CS/IS 190 Final Review Final Exam: Wednesday, Oct. 21.

Slides:



Advertisements
Similar presentations
Module 4: Configuring Network Connectivity
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 4: Configuring Network Connectivity
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
WAN Technologies Dial-up modem connections Cheap Slow
CS/IS 190 Final Review Final Exam: Wednesday, April 8.
1 Chapter Overview Using Remote Connections SLIP and PPP WAN Technologies.
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
IST 201 Chapter 5. LAN Technologies Ethernet – most widely used technology in LANS In 1970, developed and implemented by: Digital Intel Xerox IEEE
Basic Computer Network
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
IS Network and Telecommunications Risks
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Remote Networking Architectures
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott.
Windows Server 2008 Chapter 9 Last Update
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Networking Technologies
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
1 Chapter Overview Network devices. Hubs Broadcast For star topology Same as a repeater Operate at the physical layer 2.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
WAN Technologies Dial-up modem connections
Modems Mostly used to connect PCs to the Internet Modulates and demodulates the signal Converts analog data into digital and vice versa V.90/V.92 56K standards.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
 Spring 2011  CSCI 27 Computer Networking Course Overview.
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Network Fundamentals. Network Devices Routers (Layer 3)
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
Troubleshooting Tools Kyle Broussard and Alexandra Mikolai.
CEG 2400 FALL 2012 Chapter 10 Virtual Networks and Remote Access 1.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
CIS 173 Networking Week #13 Objectives Grade Homework Chapter #10 Lecture Chapter #12.
CompTIA Network+ Certification Exam Question Answer N
Windows Vista Configuration MCTS : Advanced Networking.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
CompTIA Network+ Certification Exam
MTA Network Fundamental Cram Sesion
CompTIA Network+ N Authorized Cert Guide
Instructor Materials Chapter 6 Building a Home Network
Working at a Small-to-Medium Business or ISP – Chapter 8
CONNECTING TO THE INTERNET
Network Infrastructure
Planning and Troubleshooting Routing and Switching
Installing and Troubleshooting Networks
Final Exam: Wednesday, October 18
CompTIA Network+ Certification Exam
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

CS/IS 190 Final Review Final Exam: Wednesday, Oct. 21

Final Overview Chapters 12 through 21 Multiple Choice Similar to questions at the end of each chapter and in the homeworks 50 questions You will have the full class time to complete

Chapter 12 Client / Server Peer to Peer (P2P) Virtual Private Network (VPN) – Point-to-Point Tunneling Protocol (PPTP) – Routing and Remote Access Service (RRAS) Layer 2 Tunneling Protocol (L2TP) Virtual Local Area Networks (VLANs) – Trunking : 802.1Q trunk standard – Static VLAN vs. Dynamic VLAN

Chapter 12 Multilayer Switches DNS Load Balancing Quality of Service (QoS) Traffic shaping Intrusion detection system (IDS) Intrusion prevention system (IPS) Port Mirroring Proxy Servers

Chapter 13 IPV6 128 Bits How to write addresses and how to shorten addresses 8 groups of four hexadecimal characters Leading zeros can be dropped from any group Use double colon to show groups of zeroes Link-Local Address (always starts with FE80:)

Chapter 13 Subnet masks – No subnet is ever longer than /64 Unicast Multicast Anycast Global Unicast Address (Global Address) – Gets from router – Required to use the Internet Aggregation

Chapter 13 DHCP in IPv6 – Stateful – Stateless Using tunnels for IPv6 – Tunnel Broker

Chapter 14 Remote Connectivity Plain Old Telephone Service (POTS) Multiplexers Frequency Division Multiplexing (FDM) DS0 (64 Kbps) T1 Line – 24 DS0 channels – Mbps

Chapter 14 T3 Line – About 43 Mbps – 672 DS0 channels CSU/DSU

Chapter 14 Fiber Carriers SONET and OC OC-1 – Mbps The rest of the OC multiply the number to get the speed : OC-3 is * 3 = Mbps

Chapter 14 Packet Switching – Frame Relay – Asynchronous Transfer Mode (ATM) – Public Switched Telephone Network (PSTN) – Modems Convert analog signals to digital and vice versa Universal Asynchronous Receiver/Transmitter (UART) Baud vs. Bits Per second – ISDN Basic Rate Interface (BRI) = 128 Kbps Primary Rate Interface (PRI) = Mbps (T1 Line)

