Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

DNS – server service that maps domain names to IP addresses (Domain Name System)

No DNS – we need to remember every IP of every site

DHCP – dynamically assigns IP addresses to computers when they connect to the servers (Dynamic Host
Configuration Protocol)

Dynamic DNS setup – in order to modern network to work properly

When a DHCP server is given a IP address to a client computer:

1. is given the IP address to a client computer

2. it’s telling the DNS server what the IP address of the client computer is

Dynamic DNS is DHSP dynamically writing to the DNS table to map the host names to IP addresses

If you have a DHCP server and it’s not talking to the DNS server, the DHCP server will continuously give
out IP addresses. That information will not be recorded to the DNS server so if you try to ping ( eg PC 2 )
and dynamic DNS has not been setup , that will not work because within the DNS server, that
information has not been reached

Reverse DNS – Maps the IP address the domain name

How it works? ( https://www.youtube.com/watch?v=VwpP8PUzqLw

https://www.youtube.com/watch?v=6c3mwjjr3AQ )

Networking General stuff


Protocol: a defined standard that computers must follow in order to communicate properly

Ping - “Packet Internet or Inter-Network Groper"

- to check the status of a server

- ping test can tell you how fast your connection is.

- low pings equal better connections

- If the ping is too high, your computer takes a while to send and receive information

- usually measured in milliseconds, which is why ping usually displays its speed in “ms"

Border Gateway Protocol (BGP)


Border Gateway Protocol (BGP) is a routing protocol used to transfer data and information between
different host gateways, the Internet or autonomous systems. BGP is a Path Vector Protocol (PVP),
which maintains paths to different hosts, networks and gateway routers and determines the routing
decision based on that. It does not use Interior Gateway Protocol (IGP) metrics for routing decisions, but
only decides the route based on path, network policies and rule sets.

Sometimes, BGP is described as a reachability protocol rather than a routing protocol.

TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols


used to interconnect network devices on the internet. TCP/IP can also be used as a communications
protocol in a private network

TCP defines how applications can create channels of communication across a network. It also
manages how a message is assembled into smaller packets before they are then transmitted over the
internet and reassembled in the right order at the destination address.

IP defines how to address and route each packet to make sure it reaches the right destination.
Each gateway computer on the network checks this IP address to determine where to forward the
message.

MAC(Media Access Control ) Addresses are unique 48-bits hardware number of a computer, which is
embedded into network card (known as Network Interface Card) during the time of manufacturing. MAC
Address is also known as Physical Address of a network device.

A router is a device that analyzes the contents of data packets transmitted within a network or to
another network. Routers determine whether the source and destination are on the same network or
whether data must be transferred from one network type to another, which requires encapsulating the
data packet with routing protocol header information for the new network type.

An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single
computer, printer, switch, router or any other device that is part of a TCP/IP-based network. The IP
address is the core component on which the networking architecture is built; no network exists without
it. An IP address is a logical address that is used to uniquely identify every node in the network.

A VLAN (virtual LAN) is a subnetwork which can group together collections of devices on separate
physical local area networks (LANs). Protocol VLAN; Static VLAN; Dynamic VLAN

A virtual private network (VPN) extends a private network across a public network, and enables users
to send and receive data across shared or public networks as if their computing devices were directly
connected to the private network. Applications running across the VPN may therefore benefit from the
functionality, security, and management of the private network

A proxy server acts as a gateway between you and the internet. It’s an intermediary server
separating end users from the websites they browse. Proxy servers are designed to filter
network traffic in order to prevent access to certain websites and it can monitor user web
activity. Also it can hide origin IP from the outside networks. For ex in business environments
your computer IP address will he unique to your local network while the internet will see
other/different provide by proxy server
Network switch is a device that that creates network in which multiple devices are connected
and share data.
Trucking is a method for a system to provide network access to many clients by sharing a set of
lines or frequencies instead of providing them individually. Is a networking system that provides
access to multiple clients without having to run separate connections for each ( telephony ). For
ex a business will have multiple phone lines that are connect to a Trunk Network Connection

CMD is an acronym for Command. Command prompt or CMD. Command prompt makes use of
the command line interface to interact with the User. In the Windows operating system, this
command prompt interface is implemented through the Win32 console. User can open the
interface by via the CMD run command or by going to its original location
C:\Windows\system32\cmd.exe.
Test delay and route of packets between two connections : CMD – tracert : you can see each
node jump and latency with information about each route taken
Route poisoning is a method to prevent a router from sending packets through a route that has
become invalid within computer networks.
Virtual machine, known as a guest, is created within a computing environment, called a host. Multiple
virtual machines can exist in one host at one time. Key files that make up a virtual machine include a log
file, NVRAM setting file, virtual disk file, and configuration file.

