protocol that will receive packet
Header Checksum: 16Bits: receiving host calculate if IP header has been corrupted
during transmission, if message’s checksum does not match calculated checksum when
packet is received, packet is assumed to be corrupt and is discarded.
Source IP address: 32Bits: IP address of source host
Destination IP address: 32Bits: IP address of destination host.
Options: Variable: optional routing and timing information
Padding: Variable: filler bits to ensure header is multiples of 32 bits.
Data: variable: data sent by source host + TCP or UDP header in transport layer, data is
encapsulated by header.
IPv6 Packets
b. Routing Tables
Database that maintain information about where hosts are located and best way to
reach them. Router relies on routing table to figure out best paths. It contains IP address
and network masks
e. Routing Metrics
Routers use properties of the route, routing metrics, to determine the best path
Hop count
Theoretical bandwidth and actual throughput of path
Latency (delay)
Load (traffic) of processing
MTU (maximum transmission unit) or largest IP packet size in bytes allowed by
routers, without fragmentation and excluding frame size on local network.
Routing cost: value assigned to route by network administrator. More desirable
paths = less cost
Reliability of path, based on historical performance.
Topology of network.
f. Routing Protocols
Used by routers to communicate. Methods to judge routing protocols:
AD (Administrative distance): each routing protocol is assigned a default AD,
number indicate protocols reliability. Lower value = higher priority.
Convergence time : time it takes to see best path
Overhead: burden placed on network to support protocol.
EGP (exterior gateway protocols): border and exterior routers. BGP is a EGP,
only routing protocol that communicates across internet.
All routing protocols has own way of calculating best route, their information can be shared
among routers, done through manual process called route distribution.
OSPF (Open Shortest Path First): interior and border router. No hop limits. , use complex
algorithm to determine best path. Optimal conditions best path is most direct path, in
case of traffic, best path is most efficient path.
IS-IS (Intermediate System to intermediate system): interior systems only.
BGP: cross-country. Path-vector routing protocol. Speed up routing by grouping
networks together based on IP routing prefix and common network administrator (ISP),
can be identified by ASN (Autonomous System Number) = work similar to IP addresses,
identify individual nodes on computer.
- nbtstat: NetBIOS
- nbstat –A to get NetBIOS name of MAC address.
- tracert: Windows: uses ICMP echo to trace path from one network node to
another, show hops in between
- traceroute: Linux, Unix, OS X same concept but sends UDP message to random
port on destination node
- pathping: windows: ping and tracert combined. Provide deeper info about
network issues along a path.
c. Device Management
Labelling and naming conventions.
Suppression
d. Rack Systems
Two-post rack and four-post rack
Racks are measured in rack units (RU or U) industry standard is 42U tall – 6 feet
Half-racks: 18U – 22U tall.
Airflow – hot air rising
- iSCSI (internet SCSI) (i-scuzzy). Transport layer protocol that runs on top of TCP
to allow fast transmissions over LANs, WANs and internet. Can work on twisted
pair Ethernet network with ordinary Ethernet NICs.
are not expensive, can run on existing Ethernet LAN by installing the iSCSI
software (iSCSI initiator)
a. Power Management
Blackout(complete out) or brownout (dimming)
Power Flaws:
- Surge: momentary increase in voltage du to lighting strikes, solar flares,
electrical problems.
Plug computer into a surge protector, it redirects excess voltage away
from device to a ground
- Noise: fluctuation in voltage levels cause by other devices on network or EMI.
Pass circuit through electrical filter to make clean from noise.
- Brownout: momentary decrease in voltage, sag. Overloaded system causes it.
- Blackout: complete power loss:
Install backup power source, UPS, to provide power long enough to
shut off. (Uninterrupted power supply)
Installing NIC:
On windows use device manager to set this, Linux or unix, the ethtool utility.
c. Ethernet Frames
Ether net is layer 2 standard (data link layer) that is flexible, running on variety of network
media, excellent throughput, reasonable cost. Most popular network technology used on
LANs
Ethernet II is current Ethernet standard, developed by DEC, Intel and Xerox
Legacy networking:
IEEE release first Ethernet standard in 1980, called IEEE802.3 CSMA/CD, unofficially called
Ethernet.
