Networks
What is a network?
A network consists of two or more computers that are linked in order to share resources, exchange files, or allow electronic communications.
Networks are commonly discussed in terms of the geographical area that they cover common terms used are:
Personal area network (PAN): This network is formed of mobile devices that are connected to allow them to communicate over a short distance, such as a mobile phone connected to a wireless headset.
Local area network (LAN): The network is confined to a small geographical area such as an office or home.
Wide area network (WAN): An example of a WAN is the Internet, where multiple networks are interconnected to allow the global exchange of data. In the context of an organisation, the WAN could be made up of distinct networks in different countries.
Servers, workstations and hosts
Workstations are also known as clients in a Windows or Linux based environment
Servers are used to provide centralised control and make network services available to client systems. Servers commonly have specialised operating systems installed to enable this functionality.
A host is any device such as a server, workstation or printer that is connected to a network to allow the exchange of data.
Types of network and topologies
Networks can be divided in to two categories: peer-to-peer networks and client-server networks
Peer-to-peer: In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. This type of network is commonly used in small organisations and home networks of less than 10 computers to reduce the complexity of administration.
Client-server networks: Client-server networks are computer networks that use a dedicated computer (server) to store data, manage/provide resources and control user access. Client-server networks are designed to provide centralised administration to a large number of devices that are connected to a network.
Internet/intranet/extranet
The Internet is a global public network consisting of interconnected networks that provides information and communication services.
Intranet is a type of network that utilises internal networks within an organisation to provide a private, secured network to allow access to web based resources and information which are not publicly available.
An extranet is a private network designed to allow clients and external partner organisations to communicate and share information over a secure network. It often results from the need to allow clients to access to information or to interact with information contained on an Intranet.
Network topologies
Wired topologies:
Bus - All of the devices are attached to a single cable.
https://content.cgkpivot.com/images/Types_of_network_02.png
Star - All of the devices are attached to a central device such as a switch.
https://content.cgkpivot.com/images/Types_of_network_03.png
Ring - All of the devices are linked to a cable that forms a circle.
https://content.cgkpivot.com/images/Types_of_network_04.png
Mesh - All of the devices have a direct connection to the other devices on the network.
https://content.cgkpivot.com/images/Types_of_network_05.png
Hybrid - Hybrid topologies combine two or more topologies.
https://content.cgkpivot.com/images/Types_of_network_06.png
Wireless topologies:
Ad-hoc mode - Devices connect without the use of a device such as a wireless router.
https://content.cgkpivot.com/images/Types_of_network_07.png
Infrastructure mode - Devices connect to the network using a device such as a wireless router.
https://content.cgkpivot.com/images/Types_of_network_08.png
Advantage/Disadvantage of topologies
Bus topology advantage: It works very efficient when used in a small network/Length of cable required is less than other topologies/Very cost-effective as compared to other topologies
Bus topology disadvantage: Additional devices slow the network down/If a main cable is damaged the whole network fails/This network topology is very slow as compared to other topologies
Star topology advantage: If one cable or device fails then all the others will still work/No disruptions to the network when connecting or removing devices/Easy fault detection because the link are often easily identified
Star topology disadvantage: More expensive than linear bus topology/Extra hardware is required/If hub goes down everything goes down
Ring topology advantage: Data flows in one direction which reduces the chance of packet collisions/Equal access to the resources/Easy to manage
Ring topology disadvantage: If one workstation shuts down, it affects whole network or if a node goes down entire network goes down/It is Expensive/Difficult to troubleshoot the ring.
Mesh topology advantage: Failure during a single device won't break the network/Fault identification is straightforward/It provides high privacy and security
Mesh topology disadvantage: It's costly as compared to the opposite network topologies/Maintenance needs are challenging with a mesh
The Open Systems Interconnection (OSI) model
https://content.cgkpivot.com/images/The_open_system_interconnect_03.png
The OSI model is a conceptual model that was designed to provide a framework for the development of networking components.
It's based on the concept of splitting up a communication system into seven layers, each one stacked upon the last.
Layers
https://content.cgkpivot.com/images/The_open_system_interconnect_02.png
Data flow through the OSI model
In order for human-readable information to be transferred over a network from one device to another, the data must travel down the seven layers of the OSI Model on the sending device and then travel up the seven layers on the receiving end.
Example:
Mr. Cooper wants to send Ms. Palmer an email. Mr. Cooper composes his message in an email application on his laptop and then hits ‘send’. His email application will pass his email message over to the application layer, which will pick a protocol (SMTP) and pass the data along to the presentation layer. The presentation layer will then compress the data and then it will hit the session layer, which will initialize the communication session.
The data will then hit the sender’s transportation layer where it will be segmented, then those segments will be broken up into packets at the network layer, which will be broken down even further into frames at the data link layer. The data link layer will then deliver those frames to the physical layer, which will convert the data into a bitstream of 1s and 0s and send it through a physical medium, such as a cable.
Once Ms. Palmer’s computer receives the bit stream through a physical medium (such as her wifi), the data will flow through the same series of layers on her device, but in the opposite order.
Layers of the OSI model and associated protocols:
A protocol is a set of rules that govern the transmission of data across a network, each layer of the OSI model has protocols associated with it. The common protocols associated with the OSI layers are shown below.
https://content.cgkpivot.com/images/The_open_system_interconnect_04.png
TCP/IP model
It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike seven layers in the OSI model
https://content.cgkpivot.com/images/The_open_system_interconnect_05.png
Institute of Electrical and Electronics Engineers (IEEE) 802 project standards
The IEEE is a professional association that is dedicated to advancing technology. As a part of this process they have a body that is responsible for setting and updating standards for multiple technologies such as networking. These standards are used to ensure that devices, media and software from different manufacturers are compatible.
Interconnecting components
Various components are required to enable devices to communicate on a local area network.
Network interface cards
Network interface cards (NICs) act as the interface between the media and the device that is being connected to the network. Each NIC has a unique MAC address burnt in to the card by the manufacture.
Media
Cables and connectors
Coaxial cables
Coaxial cables were commonly used in early network technologies, such as bus networks, to connect devices. Today coaxial cables are commonly used to carry cable signals from a wall box or aerial to a TV.
Two grades of coaxial cables were used to implement networks: RG-8 and RG-58.
Twisted-pair cables
There are two forms of twisted cables that are used when implementing networks, unshielded twisted pair (UTP) and shielded twisted pair (STP).
RG-58 coaxial cables
RG-58 cables were also referred to as thinnet cable and are used for short distance communications. They were connected directly to the device's NIC (network interface card) connector.
RG-8 coaxial cables
RG-8 were used to communicate over longer distances than RG-58 cables and were commonly used as a backbone to connect multiple RG-58 networks.
RG-58 coaxial cable characteristics:
Cable type: Thinnet
Cable grade: RG-58
Cable thickness: 0.25in
Maximum distance: 185m
Data transfer rate: 10Mbps
Connector: BNC
RG-8 coaxial cable characteristics:
Cable type: Thicknet
Cable grade: RG-8
Cable thickness: 0.5in
Maximum distance: 500m
Data transfer rate: 10Mbps
Connector: AUI
UTP cabling consists of four pairs of wires that are encased in an outer sheaf, each of the pairs is twisted together to interference from adjacent wires.
.
STP cables have additional shielding added and would be used in an environment where there is significant electromagnetic interference (EMI) being generated by machinery.
Connectors
When used with data communications networks, a registered jack (RJ) 45 connector is used to interface with the NIC. When using twisted-pair cables to connect to a telecommunication network, an RJ 11 connector is used.
Categories of UTP:
Cat 1 - Voice only
Cat 2 - Data - 4Mbps - 100m
Cat 3 - Data - 10Mbps - 100m
Cat 4 - Data - 16Mbps - 100m
Cat 5 - Data - 100Mbps - 100m
Cat 5e - Data - 1Gbps - 100m
Cat 6 - Data - 10Gbps - 55m
Cat 6a - Data - 10Gbps - 100m
Cat 7 - Data - 10Gbps - 100m
Creating a straight-through cable
Equipment:
Ethernet category 5e or 6 cable
RJ-45 Ethernet cable connectors
Wire stripper
Side cutters
Cable crimper
Cable tester
Steps:
Cut the cable to the required length.
Use the wire stripper to remove about one inch of the cable sheaf from the end of the cable.
Separate and straighten out the wires, so they are no longer twisted.
Arrange the wires in the following order:
green/white
solid green
orange/white
solid blue
blue/white
orange
red/white
red.
Make sure the wires lay flat and parallel, with no spaces between them. Trim them evenly, leaving only half an inch sticking out from the uncut cable sheath.
Check that the wires are arranged in the correct colour order.
Hold the RJ-45 connector with the clip facing down and away from you. Push the wires into the plug.
Check that the wires are flat and even at the front of the plug so that they will make a good electrical connection.
Use the crimping tool to squeeze the plug, so the wires are held firmly in place.
Repeat the process with the other end of the cable.
Test the connections using a cable tester.
Fibre optic cables:
Unlike coaxial and twisted-pair cables that utilise copper cables that carry electrical signals, fibre optic cables use a fibre core to carry modulated pulses of light. This core is commonly formed of glass and is surrounded by a cladding.
The two main types of fibre optic cable are single-mode fibre and multimode fibre. Single-mode fibre optic cables carry a single beam of light generated laser over distances up to 100km. Multimode fibre optic cables carry multiple beams of light over short distances. These beams of light can be generated using inexpensive sources such as LEDs
.
Other connection methods
Twisted-pair and fibre optical cables are the most common wired methods used to connect devices to a network; there are however other methods
Rollover cable:
A rollover cable is a network cable that is used to connect the serial port on a device to a router’s console port. As the pinouts on both devices are the same, the layout of the wires is reversed within the cable to allow the two devices to communicate.
Universal serial bus (USB):
USB is a high-speed serial bus that supports up to 127 devices that are linked in a chain. Various standards have been developed, the latest being USB 3 which allows a data transfer rate of up to 5Gbps. This connection method is commonly used to link peripherals, such as printers and portable hard drives, to networks.
IEEE 1394 (Firewire):
Firewire is a high-speed bus that supports up to 63 devices linked in a chain. It is ideal for real-time applications, such as streaming videos, since it supports data transfer rates of 800Mbps.
Ethernet over powerline:
This technology allows users to connect devices by using the power cables installed in a build to carry data. An adapter is plugged into a power outlet and the device is then attached to this adapter wirelessly or using a patch cable.
Wireless networks
Wireless networks commonly use electromagnetic waves to transfer data between devices. The data being transmitted is superimposed onto a radio carrier signal, the data is extracted from the carrier signal by the receiving device.
There are three main types of antenna used by wireless access points and routers:
Omnidirectional antennae transmit the signal in all directions and are used to provide cover over a wide area.
Semi-directional antennae transmit the signal in a single direction providing a strong long-range signal in the specified direction.
Highly directional antennae transmit a narrow-focused signal in a single direction and are used in point-to-point systems.
IEEE 802.11 standards:
The IEEE project standards 802.11 focus on the implementation of wireless local area networks (WLANs) and have evolved to incorporate technological improvements.
IEEE 802.15 standards:
The IEEE 802.15 standards are focused on the development and implementation of wireless personal area networks (PAN). For example, 802.15.1 defines the physical layer and media access control (MAC) standards for Bluetooth connectivity, whereas 802.15.6 deals with body area networks.
Near-field communication (NFC):
NFC allows mobile devices to communicate when they are brought within 4cm of each other. To enable the exchange of data, the mobile devices establish a peer-to-peer network. For example paying with Apple Wallet.
