WGU - Software Defined Networking - D415

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/160

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

161 Terms

1
New cards

Network Functions Virtualization (NFV)

Moved network functions from stand-alone appliances to software running on any server, reducing the time-to-market for products.

2
New cards

Software-Defined Networks (SDN)

This architecture decouples the network control and forwarding functions enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services.

3
New cards

NFV Components

Virtual Network Functions (VNFs)

Network Functions Virtualization Infrastructure (NFVI)

NFV Management and Orchestration (NFV-MANO)

4
New cards

NFV Management and Orchestration (NFV-MANO)

Consists of all functional blocks, data repositories, reference points, and interfaces that are used for managing and orchestrating VNFs and the NFVI.

5
New cards

Network Functions Virtualization Infrastructure (NFVI)

Is the entirety of the hardware and software components that build the environment where VNFs are deployed.

6
New cards

Virtual Network Functions (VNFs)

Are the software implementations of network functions.

7
New cards

Open Platform for NFV (OPNFV)

Created by the Linux Foundation in 2014 and is a collaborative open-source platform that seeks to develop NFV and shape its evolution.

8
New cards

OpenStack

An open-source cloud computing platform that has high market penetration that includes a collection of interoperable modules that are used to orchestrate large pools of compute, storage, and networking resources.

9
New cards

Nova

OpenStack compute module, is used to create and delete compute instances as required.

10
New cards

Glance

OpenStack module that synchronizes and maintains VM images across the com pute cluster.

11
New cards

Keystone

Module that provides authentication for accessing all OpenStack services.

12
New cards

Cinder

OpenStack module that provides block storage used as storage volumes for VMs.

13
New cards

Swift

OpenStack module that provides object storage that is used to store large amounts of static data in a cluster.

14
New cards

Neutron

or networking, OpenStack module that allows the different compute instances and storage nodes to communicate with each other.

15
New cards

Horizon

OpenStack module provides a GUI dashboard, and is by far the most widely deployed management module.

16
New cards

Heat

OpenStack module that helps expedite orchestration of applications across multiple compute instances by using templates.

17
New cards

Celiometer

OpenStack module that monitors the NFVI and helps identify bottlenecks and resource optimization opportunities.

18
New cards

Ironic

OpenStack module that is a provisioning tool for baremetal installation of compute capabilities instead of VMs in OpenStack.

19
New cards

Congress

OpenStack module that is a policy management framework for the OpenStack environment.

20
New cards

Designate

OpenStack module that is used to point applications in the OpenStack environment to a trusted DNS source.

21
New cards

Barbican

OpenStack module that works with Keystone authentication to manage internal application security by behaving as a key manager.

22
New cards

Murano

OpenStack module that provides a white list repository of applications.

23
New cards

Trove

OpenStack module that provides a distributed database service and enables users to deploy relational and non-relational database engines.

24
New cards

Sahara

OpenStack module formerly called Savanna, provides big data services by providing Elastic MapReduce and ability to provision Hadoop.

25
New cards

Manila

Openstack module that provides Network Area Storage (NAS) solutions for an OpenStack deployment.

26
New cards

Zaqar

OpenStack module that provides a multi-tenant cloud messaging service.

27
New cards

Magnum

OpenStack module that is an umbrella project that provides containerization assistance. This module is still in development.

28
New cards

Dynamic Host Configuration Protocol (DHCP)

A network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.

29
New cards

UDP port number 67

Destination port of a DHCP server

30
New cards

UDP port number 68

Destination port of a DHCP client

31
New cards

ioctl interface

Linux Bridge Configuration offers an interface that can be used to create and destroy bridges in the operating system, and it can also add network interfaces and remove existing network interfaces to / from the bridge.

32
New cards

sysfs-based interface

Linux Bridge Configuration allows the management of bridge and bridge port specific parameters.

33
New cards

Virtual Network

a mapping of the entire or subset of networking resources to a specific protocol layer.

34
New cards

Network Virtualization (NV)

Defined by the ability to create logical, virtual networks that are decoupled from the underlying network hardware to ensure the network can better integrate with and support increasingly virtual environments.

35
New cards

Two most common forms of NVs

Protocol-based virtual networks

Virtual networks that are based on virtual devices

36
New cards

Virtual Private Networks (VPNs)

protocol-based virtual networks usually built on tunneling protocols, which consists of multiple remote end-points (typically routers, VPN gateways of software clients) joined by some sort of tunnel over another network, usually a third-party net work.

37
New cards

Virtual LANs (VLANs)

Protocol-based virtual networks that are logical local area networks (LANs) based on physical LANs

38
New cards

Virtual Private LAN Services (VPLS)

A specific type of Multipoint VPN that is divided into Trans parent LAN Services (TLS) and Ethernet Virtual Connection Services.

39
New cards

Virtualization

Refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.

40
New cards

Replication

To create multiple instances of the resource

41
New cards

Isolation

To separate the uses which clients make of the underlying resources

42
New cards

Overlay network

It describes a computer network that is built on top of another network.

43
New cards

Virtual Network Embedding (VNE) problem

How to optimally allocate virtual networks and their associated networking resources.

44
New cards

hub

a physical-layer device where a frame is passed along or broadcast to every one of its ports. It does not matter that the frame is only destined for one port.

45
New cards

switch

Responsible for connecting several network links to each other, creating a Local Area Network (LAN).

a data-link layer device that keeps a record of the MAC addresses of all the devices connected to it and with this information it can identify which system is sitting on which port. As the result, when a frame is received, it knows exactly which port to send the frame to, without significantly increasing network response times.

46
New cards

bridge

A device that separates two or more network segments within one logical network.

47
New cards

Open vSwitch (OVS)

A multi-layer software switch licensed under the open source Apache 2 license.

48
New cards

Linux bridge

A native function on Linux kernel with layer-2 capabilities, which can be considered as an Ethernet Hub

49
New cards

OpenFlow

Allows a controller to add, remove, update, monitor, and obtain statistics on flow tables and their flows, as well as to divert selected packets to the controller and to inject packets from the controller into the switch.

50
New cards

L2TP (Layer 2 Tunneling Protocol)

a tunneling protocol used to support VPNs or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.

51
New cards

PPP (Point-to-Point Protocol)

A data link (layer 2) protocol used to establish a direct connection between two nodes. It connects two routers directly without any host or any other networking device in between. It can provide connection authentication, transmission encryption, and compression.

52
New cards

VXLAN (Virtual Extensible LAN)

Network virtualization technology that attempts to improve the scalability problems associated with large cloud computing deployments. It uses a VLAN-like encapsulation technique to encapsulate layer 2 Ethernet frames within layer 4 UDP packets

53
New cards

Generic Routing Encapsulation (GRE)

A communication protocol used to establish a direct, point-to-point connection between network nodes. Being a simple and effective method of transporting data over a public network, such as the Internet, it lets two peers share data they will not be able to share over the public network itself.

54
New cards

SSL (Secure Socket Layer)

A standard security technology for estab lishing an encrypted link between a server and a client - typically a web server (website) and a browser, or a mail server and a mail client (e.g., Outlook) by encrypting data above the transport layer.

55
New cards

IPSec

A network protocol suite that authenticates and encrypts the packets of data sent over a network at the IP layer. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys for use during the session.

56
New cards

IEEE 802.1Q

A protocol for carrying VLAN traffic on Ethernet.

57
New cards

Maximum Transmission Unit (MTU)

The size of the largest block of data that can be sent as a single unit.

58
New cards

Southbound Interface (SBI)

Allows the controller to communicate, interact and manage the forwarding elements.

59
New cards

East / Westbound interfaces

Are meant for communication between groups or federations of controllers.

60
New cards

Northbound Interface (NBI)

Enables applications in the application layer to program the controllers by making abstract data models and other functionalities available to them.

61
New cards

Unified control plane of an SDN

Consists of one or more SDN con trollers that use open APIs to exert control over the underlying vSwitches or forwarding devices.

62
New cards

Data plane in SDN

Tasked with enabling the transfer of data from the sender to the receiver(s).

63
New cards

OpenFlow

Defined by the ONF, is a protocol between the control and forwarding layers of an SDN architecture, and is by far the most widespread implementation of SDN.

64
New cards

SDN Controllers

The brains of the SDN operation that lies between the data plane devices on one end, and high level applications on the other. Takes the responsibility of establishing every flow in the network by installing flow entries on switch devices.

65
New cards

NOX

Was among the fi rst publicly available OpenFlow controller.

66
New cards

OpenDaylight (ODL)

An open-source SDN controller that has been available since 2014. It is a modular multi-protocol SDN control ler that is widely deployed in the industry.

67
New cards

Open Virtual Switch (OVS)

Open-source implementation of a distributed programmable virtual multi-layer switch. Generally consist of flow tables, with each flow entry having match conditions and associated actions. Communicates with the controller using a secure channel, and generally uses the OpenFlow protocol.

68
New cards

Routing Control Platform (RCP)

Proposed in for the provisioning of inter-domain routing over a BGP network. Routing is done as a separate entity. Control from physically distributed entities in a domain is logically centralized in a control plane.

69
New cards

SoftRouter

Presented with the aim of separation of control and forwarding elements called Control Element (CE) and Forwarding Element (FE), respectively. The control functionality is provided by using a centralized server, i.e., a CE that might be many hops away from the FE.

70
New cards

RouteFlow

Project initially named as QuagFlow, which aimed to provide IP routing as Router-as-a-Service in a virtualized environment. Considered the basic architecture to control routing in SDNs.

71
New cards

Virtual Router System (VRS)

Virtual router instances communicate with a Point-Of-Presence (POP) and follow a star topology, in which a single core node is connected to Customer Edge Gateways (CEG) linked through Intermediate Nodes (INs).

72
New cards

Vulnerability

A weakness or gap in a security system that can be either exploited by attackers or caused by malfunctioning system components.

73
New cards

Threat

The possibility of exploration of vulnerabilities that can lead to something bad happening, and it emphasizes the qualitative of potential damages due to explored vulnerabilities.

74
New cards

Attack

An action triggered by deploying an attacking method, when a vulnerability is exploited to actually realize a threat.

75
New cards

Risk

The quantifiable likelihood of loss due to a realized threat, and it emphasizes the quantitative of potential damages.

76
New cards

The source of attacks

Two types of attackers based on their origins called inside attacker (or insider) and outside attacker (or out sider).

77
New cards

The method of attacks

There are two types of attack methods based on the intention of the attacker called passive attacks and active attacks.

78
New cards

The target of attacks

The objective of attackers to try to compromise.

79
New cards

The consequence of attacks

Describes outcomes by successfully deploying an attack. It is a multi-faceted consequence.

80
New cards

Defense in depth

Also known as Castle Approach is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack.

81
New cards

Defense in depth framework

The first layer is a prevention mechanism that stops attacks from getting into the networking system.

The second layer is detection and response mechanisms that watch activities on systems and networks to detect attacks and repair the damage

The third layer is attack-resilient technologies that enable the core elements, or, the most valuable systems, on the network to survive attacks and continue to function.

82
New cards

Cyber Kill Chain

Adopts the concept of a procedural step-by-step attacking method consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target.

83
New cards

Reconnaissance

The attacker gathers information on the target before the actual attack starts.

84
New cards

Weaponization

Cyber attackers do not interact with the intended victim, instead they create their attack.

85
New cards

Delivery

Transmission of the attack to the intended victim(s).

86
New cards

Exploitation

This implies actual detonation of the attack, such as the exploit running on the system.

87
New cards

Installation

The attacker may install malware on the victim.

88
New cards

Command & Control (C&C)

This implies that once a system is compromised and / or infected, the system has to call home.

89
New cards

Actions on Objectives

Once the cyber attackers establish access to the organization, they then execute actions to achieve their objectives / goal.

90
New cards

Network mapping

The study of the connectivity of networks at the layer 3 on a TCP / IP network.

91
New cards

Vulnerability scanning

An inspection of the potential points of exploit on a computer or network to identify security holes.

92
New cards

Penetration testing

Attempts to identify insecure business processes, insecure system settings, or other weaknesses.

93
New cards

Frewall (FW)

A component or set of components that restricts access between a protected network and the Internet, or between other sets of networks.

94
New cards

Host

A computer system attached to a network.

95
New cards

Network Address Translation (NAT)

A procedure by which a router changes data in packets to modify the network addresses. This allows a router to conceal the addresses of network hosts on one side of it.

96
New cards

Perimeter network

A network added between a protected network and an external network in order to provide an additional layer of security. A perimeter network is sometimes called a DMZ.

97
New cards

Proxy

A program that deals with external servers on behalf of internal clients

98
New cards

Intrusion Prevention System (IPS)

a network security / threat prevention technology that examines network traffic flows to detect and prevent vulner ability exploits.

99
New cards

Intrusion Detection System (IDS)

a network security technology originally built for detecting vulnerability exploits against a target application or computer.

100
New cards

host-based logging

This approach minimizes the network traffic by transfer ring logs into a centralized log server; however, it incurs significant manage ment overhead to retrieve logging data from individual hosts.