CSMA/CD frame used different layout than Ethernet ll frame used today, was called 802.3
frame. Frame today called DIX frame. CSMA/CD networks used hub at physical layer. Hubs
repeat signals to all nodes like a broadcast, collision happened. All nodes connected to the
hub competed for access to the network. The MAC (Media Access Control) method used
by the nodes for arbitration on the network is CSMA/CD (Carrier Sense Multiple Access
with Collision Detection) carrier sense = refer to ethernet NIC listening and waiting until
there is a gap from nodes transmitting data. Multiple access = several nodes accessing the
same media. Collision detection = what happens when 2 nodes attempt a transmission at
the same time. After a collision, each node waits a random amount of time and resent
their transmission. Collision domain is portion of the network in which collisions could
occur.
1. Transmission Basics:
a. Analog Signalling.
Digital signals is electrical current, pressure measure in volts, travel over copper cabling as
electrical current, fibre optic cable as light pulses, through atmosphere as electromagnetic
waves.
Analog also generated as voltage, but varies in strength: Amplitude, frequency, wavelength
and phase.
c. Data Modulation
It is a technology used to modify analog signals to make them suitable for carrying data over
a communication path. A simple wave, called carrier wave, is combined with another analog
signal (the data wave) to get a unique signal that gets transmitted from one node to the next.
The carrier wave as pre-set properties (frequency, amplitude, and phase) and is only to help
carry information. The data or information wave is added to the carrier wave. When the signal
reaches its destination, the receiver separates the data from the carrier wave.
A modem does the translation of the analog to digital (modulator/demodulator) and back to
analog at the receiving end.
Baseband: transmissions that are carried on single channel, no other transmission shares the
media. Eg.: ethernet.
Broadband: technology where multiple transmissions share single media. Cable TV, cable
Internet where they share the same coaxial cable, uses multiplexing to manage multiple
signals.
- Multiplexing:
Multiple signals travelling simultaneously over one medium, the mediums channel is
separated into multiple smaller channels, sub channels. Get different types of
multiplexing, dependant on what the media, transmission and reception can handle.
For multiplexing you need a multiplexer (mux) at the transmission end of the channel,
it is a device that combines many signals. On the receiving end you need a
demultiplexer (demux) that separates the combined signals.
TDM (Time Division Multiplexing): divide a channel into multiple intervals of time,
assigns time slots to every node. If the channel does not have data to send, it wastes
time.
2. Coaxial cable
RG specifications (Radio Guide) measure materials used for shielding and conducting cores,
which influence on transmission characters, impedance (resistance that contributes to
controlling the signal, in ohms) attenuation and throughput.
Every type of coax is suited for different purpose. Size of conducting core in coaxial cable is
American Wire Gauge(AWG) size. Larger AWG size, smaller core
RG-6 and RG59 is 2 coaxial cable types most commonly used in networks today. Can terminate
with 2 types of connectors:
- F-type: The pin in the centre of the connector is the conducting core of the cable so requires
the cable to have solid metal core. Attached to cable by crimping or compression, then
threaded and screwed together like nut and bolt assembly.
Male type F-type connector(in picture), attaches to the female F-type.
- BNC connector connects to another BNC connector with turning and locking mechanism.
Does not use the central conducting core of the cable as part of this connection, provide
own conducting pin. Found mostly with RG-59
3. Twisted-Pair Cable
Color-coded pairs of insulated copper wires with diameter of 0.4 to 0.8. Every 2 wires are
twisted around each other to form pairs. All pairs are encased in plastic sheath. More twists per
foot = more resistance to cross talk. Higher quality , more expensive has more twists. Too high
twist ratio increases attenuation, so has to get a good balance.
Can contain 1 to 4200 wire pairs. Modern networks use cables that contain 4 wire pairs, 1
dedicated to sending and one to receiving data.
TIA/EIA 568 standard divides twisted pair wiring into categories: Cat 3, 5, 5e, 6, 6a and 7.
Modern LAN uses cat 5e or higher.
i. Cat 3: Form of UTP that contains 4 wire pairs and can carry up to 10 Mbps with
bandwidth of 16MHz. Used for 10 Mbps Ethernet or 4 Mbps token ring networks.
ii. Cat 5: form of UTP that contains 4 wire pairs and supports up to 1000Mbps throughput
and 100 MHz signal rate.
iii. Cat5e: (Enhanced Cat5): higher grade version of Cat 5. Contains high quality copper,
high twist ratio and advance methods to reduce cross talk. Signal rate as high as 350MHz
iv. Cat6: twisted pair cable that contains 4 wire pairs, each wrapped in foil insulation and
foil insulation covers the bundle of wire pairs.
v. Cat 6a: (Augmented Cat 6): higher grade version of Cat 6 wiring that reduces attenuation
and cross talk and allows for potentially exceeding traditional network segment length
limits. Signalling rate of 500MHz, backward compatible with Cat 5, 5e and 6 (replace
lower level cabling without requiring connector or equipment changes).
vi. Cat 7: twisted pair cable that contains multiple wire pairs, each surrounded by its own
shielding, then packaged in additional shielding beneath the sheath. Can support signal
rates up to 1GHz but requires different connectors than other versions of UTP because
must be more isolated from each other to ward off cross talk.
vii. Cat 6 and Cat 7 are more similar to shielded twisted pair.
Throughput Both transmit data at 10 Mbps, 100 Mbps, 1 Gbps, 1- Gbps, depends on
grade of cabling and transmission method.
Noise immunity More resistant because of Can undergo filtering and balancing
shielding techniques to counteract effects of
noise.
Size and 100m max segment length, 100m max segment length,
scalability maximum of 1024 nodes maximum of 1024 nodes
Cable pinouts.
2 methods to of inserting twisted pair wires into RJ45 plugs: TIA/EIS568A and
TIA/EIA568B.Use same standard on every plug on network
Using the same standard on every plug on the network ensure you create a straight-through
cable, or patch cable.
Crossover Cable:
Mostly obsolete because modern devices have autosense function to detect the way wires are
terminated. Transmit and receive cables are reversed, works with 10 or 100Mbps Ethernet.
Rollover cable:
Also called Yost cables or Cisco console cables, mirror image. Ethernet ports allow for network
communication, tube of port used to create LANs through router, creates interface with the
device itself.
Copper connectors and couplers
Connector connects cable to network device, they are specific to a media type, integrate
2 media types through converters – the hardware that enables different media devices
to connect.
Examples: Coupler: passes data through homogenous connection without modification
UTP coupler connects 2 UDP cables
Benefits of fiber:
- High throughput
- High resistance to noise
- Excellent security
- Carry signals for longer distances before needing a repeater
- Industry standard of high-speed networking.
Disadvantage:
- More expensive than twisted pair cables
- More difficult to fix broken cables in field.
100Base-FX: fiber version of Fast ethernet, baseband transmission, mostly outdated, needs at
least 2 strands of multimode fiber.
1000Base-LX: more common fiber version of Gigabit Ethernet, long wavelength, used as
backbones because of long segments
1000Base-SX gigabit Ethernet with short wavelengths, multimode fiber-optic, less expensive
than LX. Modal bandwidth is measure of highest frequency of signal a multipmode fiber can
support over a specific disctance
IEEE published 802.3ae standard for fiber-optic ethernet, transmitting data at 10Gbps. Used by
NSP’s who sell direct access to internet backbone and ISPs
- Noise: influence that degrade or distort a signal. Measured in decibels (dB), can be
prevented by having strength of signal exceeding strength of noise or good cable design.
EMI: (Electromagnetic interference): waves that originate from electrical devices, one
type is RFI (radio frequency interference) caused by radio waves. Result in incorrect
transmission of data.
cross talk when signal travelling on one cable interfere with the signal travelling on
adjacent wire. When it occurs between 2 cables it’s called alien cross talk, when it
occurs wire pairs near the source of the signal, its known as NEXT (near end cross talk)
and could be improper termination. Crosstalk measured at far end of cable: far end
cross talk (FEXT).
- Attenuation: loss of signal strength, use amplifier to increase strength of signal, repeater
to regenerate digital signal. For analog signals an amplifier is used for this. The signal passes
through the amplifier and it increases the voltage of the signal
For digital signals a repeater is used which regenerates the signal.