Authentication and encryption
Wireless equivalency privacy (WEP)
To secure a wireless network using WEP a shared key is shared between the access point and the devices connecting to it. This key is then used to encrypt the data passing between the devices.
WEP has a number of inherent weaknesses regarding the encryption of data and key usage, therefore it should only be used if connecting to legacy devices that do not support WPA or WPA2.
Wi-Fi protected access (WPA)
WPA was designed to address the issue found in WEP, it utilises Temporal Key Integrity Policy (TKIP) to change the encryption key for each packet that is sent. Another improvement was the use of Extensible Authentication Protocol (EAP) to authenticate devices.
Wi-Fi protected access 2 (WPA2)
WPA 2 is currently the authentication and encryption protocol of choice. In WPA 2 TKIP has been replaced by Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) to ensure data confidentiality and advanced encryption standard (AES) for encryption of wireless transmissions.
Wi-Fi protected access 3 (WPA3)
WPA3 improves upon WPA2 in four main areas:
More secure handshake
Improved system for adding Wi-Fi devices
Increased security on public networks
Increased security for enterprise environments
Wireless security best practices
Change default administration passwords
The service set identifier (SSID) is the name given to a wireless network and by default it is set to broadcast. As you need to know the SSID to join a network, broadcasting the SSID makes it easier for a hacker to get on to the network. Disable it.
Encrypting wireless traffic
Multi factor authentication
Antenna placement and power levels
Virtual private network (VPN) solutions
Threats to wireless networks
Data emanation: Network devices and computer systems emit data that can be collected and pieced together into readable data.
Interference: Interference from microwaves and other devices, such as mobile phones, can cause interference that disrupt wireless networks.
Packet sniffing: The data being transmitted on a wireless network can be intercepted using a device with a wireless connection and sniffer software. Hence the need for data encryption.
War driving occurs when individuals drive around an area with a laptop trying to locate wireless networks that are vulnerable and which they can connect to. To prevent this access points should be situated in the middle of the building and the power level should be configured to prevent the signal from radiating beyond the boundaries of the building.
War chalking - Once an individual undertaking war driving has identified a vulnerable network they will identify this network by chalking symbols on the wall of the building containing the network. These symbols identify the configuration of the network including the SSI and bandwidth available.
Rogue access points are unauthorised access points that have been added to the existing network infrastructure. Once the access point has been connected to the network it can be used to gain access to the network without the network administrator being aware. Hackers can install a rogue access point and configure it to appear as a valid access so that all of the data being transmitted across the network will be received by the device. This type of attack is known as an 'evil twin' attack.
Virtualisation:
Virtualisation is the process of creating an environment that allows a single system to host virtual instances of operating systems and applications. Each of the virtual operating systems or applications will use the physical resources of the hosting system.
Hypervisors
Hypervisors are software, firmware or hardware that allow the creation and management of an environment that allows multiple virtual machines to be hosted on a single system.
There are two main types of Hypervisors, Type 1 and 2.
A type 1 hypervisor runs directly on the system's hardware or is embedded in firmware and is often referred to as a bare metal hypervisor.
A type 2 hypervisor uses a pre-installed operating system to interface with an application designed to facilitate virtual environments.
Network attached storage (NAS)
NAS devices are used to provide dedicated file storage on an Ethernet network. Each NAS device is assigned its own unique IP address and can be accessed via other devices on the network.
Storage area networks (SAN)
Storage area networks provide servers with a secure high-speed data transfer network that is used to access consolidated block-level storage.
The implementation of a SAN simplifies the information life cycle management and plays a crucial role in delivering a consistent and secure data transfer infrastructure.
