Samenvatting
Samenvatting Netwerken, Toegepaste Informatica
8 keer bekeken
0 keer verkocht
Samenvatting Netwerken, Toegepaste Informatica.
[Meer zien]
Voorbeeld 4 van de 47 pagina's
Geupload op
30 mei 2024
Aantal pagina's
47
Geschreven in
2022/2023
Type
Samenvatting
€7,99
100% tevredenheidsgarantie
Direct beschikbaar na betaling
Zowel online als in PDF
Je zit nergens aan vast
Quinten Maas
NETWERKEN
INHOUD
Module 3: protocols en models .............................................................................................................................. 5
Osi-model ............................................................................................................................................................ 5
TCP/IP Protocol suite........................................................................................................................................... 6
TCP/IP Model ...................................................................................................................................................... 6
Encaptulation ...................................................................................................................................................... 6
decaptulation ...................................................................................................................................................... 7
The Physical Layer ............................................................................................................................................... 7
kabels .................................................................................................................................................................. 7
Data link sublayers .............................................................................................................................................. 8
Topologies ........................................................................................................................................................... 8
WAN topologies .............................................................................................................................................. 8
Lan topologies ................................................................................................................................................. 8
Half and full duplex communication ............................................................................................................... 9
Access Control Methods ................................................................................................................................. 9
The Data link frame ......................................................................................................................................... 9
Module 4: Physical Layer (STD) ............................................................................................................................. 10
Purpose of the Physical Layer ........................................................................................................................... 10
Physical Layer Characteristics ........................................................................................................................... 10
Physical Components .................................................................................................................................... 11
encoding ........................................................................................................................................................ 11
signaling ........................................................................................................................................................ 11
Bandwidth ..................................................................................................................................................... 11
Copper Cabling .................................................................................................................................................. 12
Unshielded Twisted Pair (UTP) ...................................................................................................................... 12
Shielded Twisted Pair (STP) ........................................................................................................................... 13
Coaxial Cable ................................................................................................................................................. 14
Fiber-Optic Cabling ............................................................................................................................................ 14
Fiber vs Koper.................................................................................................................................................... 15
Wireless Media.................................................................................................................................................. 16
WLAN ............................................................................................................................................................ 16
Module 5: Number systems .................................................................................................................................. 16
IPv4 adressen ................................................................................................................................................ 16
Om decimaal naar binair om te zetten ......................................................................................................... 17
1
,Quinten Maas
Ipv6 adressen ................................................................................................................................................ 17
MAC adressen ................................................................................................................................................... 17
Speed and forwarding methods ........................................................................................................................ 17
Module 6: Data link layer ...................................................................................................................................... 18
Purpose of the Data Link Layer ......................................................................................................................... 18
topologies.......................................................................................................................................................... 18
WAN .............................................................................................................................................................. 18
LAN ................................................................................................................................................................ 18
Half en Full duplex communicatie ................................................................................................................. 19
Access control methodes .............................................................................................................................. 19
Data Link Frame ................................................................................................................................................ 19
Module 7: Ethernet Switching .............................................................................................................................. 20
Frames ............................................................................................................................................................... 20
MAC sublayer ................................................................................................................................................ 20
Frame fields ................................................................................................................................................... 21
Ethernet MAC Address ...................................................................................................................................... 21
Het proces ..................................................................................................................................................... 21
Unicast .......................................................................................................................................................... 21
Broadcast ...................................................................................................................................................... 21
Multicast ....................................................................................................................................................... 22
The MAC Address Table .................................................................................................................................... 22
Switch Fundamentals .................................................................................................................................... 22
learning ......................................................................................................................................................... 22
Forwarding .................................................................................................................................................... 22
Filtering frames ............................................................................................................................................. 23
Switch Speeds and Forwarding Methods .......................................................................................................... 23
Memory Buffering ......................................................................................................................................... 23
Duplex and Speed ......................................................................................................................................... 23
Auto-MDIX..................................................................................................................................................... 24
Module 8: Network layer ...................................................................................................................................... 24
karakterestieken ........................................................................................................................................... 24
Ipv4 pakket .................................................................................................................................................... 25
Host routes .................................................................................................................................................... 25
IPv6 pakket .................................................................................................................................................... 26
routing ........................................................................................................................................................... 26