- Latency: the time it takes for the data to travel over a medium. The delay is latency.
Length of cable affects latency. Can measure latency by calculating a packets RTT (Round-
trip time), measured in milliseconds.
Common fiber cable problems:
- Fiber type mismatch: fiber core mismatch, when connecting SMF to MMF the
cable will prevent transmission from traversing the connection successfully.
- Wavelength mismatch: SMF, MMF and POF (Plastic Optical Fiber) use
different wavelengths, mismatch is when transmission is optimized for one
type of cable but sent through a different type.
- Dirty connectors: dirty fiber, or dusty, will lose signal.
b. Troubleshooting Tools
Tone generator (toner): issue a signal on wire pair, tone locater (probe) emits a tone when it
detect electrical activity on a wire pair.
Multimeter measure characteristics of electric circuit like resistance, voltage, impedance
Cable continuity testers troubleshoots a physical layer problem.
Chapter 6 : Wireless Networking
b. Antennas
Antennas designed for specific wireless service.
Radiation patter is relative strength over a 3-dimentional area of all electromagnetic
energy antenna sends or receive.
Unidirectional/directional antenna issues wireless signals along single direction
Point-to-point link, satellite downlink (receive digital TV signals)
Omnidirectional antenna sends and receive equal strength and clarity signals both
directions.
Range: geographical area an antenna can reach
c. Signal Propagation
LOS (line of sight) ideal: signal travel in straight line
- Reflection: (bounce) wave reflect on obstacle.
- Diffraction: signal splits, objects with sharp edges.
- Scattering: diffusion or reflection in multiple directions, object with small
dimensions. hail, snow, rain, books computers causes it
Multipath signals: signal follow multiple paths due to reflection, diffraction and
scattering. Can help to get signal to destination but can also cause multiple signals to
reach destination at different times causing data error. Error-correction algorithms
detect errors and sender will have to retransmit signals. , more errors = slower
throughput
d. Signal Degradation
Fading: signal run into obstacle and looses strength.
Goodput: the throughput experienced at the application level
Speed test sites measure upload and download speeds
Range extender is like amplifier, strengthens signal again if it moves to far from origin
SNR (Signal-to-noise) The proportion of noise to the strength of a signal.
e. Frequency Ranges
2.4GHz band: network relied on frequencies in the rand of 2.4 - 2.4835 GHz, had
11communication channels. Carried cordless telephone signals, highly susceptible to
interference.
Unlicensed frequency is one for which the FCC does not require users to register their
service and reserve it for their sole use.
Wireless LANs can use 5 GHz band: comprises 5.1, 5.3, 5.4, 5.8 GHz frequency bands,
consist of 24 unlicensed bands, each 20MHz wide
Hidden node problem: when nodes are physically too far apart to collaborate in preventing
collisions.
RTS/CTS (Request To Send/Clear to Send):
Enables a source node to issue an RTS signal to an access point, requesting to transmit, access point
agrees with CTS signal, access point temporarily suspends communication with all stations in its
range and waits for source node to complete transmission
Association:
Connecting through a hotspot through association. When station is on and wireless protocols
running: from time to time scan surroundings for evidence of access point, called scanning.
Active scanning: computer transmits special frame - probe - on all available channels within its
frequency range, when an access point finds the probe frame, it issues a probe response. The
response contains all info a computer needs to associate with access point (status code and station
ID number)
Passive scanning: computer listens on all channels in its frequency range for special signal – beacon
frame – issue from access point. Beacon frame has info that the wireless node needs to associate
with the access point, indicate network’s transmission rate and SSID (Service set identifier) – unique
character string to identify access point. After detecting beacon frame, computer can choose to
associate with access point. 2 nodes agree on frequency channel to communicate on.
Group of stations (nodes) sharing an access point are part of BSS (Basic Service Set)
Identifier of this group = BSSID (Basic Service Set Identifier)
ESS (Extended Service Set) = Group of access points connected to the same LAN
ESSID (Extended Service Set Identifier) = BSS’s that belong to same ESS share special identifier.
Rogue access point: wireless access point that has been installed on a secure network without
authorization from local network administrator, could be hacker trying to steal data or
unintentional, but will put your data at risk.
Reassociation: when mobile user moves out of one access point range into another and its device
reassociate to the network.