Chapter 14 DSL – SDSL – ADSL – VDSL Cable Internet (DOCSIS protocol) Satellite Wireless Fiber Optics Powerline

Chapter 14 Remote Access – Dial – up – Private Dial-up – VPNs – Dedicated Connections – Remote Terminals, Remote Desktop – Voice over IP (VoIP)

Chapter 15 Wireless Networking Modes: – Ad Hoc Mode (Peer to Peer mode) – Infrastructure Mode Link state vs. Signal strength Channels – 14 channels, only 11 allowed in U.S.A. [for the 2.4 GHz standards] CSMA/CA

Chapter b a g n ac Security – MAC address filtering – Wireless authentication 802.1X RADIUS

Chapter 15 Data Encryption – Wired Equivalent Privacy (WEP) [not secure] – Wi-Fi Protected Access (WPA) [not secure] – WPA2 Uses AES (Advanced Encryption Standard) Power Over Ethernet Implementing Wi-Fi – Placing access points – Configuration – Extending the Network Adding a WAP Wireless Bridge

Chapter 16 Virtualization Hypervisor Virtual Machine Manager (VMM) Guest Operating System Emulation vs. Virtualization Why? – The VM that is shut down is a file or folder – Power Saving – Hardware Consolidation – System Recovery – System Duplication – Research

Chapter 16 Virtual Switches Virtual NICs Virtual PBXs Network as a Service (NaaS) Storage Area Networks (SANs) Network Attached Storage (NAS)

Chapter 17 Building a real-world network – List of requirements – Device types/requirements – Environment limitations – Equipment limitations – Compatibility requirements – Wired/wireless considerations – Security considerations

Chapter 17 Equipment Room – Power converters Change AC to DC Electrical Limits VLANs IP address scheme External Connections – Gateway router – Choose ISP Security Network Segmentation – Layer 1 – Air gap – Layer 2 – VLANs – Layer 3 – subnets – Above layer 3

Chapter 18 Managing Risk Security Policies – Acceptable Use Policy – Network Access Policy Change management Patching and Updates Points of Failure – Avoid single point of failure – High Availability

Chapter 18 Security Preparedness – Vulnerability Scanning – Penetration Testing (pentest) Contingency Planning – Disaster Recovery – Business Continuity Cold site Warm site Hot site

Chapter 18 Emergency Procedures – Building Layout – Fire escape plan – Safety/emergency exits – Fail open / Fail close – Emergency alert system

Chapter 19 Protecting your Network Spoofing Packet / Protocol Abuse ARP cache poisoning Denial of Service (DoS) Distributed DoS (DDos) Man in the Middle

Chapter 19 Malware Virus Worm Macro Trojan Rootkit Adware/Spyware

Chapter 19 Social Engineering Phishing Unnecessary Running Services Unpatched / Legacy Systems Unencrypted Channels Physical Security Network Security – Controlling User Accounts Principle of least privelege

Chapter 19 Firewalls – Network based – Host Based – Stateful vs. Stateless Access Control Lists (ACLs) Network Zones – Demilitarized Zone (DMZ) Honeypots and Honeynets

Chapter 20 Network Monitoring SNMP Packet Sniffers / Protocol Analyzers – Wireshark – Run in NIC in promiscuous mode Performance Monitors – Windows Performance Monitor (PerfMon) – Linux’s syslog

Chapter 21 Network Troubleshooting Hardware Tools – Cable Testers – TDR – OTDR – Certifiers – Voltage Recorders / Temp. Monitors – Protocol Analyzer – Cable Strippers / Snips – Multimeters – Toners – Butt Sets – Punchdown tools

Chapter 21 Software Tools Traceroute Ipconfig / Ifconfig Ping, pathping, and ARP Ping NSLookup Hostname My Traceroute (MTR) Route (Route Print or netstat -r) Packet Sniffers Port Scanners Throughput testers

Chapter 21 Troubleshooting Process: 1. Identify the problem 2. Establish a theory of probable cause. 3. Test the theory to determine cause. 4. Establish a plan of action to resolve the problem and identify potential effects. 5. Implement the solution and escalate as necessary. 6. Verify full system functionality and, if applicable, implement preventative measures. 9. Document findings, actions, and outcomes.

Final Exam Bring a #2 pencil and eraser. Mr. Hodges will supply the scantron form. Closed book, closed notes, closed computer Focus on items which were discussed in class 5 Extra Credit Questions which may be scenario-based like the questions seen on the CompTIA Network+ Exam.