Test equipment
Built-in utilities:
Most modern operating systems have built-in monitoring utilities that allow you to monitor activity on you network. Two examples are Activity Monitor (macOS) and Performance Monitor (Windows). Both of which provide a graphical representation of network activity which can be used to judge if the network traffic being received and transmitted is excessive.
command line:
The ping command sends packets of data to a specific IP address on a network, and then lets you know how long it took to transmit that data and get a response.
ipconfig - This utility allows you to get the IP address information of a Windows computer.
ifconfig This command is used to view, change and manage all the current configurations of the computer network (UNIX-based operating systems.)
netstat - command is a networking tool used for troubleshooting and configuration, that can also serve as a monitoring tool for connections over the network. Both incoming and outgoing connections, routing tables, port listening, and usage statistics are common uses for this command.
The Traceroute command (tracert) is a utility designed for displaying the time it takes for a packet of information to travel between a local computer and a destination IP address or domain.
Troubleshooting applications
Heat maps When troubleshooting wireless networks, applications can be used to generate heat maps which can be used to identify dead zones and improve network coverage.
Radio frequency (RF) surveying applications, such as NetSpot, are used to determine the feasibility of implementing a wireless network in a specific area and identifying the optimal placement of the access point. They can also be used to identify weak signals on a wireless network as part of the troubleshooting process.
Packet analysers are hardware or software capable of intercepting and logging data flow across a network.
Physical tools
Cable tester Basic cable testers are continuity testers that verify the existence of a conductive path between ends of the cable, and verify the correct wiring of connectors on the cable.
A TDR works by bouncing a signal off the end of the cable. Opens, shorts, and other problems reflect the signal back at different amplitudes depending on the problem. A TDR measures how much time it takes for the signal to reflect and calculates the distance to a fault in the cable. (OTDR is fibre version)
Multimeter can measure voltage, resistance, and current.
Toner Probe allow you to locate correct cable by sending a signal on it, which probe then can pick up and make a sound
Maintenance tools
Network maintenance tasks
Monitoring network performance
Various tools can be used to monitor networks to identify performance issues such as network congestion
Configuration management
Monitoring and reviewing system configuration aids in identifying where potential issues may occur, such as settings for a particular device being inadvertently changed.
Physical maintenance
The physical maintenance other networks include day-to-day activities such as cleaning monitors and keyboards. It could also involve conducting physical checks on the condition of cables to ensure that they still serviceable.
Network upgrades
Prior to upgrading any hardware or software, it is important that you read any related documentation and prepare a test environment that can be used to establish the impact of the upgrade. If an untested upgrade is installed, it may cause issues with existing hardware or software.
It is critical that before the upgrade has been tested and prior to deployment on the main network, a configuration back-up is performed. A configuration back-up is a back-up of the state of the system prior to it being upgraded. It will be required to roll back the system if the upgrade causes compatibility issues.
Antivirus software
Scheduling scans – allow the scheduling of scans to be undertaken at a time determined by the system administrator.
Definition updates – definitions are produced to provide the antivirus software with up to date information of all known viruses. Therefore, these should be updated on a regular basis
Backing up data
Protocol analysers
Protocol analysers can be either hardware or software tools that are used to capture and analyse data that is flowing across the network. Wireshark, is an example of a free open-source packet analyser.
TCPdump is another example of a packet analyser. Unlike Wireshark it is a CLI utility that is predominately used with Linux based OSs.
iostat ( Linux based) is a computer system monitor tool used to collect and show operating system storage input and output statistics
The ScanDisk utility is used to check hard disks for errors and to repair them. (Windows)
MemTest is a utility designed to place RAM under strain and assess if it can reliably store data. If the system fails the test, it could be due to old or damaged hardware. The Linux equivalent to MemTest is vmstat.
The TOP command allows users to view the active processes and monitor the usage of system resource usage in a Linux environment
Maintenance documentation
An SLA is a contract between the service provider and the client. The SLA provides details of the services to be provided and expected standards that the service provider is required to achieve.
Mean time between failures (MTBF) refers to the average amount of time that elapses between one failure and the next.
Mean time to restore services (MTRS) measures the average time taken to restore a configuration item or IT service and is measured from the point of failure to when the configuration/service is fully restored and delivering its normal functionality.
Mean time to repair (MTTR) is used to calculate the average time taken to repair a faulty component or device and return it to working order. It is measured from the point of failure until the repair is completed.