Unique to 802.11 frame is Sequence Control field that shows how a large packet is fragmented,
happens in the data link layer for 802.11 and handled by the MAC sublayer. On wire TCP/IP error
checking was on Transport layer and packet fragmentation on Network layer.
Wireless Innovations: innovations that makes 802.11 faster and more reliable:
- MIMO (Multiple Input-Multiple Output): first with 802.11n, multiple antennas on access
point may issue signal to one or more receivers
- MUMIMO (multiuser MIMO) newer than MIMO: multiple antennas to service multiple
clients simultaneously, will be available in 802.11ac wave 2.
- Channel boding: 802.11n: 2 adjacent 20MHz channels can be combined/bonded to make a
40MHz channel. Channel bonding better suited on 5GHz band because it is less crowded
and has more channels.
- Frame Aggregation: 802.11n combine multiple data frames into one larger frame.
o Aggregated Mac Service Data Unit (A-MSDU)
- Aggregated Mac Protocol Data Unit (A-MPDU): default for 802.11ac
Deployment Models
- Public Cloud: Service provided over public transmission lines: Internet.
- Private Cloud: Services on organizations own data center.
- Community Cloud: service shared between multiple organizations
- Hybrid cloud: combination of other services.
Remote Access
Remote access methods:
1. Point-to-Point Remote Access : dedicate line, like DSL or T-1 access to an ISP
2. VPN(Virtual Private Networks) Virtual connection between client and remote network
3. Remote virtual computing (remote terminal emulation): remote client to take over and
command a host computer. Telnet, SSH, Remote Desktop, Virtual Network Computing
(VNC)
All require type of remote access server (RAS) to accept a remote connection and grant
privileges to the network resources. 2 types of RAS:
1. dedicated devices: Run software that performs authentication for clients to access
resources and internet.
Software running on a server: Direct Access is a service in Windows server 2008 that
automatically authenticate remote users
GRE (Generic Routing Encapsulation) developed by Cisco. Used to transmit PPP data frames
through the tunnel. PPTP establish the VPN tunnel, GRE then encapsulates the PPP frame
to take temporary IP packet identity. Layer 3. The WAN sees messages that look like IP
traffic, at the end of the tunnel the original protocols that was wrapped in the GRE is seen.
IPsec is an encryption protocol that increase the security of the transmissions
Windows, Unix, Linux and Mac OS capable of connecting to VPN, but no longer secure, L2TP
recommended.
- L2TP: (Layer 2 Tunneling Protocol): VPN tunneling protocol, based on technology from
Cisco, standardized by IETF( Internet Engineering Task Force) – organization of volunteers
who help develop Internet Standards. L2TP encapsulates data like PPTP, differences are:
o L2TP is a standard accepted and used by multiple vendors
o L2TP can connect 2 routers, router and remote access server or client and remote
access server.
Key Encryption
Private Key encryption data encrypted with one key the sender and receiver know. Aka
symmetric encryption.
Public key encryption: data encrypted using 2 keys, one key only known to user(private key)
other is a public key associated to the user. Can get public key by asking for it, or from 3rd party
source, public key server, key pair, asymmetric encryption.
Digital certificate: small file with info about user and user’s public key, maintained by certificate
authority (CA), use of certificate authorities to associate public keys with users is called PKI
(Public Key Infrastructure)
SSL VPN
VPN that is configured to support SSL transmissions to and from services running ont is
protected network. Accessed by user through web browser
2. Authentication Protocols
The rules that computers follow to accomplish authentication
a. RADIUS and TACACS+
AAA: Authenticate a client’s identity by asking username and password, authorise a
user for certain privileges on a system and keep account of the client’s system and
network usage.
Radius(Remote Authentication Dial-In User Service) is service that runs AAA. Radius can
operate as a software application on a remote access server, called RADIUS server, used
by ISP’s. Runs on Application layer, transported over UDP in Transport layer. Only
encrypts the password.
Protocols in AAA:
PPP (Point-to-Point Protocol) is on data link layer provide the foundation for direct
connections but does not secure authentications, it establishes a link with a server.
