Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 5 - Networks and Telecommunications - Coggle Diagram
Chapter 5 - Networks and Telecommunications
The Open Systems Interconnection Reference Model
Layer 4
Transport
- End-to-end communication
Layer 3
Network
- Routing data; logical addressing; WAN delivery
Layer 5
Session
- Process-to-process communication
Layer 2
Data Link
- Physical addressing; LAN delivery
Layer 6
Presentation
- Data format; encryption
Layer 1
Physical
- Signaling
Layer 7
Application
- User interface
WAN (Wide Area Network)
Connects individual networks together.
Router
Connects a LAN to a WAN.
Border Routers and Internal Routers
Internal Routers
help separate traffic on a network to keep unwanted people out and wanted people in.
Border Routers
provide the first line of defense to a network system.
Internet Small Computer System Interface = iSCSI
Fiber Channel over Ethernet = FCoE
Standard Computer Language
Transmission Control Protocol / Internet Protocol (TCP / IP)
UDP Jobs
SNMP
DNS
DHCP
TFTP
TCP Jobs
Telnet
SMTP
FTP
DNS
HTTP
Two Types of IP Addressing
IPV4
IPV6
Common Ports
445
Simple Message Block (SMB) over IP
3389
Terminal Server
443
HTTP over Secure Sockets Layer/Transport Layer Security (SSL/TLS)
162
SNMP Trap
161
Simple Network Management Protocol (SNMP)
143
Internet Message Access Protocol (IMAP)
139
Network Basic Input/Output System (NetBIOS) Session Service
110
Post Office Protocol v3 (POP3)
88
Kerberos
80
Hypertext Transfer Protocol (HTTP)
67 / 68
Dynamic Host Configuration Protocol (DHCP)
53
Domain Name System (DNS)
25
Simple Mail Transfer Protocol (SMTP)
23
Telnet
22
Secure Shell (SSH)
21
FTP control
20
FTP data transfer
OPEN FILE TO VIEW (ME ONLY)
Internet Control Message Protocol
Allows you to view health of network.
Risk Categories
Eavesdropping
Denial of Service
Reconnaissance
VPNs
Internet Protocol Security (IPSec)
OpenVPN
Secure Socket Tunneling Protocol (SSTP)
Network security defense tool.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Point-to-Point Tunneling Protocol (PPTP)
Firewalls
Application proxy
Critical network security element.
Stateful inspection
Packet filtering
Multilayered firewalls
Screened subnets
Border firewalls
DMZ
Semiprivate network that hosts services that the public can use
Network Access Control (NAC)
Requires users to login before being able to use a network. (Different from a private / secured network.)
Our college uses it.
Protection
Counter Mode Cipher Block Chaining Message Authentication Protocol
Wi-Fi Protected Access (WPA)
Remote Authentication Dial-In User Service (RADIUS)
DIAMETER was its successor.
SSID Broadcast
MAC Address Filtering