Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Notes For Computer Networks

Rating
-
Sold
-
Pages
2
Uploaded on
10-04-2023
Written in
2022/2023

The provided information is a brief overview of computer networking concepts, devices, and protocols. It starts by introducing the OSI reference model and its seven layers. It then goes on to discuss various network devices such as switches, routers, firewalls, and intrusion detection and prevention systems. The information also covers VPNs, SSL, TACACS+, DHCP, and DNS servers, including their processes and components. The text explains how DNS servers work, how they delegate requests to TLD and second-level servers, and the difference between authoritative and non-authoritative responses. Overall, the text provides a basic understanding of computer networking and its various components.

Show more Read less
Institution
Course

Content preview

It will prepare you to configure and troubleshoot computer networks. The OSI
reference model has seven layers. layer one is the physical layer. layer two
is data link. layer three is network layer four is transport layer five is session.
layer six is presentation and layer seven is application. The first layer two device
that we ’re going to talk about is the switch. A switch utilizes an application
specific integrated circuit chip and a basic chip. The ASIC chip has specific
programming that allows the switch to learn when a device is on the network
and which ports it is connected to via that devices layer two MAC address.
The whap whap is a specific type of network bridge that connects or bridges
, wireless network segments with wired network segments. The most common
type of web bridges and 802 dot 11 wireless network segment with an 802 dot
three Ethernet network segment. A router can communicate with both local and
non local network devices in what it considers to be the best possible route to
reach those networks. A firewall can block packets from entering or leaving the
network. IDs and IDs are passive systems designed to identify when a network
breach or attack is occurring. They’re usually designed to inform a network
administrator when a breach has occurred.
IPS an IPS is an active system designed to stop a breach or attack from suc-
ceeding and damaging the network. IPS are programmed to make an active
response to the situation. They can block the offending IP address, close down
vulnerable interfaces, terminate network sessions and redirect the attack. The
best placement on the network segment is between a router with a firewall and
the destination network segment. A virtual private network or VPN is used by
remote hosts to access a private network through an encrypted tunnel through
a public network. There are several different types of VPNs there is the site
to site VPN, which allows a remote sites network to connect to the main sites
network and be seen as a local network segment. The use of the VPN can help
to reduce networking costs. A VPN concentrator on the local network manages
the connection. The host seeking to connect uses a web browser that supports
the correct encryption technology. The big protocol for VPN is called Internet
Protocol security IPsec. IP sec implements Internet Security Association and
key management eisah camp by default.
All modern web browsers support the secure socket layer or SSL. SSL is an
older cryptographic protocol that is very similar to TLS. The most common
use is in creating a secure encrypted internet session or SSL VPN. The Nic is
how a device connects to a network. It provides the functional means of network
communication by determining which networking protocols will be used. TAC x
plus is a triple A protocol used to help ensure that only authenticated end users
are using the network resources they are authorized to use. The accounting
services of radius are very robust. The only drawback to radius is only the
requesters the end users password is encrypted. Then we have web services
creating a means of cross communication. Web Services provides the means
for communication between software packages or disparate platforms. static IP
address assignment works fine for very small and stable networks, but quickly
becomes unwieldly and error prone as the network grows. static IP addresses


1

Written for

Course

Document information

Uploaded on
April 10, 2023
Number of pages
2
Written in
2022/2023
Type
SUMMARY

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
Saumilpatel

Get to know the seller

Seller avatar
Saumilpatel LJIET
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
15
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions