100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Samenvatting Netwerken, Toegepaste Informatica $8.60   Add to cart

Summary

Samenvatting Netwerken, Toegepaste Informatica

 8 views  0 purchase
  • Course
  • Institution

Samenvatting Netwerken, Toegepaste Informatica.

Preview 4 out of 47  pages

  • May 30, 2024
  • 47
  • 2022/2023
  • Summary
avatar-seller
Quinten Maas




NETWERKEN
INHOUD

Module 3: protocols en models .............................................................................................................................. 5
Osi-model ............................................................................................................................................................ 5
TCP/IP Protocol suite........................................................................................................................................... 6
TCP/IP Model ...................................................................................................................................................... 6
Encaptulation ...................................................................................................................................................... 6
decaptulation ...................................................................................................................................................... 7
The Physical Layer ............................................................................................................................................... 7
kabels .................................................................................................................................................................. 7
Data link sublayers .............................................................................................................................................. 8
Topologies ........................................................................................................................................................... 8
WAN topologies .............................................................................................................................................. 8
Lan topologies ................................................................................................................................................. 8
Half and full duplex communication ............................................................................................................... 9
Access Control Methods ................................................................................................................................. 9
The Data link frame ......................................................................................................................................... 9
Module 4: Physical Layer (STD) ............................................................................................................................. 10
Purpose of the Physical Layer ........................................................................................................................... 10
Physical Layer Characteristics ........................................................................................................................... 10
Physical Components .................................................................................................................................... 11
encoding ........................................................................................................................................................ 11
signaling ........................................................................................................................................................ 11
Bandwidth ..................................................................................................................................................... 11
Copper Cabling .................................................................................................................................................. 12
Unshielded Twisted Pair (UTP) ...................................................................................................................... 12
Shielded Twisted Pair (STP) ........................................................................................................................... 13
Coaxial Cable ................................................................................................................................................. 14
Fiber-Optic Cabling ............................................................................................................................................ 14
Fiber vs Koper.................................................................................................................................................... 15
Wireless Media.................................................................................................................................................. 16
WLAN ............................................................................................................................................................ 16
Module 5: Number systems .................................................................................................................................. 16
IPv4 adressen ................................................................................................................................................ 16
Om decimaal naar binair om te zetten ......................................................................................................... 17




1

,Quinten Maas




Ipv6 adressen ................................................................................................................................................ 17
MAC adressen ................................................................................................................................................... 17
Speed and forwarding methods ........................................................................................................................ 17
Module 6: Data link layer ...................................................................................................................................... 18
Purpose of the Data Link Layer ......................................................................................................................... 18
topologies.......................................................................................................................................................... 18
WAN .............................................................................................................................................................. 18
LAN ................................................................................................................................................................ 18
Half en Full duplex communicatie ................................................................................................................. 19
Access control methodes .............................................................................................................................. 19
Data Link Frame ................................................................................................................................................ 19
Module 7: Ethernet Switching .............................................................................................................................. 20
Frames ............................................................................................................................................................... 20
MAC sublayer ................................................................................................................................................ 20
Frame fields ................................................................................................................................................... 21
Ethernet MAC Address ...................................................................................................................................... 21
Het proces ..................................................................................................................................................... 21
Unicast .......................................................................................................................................................... 21
Broadcast ...................................................................................................................................................... 21
Multicast ....................................................................................................................................................... 22
The MAC Address Table .................................................................................................................................... 22
Switch Fundamentals .................................................................................................................................... 22
learning ......................................................................................................................................................... 22
Forwarding .................................................................................................................................................... 22
Filtering frames ............................................................................................................................................. 23
Switch Speeds and Forwarding Methods .......................................................................................................... 23
Memory Buffering ......................................................................................................................................... 23
Duplex and Speed ......................................................................................................................................... 23
Auto-MDIX..................................................................................................................................................... 24
Module 8: Network layer ...................................................................................................................................... 24
karakterestieken ........................................................................................................................................... 24
Ipv4 pakket .................................................................................................................................................... 25
Host routes .................................................................................................................................................... 25
IPv6 pakket .................................................................................................................................................... 26
routing ........................................................................................................................................................... 26
Module 9: Address Resolution .............................................................................................................................. 27
MAC and IP .................................................................................................................................................... 27




2

,Quinten Maas




ARP ................................................................................................................................................................ 27
Module 10: Basic Router Configuration ................................................................................................................ 28
Configure Initial Router Settings ................................................................................................................... 28
Configure Interfaces ...................................................................................................................................... 28
Configure the Default Gateway ..................................................................................................................... 29
module 11: IPv4 Addressing .................................................................................................................................. 29
structuur........................................................................................................................................................ 29
types .............................................................................................................................................................. 30
Network Segmentation ................................................................................................................................. 30
Module 12: IPv6 adressing .................................................................................................................................... 31
unicast ........................................................................................................................................................... 31
GUA ............................................................................................................................................................... 31
Dynamic LLAs ................................................................................................................................................ 31
IPv6 Multicast Addresses .............................................................................................................................. 32
Subnet An IPv6 Network ............................................................................................................................... 32
Module 13: ICMP .................................................................................................................................................. 32
ICMPv6 Messages ......................................................................................................................................... 33
Ping and Traceroute Tests ............................................................................................................................. 33
Module 14: Transport Layer .................................................................................................................................. 34
TCP .................................................................................................................................................................... 34
header ........................................................................................................................................................... 34
UDP ................................................................................................................................................................... 35
header ........................................................................................................................................................... 35
Poort nummers ................................................................................................................................................. 36
Socket Pairs ................................................................................................................................................... 36
groepen ......................................................................................................................................................... 36
TCP Communication Process ............................................................................................................................. 37
begin sessie ................................................................................................................................................... 37
Eindig sessie .................................................................................................................................................. 37
Three-Way Handshake Analysis .................................................................................................................... 37
Reliability and Flow Control .............................................................................................................................. 38
Data Loss and Retransmission ....................................................................................................................... 38
Window Size and Acknowledgments ............................................................................................................ 38
Maximum Segment Size ................................................................................................................................ 38
Congestion Avoidance ................................................................................................................................... 38
UDP Communication ......................................................................................................................................... 39
Module 15: application layer ................................................................................................................................ 39




3

, Quinten Maas




Application, Presentation, and Session ............................................................................................................. 39
aplicatielaag protocols .................................................................................................................................. 39
Peer-to-Peer ...................................................................................................................................................... 40
applicaties ..................................................................................................................................................... 40
Web and Email Protocols .................................................................................................................................. 40
HTTP en HTTPS .............................................................................................................................................. 40
Email Protocols.............................................................................................................................................. 41
IP Addressing Services ....................................................................................................................................... 41
Domain name service .................................................................................................................................... 41
Message Format ............................................................................................................................................ 41
Hierarchy ....................................................................................................................................................... 42
Nslookup ....................................................................................................................................................... 42
Dynamic Host Configuration Protocol (DHCP) .............................................................................................. 42
File Sharing Services .......................................................................................................................................... 43
File Transfer Protocol(FTP) ............................................................................................................................ 43
Server Message Block (SMB) ......................................................................................................................... 43
Module 16: Network Security Fundamentals ....................................................................................................... 43
Security Threats and Vulnerabilities ................................................................................................................. 43
Network Attacks ................................................................................................................................................ 44
malware ........................................................................................................................................................ 44
Reconnaissance Attacks ................................................................................................................................ 44
Access Attacks ............................................................................................................................................... 44
Denial of Service Attacks (DoS) ..................................................................................................................... 45
Network Attack Mitigations .............................................................................................................................. 45
Defense-in-Depth Approach ......................................................................................................................... 45
backup ........................................................................................................................................................... 45
Firewalls ........................................................................................................................................................ 45
Endpoint Security .......................................................................................................................................... 46
Device Security .................................................................................................................................................. 46
wachtwoorden .............................................................................................................................................. 46
enable SSH..................................................................................................................................................... 46
Disable Unused Services ............................................................................................................................... 47




Op examen veel afkortingen gevraagd

Show run config




4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller quintenmaas. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.60. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.60
  • (0)
  Add to cart