1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cable Modem
Shared Bandwidth, coaxial cable, cable through TV signals
DSL Modem
Dedicated bandwidth, twisted pair copper cabling, telephone lines
SCADA (Supervisory Control and Data Acquisition)
Control System architecture for high-level supervision of machines and processes. Consists of computers, networked data communication, …
ICS (Industrial Control Systems)
Protects industrial control systems that manage critical infrastructure
Firewall
Allows only packets that pass specific security restriction. Both software and hardware solutions
Network-based Firewall
Companies use to protect their private network from public networks. Designing characteristic it’s also designed to protect an entire network of computers instead of just one system
Host-based Firewall
Implemented on a single machine, it protects only that one machine
Next Generation Firewall (NGFW)
Layer 7 firewall attempts to address traffic inspection and application awareness shortcomings of a traditional stateful firewall, without hampering the performance
Switch
Hardware based bridging (ASIC), wire-speed, low latency, low cost. They don’t break up broadcast domains, multiple spanning tree instance, more ports. Connects multiple segments of network together like hubs, but recognizes frames, pays attention to source and destination MAC address of the incoming frame
Bridges
Software based and break up collision domains, but the network is still one big broadcast domain. Learn MAC address by examining the source address of each frame. Layer 2 device uses MAC address to make forwarding decisions. Either connect 2 segments together or divided a busy network into 2 segments.
Hub
Device that connects all segments of the network together in a star topology. Layer 1 device no intelligence
Modem
Modulator-demodulator, device that modules an analog carrier signal to encode digital information and demodulates the signal to decode the transmitted information
Wireless Controllers
Every wireless enterprise manufacturer has a controller to manage the APs in the network. APs are lightweight, no full operating system runing on them. (Thin AP)
Wireless Access Points (WAP) (AP)
At least one antenna (Typically 2 for better reception) up to 8 support 802.11ac). A bridge between wireless clients and wired networks. Using one ISP provided global IP address to multiplex numerous local IP address (Thick AP)
Wireless Range Extenders
Radios and antennas that operate in the same frequency or channel and receive the signal as a station.
Media Converter
Converts from one type of cabling to another type
Voice Over Internet Protocol (VoIP) Endpoint
Desktop phone systems or wireless phone systems that are part of the converged networks where data and voice traffic are combined. More flexibility and freedom in location
VoIP gateway
Network device that helps to convert voice and fax calls between an IP network and Public Switched Telephone Network (PSTN). Supports at least 2 T1/E1 digital channels. At least 1 ethernet and telephone port features
VoIP PBx (Private Branch Exchange)
Private telephone switch that resides on the customer premises. Direct connection to the telecommunication provides switch. Can switch calls between VoIP user and traditional user to between 2 traditional telephone users
MultiLayer Switch (MLS)
Computer networking device that operates on Layer 2 and Layer 3
Load Balancer
Send incoming packets to multiple machines hidden behind one IP address. Depending on your needs, you can set rules based on fault tolerance, fastest response times
Proxy Server
Type of server that handles its client machine requests by forwarding them on to other servers while allow granular control over the traffic between the local LAN and internet
Web Proxy Server
Used to create a web cache (loads faster and may store personal information)
Caching Proxy Server
Speeds up network’s service requests by recovering information from a client’s earlier request. Keeps local copies of the resources requested often, minimizes upstream use of bandwidth
Intrusion Detection Systems (IDS)
Actively prevent and block intrusions based on rules
Intrusion Prevention System (IPS)
Sends an alarm, creation correlation rules and remediation, drop malicious packets, provide malware protection, and reset connection of source hosts