Network documentation
Network diagrams
A network diagram is a visual representation of a computer or telecommunications network. It shows the components that make up a network and how they interact, including routers, devices, hubs, firewalls, etc.
Asset logs are used to record the details of the components, their characteristics, location and who is responsible for them. They are used as part of an audit process to help prevent or identify the loss of equipment.
Fault logs are used to record information regarding issues and their resolution. This information can be used in a number of ways, such as identifying trends. It can also be used to help plan routine maintenance to help reduce the impact of the identified issues.
Acceptance testing is conducted to ensure that systems and software meet the requirements specified by the client prior to delivery. The results are documented so that the client so that all the client has a record of the state of the systems when they were commissioned.
Computer systems
Major system components
The motherboard is the main printed circuit board to which all components and external peripherals connect.
When the system boots, the instructions contained in the basic input/output systems (BIOS) are loaded into the system. These instructions inform the processor where the operating system is located and how to load it into RAM.
Complementary metal-oxide semiconductor (CMOS) - The CMOS is a small piece of volatile memory that stores the information required by the BIOS. There is a small battery included on the motherboard that is used to supply power to the CMOS when the system is powered down.
The computer's central processing unit (CPU) is the portion of a computer that retrieves and executes instructions.
Memory
RAM is volatile memory that is used to store the data and code that is required by a running application. Without the need to access slower permanent storage such as the hard drive.
Cache memory is a volatile memory type that is commonly mounted on the CPU package and stores frequently used instructions and data. This reduces the need to access the slower RAM to fetch frequently used instructions and data, thus speeding up the process.
A hard disk drive (HDD) is a non-volatile computer storage device containing magnetic disks or platters rotating at high speeds. It is a secondary storage device used to store data permanently
SSD - Unlike hard drives, SSDs do not have any moving parts. They store the data using flash memory. This results in a faster data transfer rate than those achieved by hard drives, however they are a lot more expensive than conventional hard drives.
Redundant array of inexpensive disks (RAID)
RAID is commonly used to protect servers and other critical systems against downtime from disk failure. By holding some redundant data across an array of disks it is possible for some RAID systems to continue to function even though one disk has failed. The failed disk can be replaced and regenerated while the system continues to function.
2 RAID 1 mirroring
All data written to one disk is copied to another. If either disk fails, the system can continue to operate. The failed disk can be replaced and regenerated without having to restore from a back-up.
RAID 5 striping with parity
Data is written to the disks in stripes as in level 0, however extra redundant information is written to special parity stripes. This information can be used to reconstruct the data if the disk fails. In practical terms, striping with parity requires three disks to store two disks' worth of data.
RAID 10 mirroring stripe
RAID 10 is implemented as a striped array whose segments are then mirrored. Under certain circumstances, RAID 10 array can sustain multiple simultaneous drive failures.
1 RAID 0 disk striping
RAID 0 implements a striped disk array, the data is broken down into blocks and each block is written to a separate disk drive. I/O performance is greatly improved by spreading the I/O load across many channels and drives.
This level is not a 'true' RAID because it is NOT fault-tolerant. The failure of just one drive will result in all data in an array being lost.
Power supplies - Power supplies convert the high voltage alternating current (AC) to the low voltage direct current (DC) required by computer circuitry.
Operating systems:
An operating system's (OS) main functions are:
- manage a device’s resources, such as the central processing unit, memory, disk drives and printers
- to provide a user interface
to execute and provide services for applications - to manage security and access rights.
A proprietary operating system (OS) is typically owned by the individual or organisation that developed it. This type of OS often has specific licensing terms that limit its usage. For instance, Apple limit the use of their MAC OS X to their devices only.
As the source code remains the intellectual property of the developer, it is usually kept secret and end users are charged a fee to use the operating system.
The developers of open-source operating systems make the source code freely available with a licence that allows individuals and organisations to study, change and distribute the software to anyone and for any purpose.