Virtual machines are software computers that provide the same functionality as physical
computers. Like physical computers, they run applications and an operating system. However,
virtual machines are computer files that run on a physical computer and behave like a physical
computer. In other words, virtual machines behave as separate computer systems.
Virtual machines are created to perform specific tasks that are risky to perform in a host
environment, such as accessing virus-infected data and testing operating systems.
When and where to use ipconfig ? use to find the ip address , the gateway ip or DNS IP address
assigned to the computer

TCP 3 way handshake – 3 steps which are required to from a TCP connection

- SYN : client initiates the connection by sending TCP SYN packet to server
- SYN-ACK The Server receives the packet and responds
- ACK The client acknowledge the response from server

How to check a Router’s Utilization and also check the processes on Router?
#sh processes cpu history - utilization

#sh processes cpu stored – processes

What is a firewall ?

Firewall prevents connection between 2 or multiple sources; it basically blocks any incoming or
outgoing traffic. It can be in software or hardware forms

HTTP / HTTPS

- HTTP : stands for HyperText Transfer Protocol. Transmitting website data and it allows for use of
hyperlinks. This protocol uses TCP 80
- THHPS : secure version of HTTP that allows identity verification and low level encryption using
TCP port 443

UDP – User Datagram Protocol / Unlike TCP, UDP is constantly broadcasting a connection signal which
can allow for faster connection speeds. With TCP you have to wait for connection confirmation which
takes time

Loopback IP address : it’s used to test Network Interface Card for functionality . If u ping this ip address
and it completes successfully it means your hardware is ok 127.0.0.1.

FTP : File Transfer Protocol used to transfer large file between computers with build in ability to pause
transfer of data. Ports 20 and 21

SSH : Secure Shell : use to establish a secure connection between devices which can be anything from
computers to switches.

Maximum length of UTP cable : 90 -100m for a single segment connection

OSI (Open Systems Interconnection) is a reference model for how applications communicate over
a network.

A reference model is a conceptual framework for understanding relationships. The purpose of the OSI
reference model is to guide vendors and developers so the digital communication products and
software programs they create can interoperate, and to facilitate a clear framework that describes the
functions of a networking or telecommunication system.

OSI Model : Physical, Layer, Data link, Network, Transport , Session, Presentation And Application

Network Layer : Routing, switching and transmitting data from one point to another

Different Types of network cables :


- Cat 5 : 100Mb/s
- Cat 5e : 1Gb/s
- Cat 6: 10Gb/s

All cables 100m to run at optimum speed

Subnet Mask : Dictates the size of a network and also tells which part of the subnet our host IP address
belongs to

Uptime in switch / router Cisco : “ sh ver “ to show the uptime

Identify which PC and what port it’s using on the network ?

ARP and MAC address table from within a switch

Web Servers : are computers that are usually set up in facilities called Data Centers, operated by hosting
companies. The purpose is to store websites so that people can visit them internet. The files stored on
web servers are read by browsers which convert the file into images and text for you to view.

Most Web servers operate Linux or Microsoft Windows and most websites are hosted on Linux Servers.
Servers with Linux or Windows installed on them also run other key software programs similar to your
home computer. There software programs are called Daemons, and they run in the background, rather
then in direct control of the user or person viewing websites files on the internet.

- HTTP Server : sends website files


- FTP Server: allows for uploading files
- Email Server : gathers and direct email
- Database Server : stores information defined in fields, essential to the operation of the website
itself. Names, addresses , product information etc.

Database

A database is a collection of information that is organized so that it can be easily accessed,


managed and updated. Computer databases typically contain aggregations of data records
or files, containing information about sales transactions or interactions with specific customers .
Types of databases : SQL and NoSQL

SQL Structured Query language - SQL programming can be effectively used to insert, search,
update, delete database records. It can do lot of things including, but not limited to, optimizing
and maintenance of databases. MySQL Database, Oracle, Ms SQL server, Sybase, MariaDB

NoSQL When you use relational database for massive volumes of data , the system starts getting
slow in terms of response time.

To overcome this , we could of course "scale up" our systems by upgrading our existing
hardware.
The alternative to the above problem would be to distribute our database load on multiple
hosts as the load increases.

This is known as "scaling out".

NOSQL database are non-relational databases that scale out better than relational databases
and are designed with web applications in mind. ( MangoDB, Couchbase )

Informational responses (100–199), 200 OK ;

Successful responses (200–299),

Redirects (300–399),

Client errors (400–499), 404 Not Found; 403 Forbidden; 408 Request Timeout; 418 I'm a teapot;

Server errors (500–599). 500 Internal Server Error; 503 Service Unavailable; 504 Gateway Timeout
(This error response is given when the server is acting as a gateway and cannot get a response in time.)

You might also like