PAP(Password Authentication Protocol): After link has been established using PPP, PAP
authenticates request with user credentials. If credentials match the server responds
with acknowledgement of authentication and grants the client access to secured
resources. Simple authentication but not very secure, it does not encrypt the
credentials, rarely used.
e. TKIP (Temporal Key Integrity Protocol) and EAS (Advanced Encryption Standard)
802.11i include subset standard WPA and uses 802.11X(EAPoL) to authenticate devices
and dynamically assigns every transmission its own key. WPA relies on an encryption
key generation and management scheme known as TKIP. WPA2 improved the security
of WPA with AES which provides faster and more secure encryption than TKIP.
f. Kerberos
Cross-platform authentication protocol that uses key encryption to verify client ID,
private key encryption service, NOS client-server logon process assumes a client is who
they say they are and only verify usernames and passwords, Kerberos also wants clients
to prove IDs through third party, all communication is encrypted.
KDC(Key Distribution Center): the server that issues keys to clients during initial client
authentication
AS (Authentication Service) the process that runs on KDS to initially validate a client
Ticket: a temporary set of credentials that a client uses to prove that its identity has
been validated
Principal: a Kerberos client or user
TGS(Ticket Granting Service): Application running on KDC, separate from AS, TGS issues
a TGT (Ticket granting ticket)
g. SSO (Single Sign-On)
Multifactor Authentication (MFA): 2 pieces of information to get access, 3 categories:
Knowledge: something you know, like password
Possession: something you have, like ATM card
Inherence: something you are, like fingerprint.
b. Misconfigurations
Chapter 8: Network Risk Management
1. Security Assessment
Data Breach: unauthorized person gains access to network.
Posture assessment: thorough examination of each aspect of the network to determine how it
might be compromised. At least annually, preferable quarterly and after making big changes to
network.
Security Audit if posture assessment was done by qualified consulting company
2. Security Risks
Hacker: someone who masters inner workings of software and hardware
Vulnerability : a weakness in the system, process or architecture
Exploit: act of taking advantage of the vulnerability.
Zero-day exploit/ zero day attack on exploit or attack that is not yet public, only the hacker
knows about it.
Router receive packet > examines packet and refer to ACL to see if packet meets criteria for
permitting/denying travel on network.
Each statement in ACL is a permit or deny flag, router starts at top of list and make test based
on first statement. Packet characteristics match a permit statement, move to network, match
deny statement, packet discarded, don’t match statement, move down the list to next
statement on ACL. Last statement still no match, implicit deny rule, denied by default.
On most routers, each interface must be assigned an ACL, associated with inbound and
outbound traffic. When ACLs are installed on routers, each one is assigned a number and name.
Access-list command used to assign statement to already-installed ACL. The command must
identify the ACL and include a permit or deny argument
Examples of the ACL named acl_2 statements:
- To permit ICMP traffic from any IP address or network to any IP address or network:
access-list acl_2 permit icmp any any
- To deny ICMP traffic from any IP address or network to any IP address or network:
access-list acl_2 deny icmp any any
- To permit TCP traffic from 2.2.2.2 host machine to 5.5.5.5 host machine:
access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5
- To permit TCP traffic to destination Web port 80 (eq www) from 2.2.2.2 host machine to
3.3.3.3 host machine:
access-list acl_2 permit tcp host 2.2.2.2 host 3.3.3.3 eq
www
Statements can specify network segments by using wildcard mask (network address for the
segment). 0 in wildcard mask = match the IP address bits to network address, 1 = IP address
bits does not matter.
Example: wildcard mask of 0.0.0.255 = 00000000. 00000000. 00000000.11111111 this means
that the first 3 octets of the IP address must match the given network address. The last octet
can be any value.
No ACL installed = router allows all traffic through. More statements can slow down router. If
ping works but traceroute does not, start looking at ACLs for problem.
e. Firewalls
Network based firewall: Protect whole network, placed externally to private network,
traffic routed.
Virtual wire mode: transparent to surrounding nodes, as if part of the wire
Host-based firewalls: protect computer they are installed on.
Packet-filtering firewall: router that examines every packet it receives / inbound traffic
(or outbound traffic) to determine if packet is authorised
Criteria for packet-filtering to accept/deny traffic:
- Source or destination IP addresses
- Source and destination Ports
- Flags set in the TCP headers
- Transmissions that use the UDP or ICMP protocols
- Packet’s status as the first packet of data stream
- Packet’s status as inbound or outbound from private network.