Infrastructure
Servers
Servers are systems that provide network services to clients on the network, the common types of servers found within networks are listed below.
Domain controller
In a Windows based network, a domain controller is the server that is responsible for responding to authentication requests. This is normally achieved by implementing Active Directory, which stores information regarding objects such as users and their authentication details.
Email Server
Microsoft Exchange is an example of software that can be installed on a Windows based OS to facilitate the provision of email services. There are three main protocols associated with the transmission of emails:
Simple Mail Transfer Protocol (SMTP) – SMTP is used to send email messages between servers.
Post Office Protocol (POP) – By default POP is configured to download all new messages from the email server on to the device once a connection is established. Once they have been downloaded onto the device, they are then deleted. As the emails are stored on the device and not the server they will not be available if another device is used at a later date.
Internet Message Access Protocol (IMAP) – Unlike POP, IMAP stores emails on the server allowing access to emails from multiple devices. The emails will be available until they are deleted from the server.
File server
File servers can be dedicated systems or network storage architecture devices that are configured to allow users to store and share files.
Domain name system (DNS) server
A DNS server translates the domain name into an IP address. DNS works like a phone book, by managing the mapping between names and numbers. DNS servers translate requests for domain names into IP addresses.
Dynamic Host Configuration Protocol (DHCP) server
DHCP uses a server to automate the process of issuing IP addresses. The DHCP server contains a range of IP addresses known as a scope. When a request for an IP address is received from a computer, the DHCP server will select an IP address from its scope that is not already leased to another device and offer it to the computer making the request. The computer then accepts the offer and the DHCP sever will then send the IP information and confirm the lease of the IP address.
Proxy server
A proxy server is a device that is configured to act as an intermediary for requests for clients seeking resources from other servers.
FTP server
File Transfer Protocol servers are used to control the process of transmitting files between devices in different locations. Dependent on the size of the file you may be able to share it using email, however for large files this may not be possible, and this is where FTP can be used.
Firewalls
Firewalls can be implemented using either hardware or software solutions and are designed to prevent access to or from a network. They use a predetermined set of rules to control the flow of data into and from a network.
Stateless firewalls monitor network traffic and make decisions on whether to block packets based on static values such as source and destination addresses. Stateless firewalls are used to enhance security through the use of packet filtering. Packet filtering inspects incoming or outgoing packets and compares them against predefined criteria and will block or allow access based on the results.
Stateful firewalls are aware of communication paths and can monitor traffic from end to end. They can be configured to distinguish legitimate packets from different types of connections. When a packet is received it initialises communications. The packet is inspected and if it matches an existing firewall rule it is allowed to access the network and an entry is added to the state table. From this point forward, the packets in this particular communication session are allowed as they match an existing state table entry.
Intrusion detection system (IDS)
Intrusion detection systems monitor network traffic for malicious activity or breaches of policy and report this activity to the network administrator. There are two type of intrusion detection systems that are commonly used:
Host-based intrusion detection systems (HIDS) commonly take the form of a software application that is installed on individual devices and monitors inbound and outbound packets from this device only.
Network intrusion detection systems (NIDS) are placed at strategic points and monitor all network traffic. They compare the traffic against information contained in a library of previously identified attacks to identify abnormal behaviour and will report this activity once it has been identified.
Number systems
A bit (b) is the smallest unit used in computing it can be represented by a 1 or 0.
A byte (B) is a group of eight bits.
A kilobyte (KB) is a group of 1,024 bytes.
A megabyte (MB) is a group of 1,024 kilobytes
A gigabyte (GB) is a group of 1,024 megabytes.
A terabyte (TB) is a group of 1,024 gigabytes.
A petabyte (PB) is a group of 1,024 terabytes.
An exabyte (EB) is a group of 1,024 petrobytes.
Security
IP address – at present there are two versions of Internet Protocol (IP) in use:
IP version 4 (IPv4) has 32 bits split into four octets and is expressed as a dotted decimal representation such as 192.168.5.21.
