NETWORKING LESSON 7

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/94

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

Unmanaged switch

provides plug-and-play capability with minimal configuration options, It has no IP address assigned to it

2
New cards

Managed switch

can be configured via a command-line interface or a web-based management GUI

3
New cards

layer 3 switch

this layer is capable of interpreting layer 3 data and works like a router

4
New cards

layer 4 switch

this layer is capable of interpreting layer 4 data

5
New cards

Redundancy

allows data the option of traveling through more than one switch toward its destination and makes your network less vulnerable to hardware malfunctions

6
New cards

STP

Spanning Tree Protocol

7
New cards

STP (Spanning Tree Protocol)

prevents traffic loops, also called switching loops, by calculating paths that avoid potential loops and by artificially blocking the links that would complete a loop

8
New cards

least cost path

STP chooses the most efficient paths and calls these the ____

9
New cards

BPDUs

Bridge Protocol Data Units

10
New cards

BPDU guard, BPDU filter, Root guard

Some security precautions that must be configured on STP-enabled interfaces include:

11
New cards

RSTP, TRILL, SPB, Some switch manufacturers have designed proprietary versions of STP optimized to work most efficiently on their equipment

Newer technologies to improve or replace STP include the following:

12
New cards

RSTP

Rapid Spanning Tree Protocol

13
New cards

TRILL

Transparent Integration of Lots and Links

14
New cards

SPB

Shortest Path Bridging

15
New cards

“shutdown/no shutdown” 

a command that disables and enables the devices

16
New cards

“switchport port-security“

a command to secure switch access ports

17
New cards

defense in depth

a strategy where security should always be implemented in layers

18
New cards

load balancer

helps to evenly distribute traffic to each device in a cluster so every device carries a portion of the load

19
New cards

three-tiered architecture

Cisco and other manufacturers have developed a hierarchical design for switches on a network called

20
New cards

The access layer, or edge layer

a layer which consists of workgroup switches connected directly to hosts

21
New cards

The distribution layer, or aggregation layer

a layer which is a highly redundant mesh of connections between multilayer switches or routers

22
New cards

The core layer

a layer which consists of highly efficient multilayer switchers or routers that support the network’s backbone traffic

23
New cards

east-west traffic

The flow of traffic between peers within a network segment is called

24
New cards

north-south traffic

Traffic that must leave the local segment to reach its destination is called

25
New cards

spine and leaf architecture

A new hierarchical design was needed to better optimize east-west traffic, that design is called

26
New cards

SDN

Software-defined network

27
New cards

SDN (Software-defined network)

is a centralized approach to networking

28
New cards

Infrastructure plane (data plane), Control plane, Application plane, Management plane

SDN abstracts the functions of network devices into different layers, or planes:

29
New cards

Infrastructure plane (data plane)

this plane is made up of the physical or virtual devices that receive and send network messages

30
New cards

Control plane

this plane handles the decision-making processes

31
New cards

Application plane

the SDN controller communications with network applications using APIs

32
New cards

Management plane

this plane could be considered a part of the control plane

33
New cards

SAN

Storage Area Network

34
New cards

SAN (Storage Area Network)

is a network of storage devices that communicate directly with each other and with other portions of the network

35
New cards

FC (Fibre Channel), FCoE (Fibre Channel over Ethernet), iSCSI (Internet SCSI), IB (InfiniBand)

To maximize throughput, SANs rely on one of these networking technologies:

36
New cards

FC (Fibre Channel)

is a storage networking architecture that runs separately from Ethernet networks to maximize speed of data storage and access

37
New cards

FCoE (Fibre Channel over Ethernet)

allows FC to travel over Ethernet hardware and connections

38
New cards

iSCSI (Internet SCSI)

is a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet

39
New cards

IB (InfiniBand)

requires specialized hardware

40
New cards

Virtualization

is a virtual, or logical, version of something rather than the actual, or physical, version

41
New cards

Host

is a physical computer “hosting” a virtual machine

42
New cards

Guest

is each virtual machine

43
New cards

Hypervisor

creates and manages a VM, it also manages resource allocation and sharing between a host and any of its guest VMs

44
New cards

Type 1 hypervisor

installs on a computer before any OS and is called a bare-metal hypervisor

45
New cards

Type 2 hypervisor

installs in a host OS as an application and is called a hosted hypervisor

46
New cards

Bridged Mode

a vNIC accesses physical network using host machine’s NIC

47
New cards

NAT Mode

a vNIC relies on host machine to act as NAT device

48
New cards

Host-only Mode

VMs on one host can exchange data with each other and the host

49
New cards

Efficient use of resources • Cost and energy savings • Fault and threat isolation • Simple backups, recovery, and replication

Advantages of virtualization include the following:

50
New cards

Compromised performance • Increased complexity • Increased licensing costs • Single point of failure

Disadvantages of virtualization include the following:

51
New cards

NFV

Network Functions Virtualization

52
New cards

NFV (Network Functions Virtualization)

is the process of merging physical and virtual network architecture

53
New cards

Virtual firewall

install a firewall’s OS in a VM on an inexpensive server

54
New cards

Virtual router

install a router VM on a server instead of purchasing an expensive hardware router

55
New cards

Cloud computing

refers to the flexible provision of data storage, applications, and services to multiple clients over a network

56
New cards

On-demand service • Broad network access • Resource pooling • Metered service • Rapid elasticity

Cloud computing features include the following:

57
New cards

On-premises, IaaS (Infrastructure as a Service), PaaS (Platform as a Service), SaaS (Software as a Service), XaaS (Anything as a Service)

Cloud computing service models are categorized by the types of services provided:

58
New cards

On-premises

All hardware, software, and everything else is located and managed at the organization’s location

59
New cards

IaaS (Infrastructure as a Service)

Hardware services and network infrastructure devices are provided virtually

60
New cards

PaaS (Platform as a Service)

Includes the OS, runtime libraries or modules the OS provides to applications, and the hardware on which the OS runs

61
New cards

SaaS (Software as a Service)

Applications are provided

62
New cards

XaaS (Anything as a Service)

The cloud can provide any combination of functions depending on the client’s exact needs

63
New cards

Public cloud, Private cloud, Community cloud, Hybrid cloud, Multicloud

Cloud Deployment Models

64
New cards

Public cloud

Service provided over public transmission lines

65
New cards

Private cloud

Service established on an organization’s own servers in its own data center

66
New cards

Community cloud

Service shared between multiple organizations

67
New cards

Hybrid cloud

A combination of the other service models into a single deployment

68
New cards

Multicloud

A combination of the other service in a single deployment

69
New cards

IaC

Infrastructure as Code

70
New cards

IaC (infrastructure as code)

is the process of using text-based commands in a computer readable configuration file to create and manage cloud resources

71
New cards

automation

A programmed, computer-generated response to a specific event is referred to as

72
New cards

orchestration

As you convert more of your cloud maintenance and security tasks into code that can be run from scripts, you can automate many tasks to work together in a complex workflow, which is called

73
New cards

ISP outages • ISP-imposed bandwidth limitations • Cloud provider’s outages • Cloud provider’s backup and security systems • Misconfiguration that exposes one client’s data to another client • Unauthorized access to data by cloud provider employees or illegitimate users • Breaches of confidentiality • Failure to comply with data security regulations • Questions over ownership of intellectual property stored in the cloud • Questions over data maintenance • Risk to the network, proprietary data, or customer information caused by BYOC

Potential risks and limitations include the following:

74
New cards

Use encryption, Carefully choose the method by which your network connects to your cloud resources, Consider the following methods: • Internet • VPN (virtual private network) • Remote access connections • Leased line • Dedicated direct connection

Way to reduce risks of cloud computing include the following:

75
New cards

Availability

refers to how consistently and reliably a file or system can be accessed

76
New cards

HA (high availability)

refers to a system that functions reliably nearly all the time

77
New cards

Uptime

is the measure of time a system functions normally between failures

78
New cards

Fault tolerance

is the capacity of a system to continue performing despite unexpected hardware, software malfunction

79
New cards

Failure

is a deviation from a specified system performance level for a given time period

80
New cards

Fault

is a malfunction of one system component

81
New cards

MTBF

mean time between failures

82
New cards

MTTR

mean time to repair

83
New cards

MTBF (mean time between failures)

average amount of time that will pass for devices exactly like this one before the next failure is expected to occur

84
New cards

MTTR (mean time to repair)

average amount of time required to repair the device

85
New cards

Automatic failover

is the ability to immediately assume the duties of an identical component

86
New cards

Hot-swappable

refers to identical components that can be changed while a machine is running

87
New cards

Hot spare

a duplicate component that is already installed in a device and can assume function in case the original component fails

88
New cards

Cold spare

a duplicate component that is not installed, but can be installed in case of a failure

89
New cards

Link aggregation

is the combination of multiple network interfaces to act as one logical interface

90
New cards

Load balancing

traffic distribution over multiple components or links to optimize performance and fault tolerance

91
New cards

LACP

Link Aggregation Control Protocol

92
New cards

LACP (Link Aggregation Control Protocol)

dynamically coordinates communications between hosts on aggregated connections

93
New cards

Clustering

is the technique of grouping multiple devices so they appear as a single device

94
New cards

CARP

Common Address Redundancy Protocol

95
New cards

CARP (Common Address Redundancy Protocol)

allows a pool of computers or interfaces to share one or more IP addresses