Unified Threat Management (UTM) combines multiple layers of security appliances and
technologies into a single safety net. Next Generation Firewalls (NGFW) have built-in
Application Control features that are application aware, they can monitor and limit the
traffic of specific applications, also includes IDS / IPS and user awareness (adapts to
class of specific user/user groups. Can also be context aware (adapt to various
applications, users, devices)
SOHO wireless router: acts as firewall and packet filtering options.
Firewall fails because of misconfigurations.
Packet-filtering firewalls operate at Network layer and examine only network
addresses, they do not know if the user is authorised or not.
f. Proxy Servers
Proxy servers combined with packet filtering firewall make Network and Transport layer
security better. Proxy service is software application on network host that acts as
intermediary between external and internal networks. Screen all incoming and
outgoing traffic, network host that runs proxy service is proxy server. Manage security
in Application layer. Another filtering device for internal LAN, protecting outside world
to learn addresses of internal network. Data frames goes through proxy, it re-package
it and adds its own IP address
Reverse proxy: provides services to Internet clients from servers on its own network,
identity protection to server not client, application layer firewall protection
Tools:
- Nmap: scan large networks and give info regarding its hosts
- Nessus: (Tenable security) more sophisticated results than Nmap,
unencrypted, sensitive data like credit card numbers that is saved on
network’s hosts, known as a penetration testing tool
- Metasploit: combines known scanning techniques and exploits to explore
potentially ne hybrids of exploits.
b. Anti-Malware Software
Should perform these functions:
- Signature scanning: a comparison with files content with known malware
signatures
- Integrity checking: compare current characteristics of files and disks
against archived version of these files to discover changes.
- Monitor unexpected file changes
- Receive regular updates and modifications from centralized network
consol.
- Report valid instance of malware, not false alarms. Heuristic scanning
report false alarms, it scans for malware-like behaviour.
c. Anti-Malware Policies
- All computes should have them
- Users cannot change it
- Users should not be able to install unauthorised software
Chapter 9: Unified Communications and Network Performance Management
1. Fundamentals of Network Management
Network management is the assessment, monitoring and maintenance of all aspects of a
network.
a. Baseline Measurements
Baseline: report of network’s current state of operation. Baseline measurements
include utilization rate of network backbone, users logged on, protocols that run,
statistics of errors. Allows to compare future performance increases or decreases
b. Policies, Procedures and Regulations
Assist with decisions about network, guidelines for decision making.
e. Caching
It is the local storage of frequently needed files. ISP’s use technique Web caching:
frequently used webpages are stored on a server at the ISP rather than on the Web.
c. Signalling Protocols
Signalling is exchange of information between components of network in order to
establish, monitor, release connections for VoIP and video-over-IP. Signalling protocol
can:
- Detect presence of user (available, busy etc
- Request a call or video conference
- Locate clients on the network and determine best routes to them
- Acknowledge a request and establish a connection
- Managing ring, dial tone, call waiting
- Detect and re-establish dropped call or video transmission
- Properly terminate a call or videoconference.
H.323 is an ITU standard: describes an architecture and group of protocols for
establishing and managing multimedia sessions
- H.323 terminal: any node that provides audio, visual and data information to
another node.
- H.323 gateway: a device that provides translation between network devices
running H.323 signalling protocols and devices running other types of signalling
protocols
- H.323 gatekeeper: a nerve centre for networks that adhere to H.323. they
authorise and authenticate terminals and gateways, manage bandwidth and
oversee call routing, accounting and billing
- MCU (Multipoint control unit): a computer that provides support for multiple
H.323 terminals
- H.323 zone: a collection of H.323 terminals, gateways and MCUs that are
managed by a single H.323 gatekeeper.
SIP (session Initiation Protocol): like H323, application layer signalling and control
protocol for multiservice, packet based networks, travels over TCP or UDP
MGCP (Media Gateway Control Protocol
d. Transport Protocols
RTP (Real-time Transport Protocol)
b. Fault Tolerance
c. Data Backup
Chapter 10: Network Segmentation and Virtualization
c. Why Subnets
When network grows, to better manage network traffic it can be divided that a floor is
a single LAN, the pool of IP addresses must then be divided per LAN, using subnetting.