IPv6 addresses use 128 bit and are expressed as a hexadecimal value, separated by colons. An example IPv6 address is: 3ffe:1900:4545:3:200:f8ff:fe21:67cf.
Automatic Private IP Addressing (APIPA) is a Windows function that provides a DHCP auto-configuration addressing when the DHCP server is unavailable.
A subnet mask is a 32-bit number that masks an IP address and divides the IP address into a network address and host address. A subnet mask is made by setting network bits to all 1s and setting host bits to all 0s.
A default gateway serves as an access point used to send information to a device in another network or the Internet. Default simply means that this gateway is used by default unless an application specifies another gateway.
Preferred and alternate DNS. The preferred DNS is a specified primary choice to handle IP mapping. If the preferred choice times out after a time limit defined by an operating system, it will then attempt to try the alternate DNS.
Collision domains
A collision occurs when two devices on the same network segment transmit data at the same time. When a collision occurs, each of the devices must resend the data again. This reduces the efficiency of the network.
The term 'collision domain' is used to describe a part of the network where a collision may occur.
To help reduce the likelihood of collisions occurring and reduce the size of the collision, domain hubs can be replaced with switches. Each port on a switch is in a separate collision domain. In the case of the network shown above, if the central hub is replaced with a switch this would create two collision domains.
Multilayer switches
Multilayer switches are often referred to as layer three switches. They are capable of using MAC addresses to perform filtering of traffic intended for the local network or, if configured, IP addresses to route data between networks.
Virtual local area networks (VLANs)
A VLAN is a logical grouping of networked devices and is commonly created by splitting an existing broadcast domain into logical segments using a multilayer switch. As each of these segments will have its own IP address range, they will have to be connected to a multilayered switch or router to communicate with each other.
The advantages offered by implementing VLANs include:
Increased security
Improved performance/bandwidth
Reduced broadcasts/traffic flow
Allows logical grouping by departments/specific job types
Remote management systems
Microsoft operating systems
Remote assistant allows users to send an invite to an individual so that they can access their device remotely. Once the connection has been established, the individual accessing the device remotely must provide a password that has been provided in the invitation, and the user must manually accept the connection. Remote assisstant allows limited control over the device.
Remote desktop allows administration of a device remotely as it allows full control over the system. To logon to the remote device, the administrator must enter the correct logon details for an account associated with the device being accessed. To allow this type of connection, the device must be configured to accept remote connections.
Virtual Network Computing (VNC)
Virtual Network Computing utilises software that enables you to have a virtual desktop (server) on a remote computer. This virtual desktop can then be accessed using various client interfaces and browsers, providing access to a virtual desktop from a remote location.
Remote desktop protocol (RDP)
RDP is a secure network communications protocol designed to provide remote access to virtual desktop and remote management of applications.
RDP allows network technicians to remotely diagnose and resolve problems individual subscribers encounter remotely.
The RDP protocol uses port 3389 to provide remote access.
Telnet
Telnet is an abbreviation for 'terminal network' which is a protocol that is used to provide a bidirectional interactive text-based communication facility using a virtual terminal connection. Telnet can be used to access switches and routers, and to issue commands remotely.
A major weakness of Telnet is that the data transfer between the devices is not secured, therefore any user names and passwords used to gain access to the remote system are sent in plain text. To address these major issues, SSH is commonly used where a secure connection is essential.
PowerShell
PowerShell is a Microsoft utility which is built on the .NET framework. It provides a task-based command line shell and scripting language. These features are designed to allow system administrators and power users to automate the administration of operating systems and the processes related to the applications installed.
Secure Shell (SSH)
SSH is a protocol that allows secure remote log in and execution of commands across an unsecured network. The protocol works in a client-server model, in which the connection is established by the SSH client connecting to the SSH server. The SSH client initiates the connection set-up process and uses public key cryptography to verify the identity of the SSH server. After the set-up phase, the SSH protocol uses a strong symmetric encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged.