Select Page

Networking Concepts and Technologies Overview

CISSP

  1. Broadband Technologies
    • Includes: ISDN, cable modems, DSL, T1/T3 lines.
    • Characteristics: Support multiple simultaneous signals, analog, not broadcast technologies.
  2. Broadcast Domain
    • Definition: A set of systems that can receive a broadcast from each other.
  3. CHAP (Challenge-Handshake Authentication Protocol)
    • Function: Authenticates remote clients, encrypts usernames and passwords, periodically re-authenticates, prevents replay attacks.
  4. CIR (Committed Information Rate)
    • Definition: The minimum bandwidth guarantee provided by a service provider to customers.
  5. Collision Domain
    • Definition: A set of systems that could cause a collision if they transmitted simultaneously, with more systems increasing congestion risks.
  6. Data Streams
    • Layers: Occur at the Application, Presentation, and Session layers.
  7. EAP (Extensible Authentication Protocol)
    • Function: An authentication framework compatible with existing wireless or point-to-point technologies, originally for PPP connections.
  8. FCoE (Fiber Channel Over Ethernet)
    • Function: Allows high-speed networks to carry storage traffic.
  9. FDDI (Fiber Distributed Data Interface)
    • Function: Token-passing network with dual rings for redundancy, using tokens to manage traffic.
  10. FTP (File Transfer Protocol)
    • Function: Protocol for transferring files over a network.
  11. Gateway
    • Function: Translates between different network protocols.
  12. ICMP (Internet Control Message Protocol)
    • Function: Sends error messages and probes the network (e.g., ping).
  13. iSCSI (Internet Small Computer Interface)
    • Function: Allows file services over traditional network technologies, cheaper than Fiber Channel.
  14. ISDN (Integrated Services Digital Network)
    • Bandwidth: PRI provides 1.544 Mbps, faster than BRI’s 144 Kbps.
  15. MAC (Machine Access Control)
    • Function: Refers to the hardware address of a device, which can indicate the manufacturer.
  16. Multilayer Protocols
    • Function: Allow encryption at various layers, support multiple protocols at higher levels, can conceal covert channels.
  17. MPLS (Multiprotocol Label Switching)
    • Function: Uses path labels instead of network addresses for efficient, high-performance wide-area networking.
  18. PAP (Password Authentication Protocol)
    • Function: Sends passwords unencrypted, less secure.
  19. PEAP (Protected Extensible Authentication Protocol)
    • Function: Provides encryption for EAP methods, encapsulates EAP in a TLS tunnel.
  20. Port-Based Authentication (802.1x)
    • Function: Network access control using EAP.
  21. PPP (Point-to-Point Protocol)
    • Function: Common protocol for dial-up connections, replaced SLIP.
  22. Proxy
    • Function: Acts as a gateway providing filtering, caching, or protection services for clients.
  23. PVCs (Private Virtual Circuits)
    • Function: Virtual circuits used for networking.
  24. RST Flag
    • Function: Used to reset or disconnect a session, with the option to restart via a new handshake.
  25. Converged Network
    • Function: Carries multiple types of traffic, such as voice, video, and data.
  26. SDN (Software-Defined Networking)
    • Function: Configured as code or software, allowing rapid network changes.
  27. Hypervisor-Based Network
    • Function: May use traditional network devices running as virtual machines, potentially software-defined.
  28. SSID
    • Function: Typically disabled for secure networks.
  29. Site Survey
    • Function: Identifies areas where a wireless network may be accessible.
  30. SONET (Synchronous Optical Network)
    • Function: Protocol for sending multiple optical streams over fiber.
  31. Subnet
    • Function: Logical division of a network.
  32. Supernet
    • Function: Made up of two or more networks.
  33. UDP (User Datagram Protocol)
    • Function: Connectionless data transfer without error detection or correction.
  34. WAF (Web Application Firewall)
    • Function: Protects web applications from attacks.
  35. Wired Extension Mode
    • Function: Uses a WAP to connect wireless clients to a wired network.
  36. AMP (Asymmetric Multiprocessing)
    • Function: Used in dedicated applications, with processors assigned specific tasks.
  37. SMP (Symmetric Multiprocessing)
    • Function: Multiple processors share memory and I/O devices, controlled by a single OS instance.

This summary provides a comprehensive overview of key networking concepts and technologies, crucial for understanding and managing modern networks.

Latest Post:

Pin It on Pinterest