SDN, hypervisors, VMs, fog computing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Software-Defined Networking (SDN)

A network architecture approach that enables the network to be intelligently and centrally controlled, or programmed, using software applications.

2
New cards

Control plane

Decides traffic prioritization and security.

3
New cards

Data plane

Handles actual traffic routing and access controls.

4
New cards

Management plane

Monitors network traffic and status.

5
New cards

Northbound API

Interfaces between SDN applications and the controller.

6
New cards

Southbound API

Interfaces between the controller and network devices.

7
New cards

How does SDN simplify network management?

By centralizing policy decisions and automating the configuration of devices through APIs, which reduces the hassle of setting it up manually.

8
New cards

What are the main benefits of SDN for large-scale networks?

Centralized management.

Simplified configuration.

Improved scalability and flexibility.

Enhanced security through consistent policy enforcement.

9
New cards

What is typically found in the control plane of SDN?

SDN controller

Policy management tools

Algorithms for traffic routing and prioritization

10
New cards

What is typically found in the data plane of SDN?

Physical and virtual switches

Routers

Firewalls

11
New cards

What is typically found in the management plane of SDN?

Monitoring tools for traffic and network performance

Applications for fault detection and resolution

Configuration management systems

12
New cards

Which SDN plane directly processes and forwards data packets through the network?

data plane

13
New cards

How does the management plane support network administrators?

By providing tools to monitor and analyze network performance, detect faults, and optimize configurations.

14
New cards

What plane is involved in tasks like traffic prioritization, quality of service (QoS), and routing strategies?

control plane

15
New cards

CSP

examples are AWS, Google cloud, microsoft azure, IBM cloud

16
New cards

Private cloud

wholly owned and operated by the organization

17
New cards

hosted private cloud

Private instance operated by a CSP but dedicated to a single customer

18
New cards

SaaS

examples are MS 365, MS Outlook

19
New cards

IaaS

A cloud computing technology useful for heavily utilized systems and networks. Organizations can limit their hardware footprint and personnel costs by renting access to hardware such as servers.

20
New cards

PaaS

Provides cloud customers with an easy-to-configure operating system and on-demand computing capabilities. examples are the .net framework or java

21
New cards

SECaaS

A computing method that enables clients to take advantage of information, software, infrastructure, and processes provided by a cloud vendor in the specific area of computer security.

22
New cards

Type I Hypervisor (Bare Metal)

Runs directly on the host hardware and functions as the operating system

23
New cards

Type II Hypervisor (Hosted)

Runs as a software layer on an operating system (OS), like other computer programs. Installed on top of an OS as an application.

examples are virtual box, parallels, VMWare virtual machine

24
New cards

VDI (Virtual Desktop Infrastructure)

Company provides a "thin client" to the user where the desktop resides on a centralized server. Connection is made through a remote desktop

25
New cards

VDE (virtual desktop environment)

Users access virtual desktops hosted remote servers

26
New cards

Application virtualization

Hosting or streaming individual software applications on a server

examples are: XenApp, App-V, ThinApp

27
New cards

Container Virtualization

specialized version of Type II Hypervisor; allows services/applications to run within their own isolated cells/containers; don't have full OS but use kernel of host

28
New cards

VM escape

A timing attack that allows an attacker to access the host system from within a virtual machine and allows malware to jump from one VM to another.

29
New cards

VM Escape Protection

One way to protect is to keep hosts and guests up to date with current patches. Create security zones or DMZs as mitigation; the BEST way to prevent is to limit the ability of the host and the VM to share resources. If possible, they should not share any resources.

30
New cards

VM Sprawl Avoidance

A phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively.

A policy for developing and deploying VMs must be established and enforced. A system may even be brought up for a minute to test however, it remain up for years unsecured and unpatched

31
New cards

Monolithic client/server application

applications are all managed on a single, unified system and treating the network infrastructure like a large inseparable unit.

32
New cards

Service-oriented architecture (SOA)

A robust set of Web services built around an organizations processes and procedures.

33
New cards

Microservices

A software architecture that is composed of smaller modules that interact through APIs and can be updated without affecting the entire system.

34
New cards

Fog Computing

Provisioning processing resource between the network edge of IoT devices and the data center to reduce latency.

35
New cards

BaaS

provides the backend infrastructure for mobile and web applications such as data storage, user authentication, and APIs.

36
New cards

FaaS

function as a service, a cloud service model that supports server-less software architecture by provisioning runtime containers in which code is executed in a particular programming language

37
New cards

Cloud security access broker (CASB)

Mediate access to cloud services by enterprise users across all types of devices

38
New cards

Idempotence

A property of IaC that an automation or orchestration action always produces the same result, regardless of the component's previous state

39
New cards

Infrastructure as code (IaC)

The process of managing and provisioning computer data centers through machine-readable definition files, scripting, automation and orchestration rather than physical hardware configuration or interactive configuration tools. Reduces snowflakes and configuration drift

40
New cards

Which of the following BEST describes an SDN controller?

it is a networking protocol
it is a virtual networking device
it is hardware
it is software

it is software

41
New cards

Applications and services are intended for a specific organization or entity, such as the government are considered this type of cloud

hybrid
private
community
public

private

42
New cards

Out of the choices listed, which are considered Type II hypervisors? Select 3: 

Virtual Box
Microsoft Hyper-V
Citrix Xenserver
Parallels
VMWare Workstation
VMWare vSphere server

Parallels
VMWare Workstation
Virtual Box

43
New cards

This cloud service would use network hardware such as routers and switches


SaaS

WaaS

BaaS

IaaS

IaaS

44
New cards

Out of the choices listed, which best describes the function of a control plane in SDN?

building a routing table and dynamic routing table updates

45
New cards

Which of the following BEST describes the Physical SDN layer?

also known as the infrastructure layer

46
New cards

Type of hypervisor most likely used in a data center

Type I

47
New cards

Which SDN layer would be a load balancer that stop and starts VMs as a resource use increases?

application

48
New cards

Out of the choices listed, which best describes the function of a data plane in SDN?

forwarding traffic flows; encrypting traffic

49
New cards

OpenFlow is the most popular type of this type of software designed to separate a control plane from a data plane and provide for greater flexibility: 

SDN

50
New cards

When virtualization reaches the point where IT can not effectively manage it, this may happen. For example, a system is up for a minute to test but remains up for years unsecured.

VM Sprawl