Network Fundamentals and Protocols
Network Fundamentals
802.1 Standard
The 802.1 standard states that each network adapter (NIC) has a unique 48-bit physical address recorded in ROM. Thus, each computer connected to the network will have a different ID from the others.
Twisted Pair Cabling
The EIA 568B standard defines categories for differential, twisted pair cabling:
Category 5
It is the most widely used today. It uses 4 pairs of wires: 2 for transmitting data and the other two are either left free or are used to transmit voice. It can
Network Protocol Attacks & Defenses
Week 1: Network Fundamentals & Attacks
Introduction to AS & BGP
The internet consists of autonomous systems (AS) which function like a cloud of routers that can intercommunicate using the BGP protocol (which seems like an internal routing table within routers, with inter-router communication over 179/tcp). This is related to the concept of gateways.
Attacks on BGP
A good high-level overview of BGP.
BGP Vulnerabilities
- BGP hijacking either by advertising smaller, more-specific subnets or faster
Characters in A Man of the People
Elsie
Elsie is an uninhibited young woman who is a friend of Odili’s. The two of them have a sexual relationship, but she is engaged to another man, and Odili doesn’t regard their relationship as serious, although he is terribly offended when she sleeps with Chief Nanga.
After this happens, Odili is angry. Odili discusses Chief Nanga’s ability to manipulate others into getting him out of any compromising situation. As the narrator watches Chief Nanga argue with journalists and public figures,
Read MoreEssential Network Ports and OSI Model Layers
When a Web client receives an IP address of a Web server, the client browser uses the IP address and port 80 to request Web services. This request is sent to the server using the Hypertext Transfer Protocol (HTTP). The FTP server allows a client to exchange files between devices and manage files remotely, sending management commands to start applications. FTP sessions are sent to the server using destination port 21 (data FTP 20). After opening the session, the server will use port 20 to transfer
Read MoreUnderstanding IP Addresses: Types, Classes, and Configuration
Understanding IP Addresses
An IP address is a series of 32 binary bits (ones and zeros). In a byte, the rightmost bit has a value of 1, and the values of the remaining bits from right to left are 2, 4, 8, 16, 32, 64, and 128. The first part identifies the network, and the second part identifies a host on that network. Both parts are necessary in an IP address. For example, the first three octets (192.168.1.8) identify the network portion of the address, and the last octet (57) identifies the host.
Read MoreEssential Networking Protocols and Concepts Explained
Chapter 3: Networking Essentials
Home Network Properties
A small home network interconnects three computers for gaming and file sharing. Which two properties represent this type of network?
- It is difficult to implement security.
- A computer responds to a file-sharing application running as a server.
MTA Role in Email Handling
Which three statements are correct regarding the role of the MTA (Mail Transfer Agent) in handling email?
- Receives email from the client MUA (Mail User Agent).
- Transfers the email to