You borrow a bit from the host portion of IP address, more subnetting less hosts per
subnet.
Class C
e. Supernetting
Supernetting or classless routing or IP address aggregation: combine adjoining
networks that uses the same CIDS block into one supernet. (route aggregation or route
summarisation)
- Reduce number of routing table entries by combining several entries
- Single network made up of more than one Class C license.
-
f. Subnetting in IPv6
IPv6 is classless, prefix mask
2. Virtualization
Imitation of all or part of a computer network
Physical computer is host
VM is guest
Software that define VM and manages resource allocation is virtual machine manager /
hypervisor.
Advantages:
- Efficient use of resources
- Cost and energy savings
- Fault and threat isolation
- Simple backups, recovery and replication
Disadvantages:
- Compromised performances
- Increased complexity
- Increased licensing cost
- Single point of failure
b. Switch Configurations
c. Wireless VLANs
1. WAN Essentials
WAN sites: individual geographic locations or endpoints connected by WAN
WAN link is the connection between them
2. WAN Topologies
a. Bus Topology
b. Ring Topology
c. Star Topology
d. Mesh Topology: Full mesh and partial mesh
e. Tiered Topology WAN: layered star or ring connections
4. T-Carriers
T-carrier standards / v T-CXR standards, specify method of signalling, Physical layer. Uses TDM
(Time division multiplexing) over 2 wire pairs (1 transmits. 1 sends). Single channel divided into
multiple channels. 1 T-1 circuit can carry 24 channels of 64Kbps (1.544 Mbps)
a. Types of T-Carriers
Signal level is T-carrier’s Physical layer electrical signalling characteristics, defined by ANSI
standards. Ex DS0 = Digital Signal level 0
b. T-Carrier Connectivity
Wiring: STP is preferred, less noise and attenuation. Fiber Optic for multiple T-1’s
Cable termination: copper cable carrying T1 terminate with RJ-48. Demarc point the RJ-
48 terminates in a smart jack, type of NIU.
CSU/DSU (Channel Service Unit / Data Service Unit) CSU is termination for digital signal
and ensures connection integrity through error correction and line monitoring. DSU
converts the T-Carrier frames into frames the LAN can interpret. Can be separate device
or expansion card on router
5. Frame Delay
Layer 2 protocols defined by ITU and ANSI. Today it is a data link protocol.
Data is separated into frames, relayed from one node to th next. Frames carry identifier called
datalink connection identifier (DLCI).
Supports 2 types of virtual circuits:
- SVC (Switched virtual circuit): SVCs are connections that are established when
2 parties need to transmit, terminate after completion of transmission.
- PVC(Permanent Virtual circuit): connections is established before data needs to
be transmitted and maintained after it is complete. Connection is between 2
points and does not specify the exact route the data will travel.
CIR (Committed information rate): guaranteed minimum amount of bandwidth a ISP provide.
6. DSL (Digital Subscriber Line)
a. Types of DSL
Downstream: data traveling from carrier switching facility to customer
Upstream data travel from customer to carrier switching facility.
xDSL: All DSL verities
ADSL: Asymmetric DSL: download speed faster than upload speed
G.Lite: Version of ADSL
VDSL: Very high bit-rate or data rate DSL
SDSL: Symmetric or single line DSL: upstream and downstream have same speed.
HDSL: High bit-rate DSL
SHDSL: Single line high bit-rate DSL
Modulation: DSL offer type of modulation. ADSL and VDSL create multiple narrow
channels in higher frequency range to carry more data, splitter needed at carrier and
customer end to separate data from voice signal.
b. DSL Connectivity
DSL modem
7. Broadband Cable
b. Cellular
First generation, 1G, 1970-1980: analog
Second generation. 2G: 1990, digital transmission
Third generation, 3G: early 2000, used packet switching, rates up to 384 Kbps on data
(not voice)
Fourth generation, 4G: 2008, all IP, packet switched network for data and voice.
c. Satellite
3. Change Management
a. Software and Hardware Changes
b. Change Management Documentation