Module 9: Address Resolution .............................................................................................................................. 27
MAC and IP .................................................................................................................................................... 27
2
,Quinten Maas
ARP ................................................................................................................................................................ 27
Module 10: Basic Router Configuration ................................................................................................................ 28
Configure Initial Router Settings ................................................................................................................... 28
Configure Interfaces ...................................................................................................................................... 28
Configure the Default Gateway ..................................................................................................................... 29
module 11: IPv4 Addressing .................................................................................................................................. 29
structuur........................................................................................................................................................ 29
types .............................................................................................................................................................. 30
Network Segmentation ................................................................................................................................. 30
Module 12: IPv6 adressing .................................................................................................................................... 31
unicast ........................................................................................................................................................... 31
GUA ............................................................................................................................................................... 31
Dynamic LLAs ................................................................................................................................................ 31
IPv6 Multicast Addresses .............................................................................................................................. 32
Subnet An IPv6 Network ............................................................................................................................... 32
Module 13: ICMP .................................................................................................................................................. 32
ICMPv6 Messages ......................................................................................................................................... 33
Ping and Traceroute Tests ............................................................................................................................. 33
Module 14: Transport Layer .................................................................................................................................. 34
TCP .................................................................................................................................................................... 34
header ........................................................................................................................................................... 34
UDP ................................................................................................................................................................... 35
header ........................................................................................................................................................... 35
Poort nummers ................................................................................................................................................. 36
Socket Pairs ................................................................................................................................................... 36
groepen ......................................................................................................................................................... 36
TCP Communication Process ............................................................................................................................. 37
begin sessie ................................................................................................................................................... 37
Eindig sessie .................................................................................................................................................. 37
Three-Way Handshake Analysis .................................................................................................................... 37
Reliability and Flow Control .............................................................................................................................. 38
Data Loss and Retransmission ....................................................................................................................... 38
Window Size and Acknowledgments ............................................................................................................ 38
Maximum Segment Size ................................................................................................................................ 38
Congestion Avoidance ................................................................................................................................... 38
UDP Communication ......................................................................................................................................... 39
Module 15: application layer ................................................................................................................................ 39
3
, Quinten Maas
Application, Presentation, and Session ............................................................................................................. 39
aplicatielaag protocols .................................................................................................................................. 39
Peer-to-Peer ...................................................................................................................................................... 40
applicaties ..................................................................................................................................................... 40
Web and Email Protocols .................................................................................................................................. 40
HTTP en HTTPS .............................................................................................................................................. 40
Email Protocols.............................................................................................................................................. 41
IP Addressing Services ....................................................................................................................................... 41
Domain name service .................................................................................................................................... 41
Message Format ............................................................................................................................................ 41
Hierarchy ....................................................................................................................................................... 42
Nslookup ....................................................................................................................................................... 42
Dynamic Host Configuration Protocol (DHCP) .............................................................................................. 42
File Sharing Services .......................................................................................................................................... 43
File Transfer Protocol(FTP) ............................................................................................................................ 43
Server Message Block (SMB) ......................................................................................................................... 43
Module 16: Network Security Fundamentals ....................................................................................................... 43
Security Threats and Vulnerabilities ................................................................................................................. 43
Network Attacks ................................................................................................................................................ 44
malware ........................................................................................................................................................ 44
Reconnaissance Attacks ................................................................................................................................ 44
Access Attacks ............................................................................................................................................... 44
Denial of Service Attacks (DoS) ..................................................................................................................... 45
Network Attack Mitigations .............................................................................................................................. 45
Defense-in-Depth Approach ......................................................................................................................... 45
backup ........................................................................................................................................................... 45
Firewalls ........................................................................................................................................................ 45
Endpoint Security .......................................................................................................................................... 46
Device Security .................................................................................................................................................. 46
wachtwoorden .............................................................................................................................................. 46
enable SSH..................................................................................................................................................... 46
Disable Unused Services ............................................................................................................................... 47
Op examen veel afkortingen gevraagd
Show run config
4