0% found this document useful (0 votes)
32 views2 pages

Nmaa

Uploaded by

miireux143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

Nmaa

Uploaded by

miireux143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

PSTN : The term Public Switched Telephone Network (PSTN) describes the various equipment and
interconnecting facilities that provide phone service to the public The network continues to evolve
with the introduction of new technologies. The PSTN began in the United States in 1878 with a manual
mechanical switchboard that connected different parties and allowed them to carry on a conversation.
Today, the PSTN is a network of computers and other electronic equipment that converts speech into
digital data and provides a multitude of sophisticated phone features, data services, and mobile
wireless access. PSTN voice facilities transport speech or voice-band data (such as fax/modems and
digital data), which is data that has been modulated to voice frequencies. At the core of the PSTN are
digital switches. The term "switch" describes the ability to cross-connect a phone line with many other
phone lines and switching from one connection to another. The PSTN is well known for providing
reliable communications to its subscribers. The phrase "five nines reliability," representing network
availability of 99.999 percent for PSTN equipment, has become ubiquitous within the
telecommunications industry.
2. Lightweight Directory Access Protocol : LDAP: Lightweight Directory Access Protocol. LDAP is a
software protocol for enabling anyone to locate organizations, individuals, and other resources such
as files and devices in a network, whether on the public Internet or on a corporate intranet. LDAP is a
"lightweight" (smaller amount of code) version of Directory Access Protocol (DAP), which is part of
X.500, a standard for directory services in a network. LDAP is lighter because in its initial version it did
not include security features. LDAP originated at the University of Michigan and has been endorsed
by at least 40 companies. Netscape includes it in its latest Communicator suite of products. Microsoft
includes it as part of what it calls Active Directory in a number of products including Outlook Express.
Novell's NetWare Directory Services interoperates with LDAP. Cisco also supports it in its networking
products. In a network, a directory tells you where in the network something is located. On TCP/IP
networks (including the Internet), the domain name system (DNS) is the directory system used to
relate the domain name to a specific network address (a unique location on the network). However,
you may not know the domain name. LDAP allows you to search for an individual without knowing
where they're located (although additional information will help with the search)
3. Booststrap protocol : The Bootstrap Protocol (BOOTP) is a network protocol used by a client to
obtain its IP address, as well as other configuration information such as the gateway and subnet mask,
from a BOOTP server. It is primarily designed for diskless workstations, allowing them to boot up and
access network resources by obtaining their network configuration. BOOTP operates over UDP (User
Datagram Protocol). How it works: The client broadcasts a BOOTP request on the network. A BOOTP
server responds with the client’s IP address, the location of the boot file (if needed), and other
configuration details. Dynamic Host Configuration Protocol (DHCP): The Dynamic Host Configuration
Protocol (DHCP) is an extension of BOOTP and is used to automatically assign IP addresses and other
network configuration settings to devices on a network. It’s widely used in modern networks due to
its dynamic and automated nature. How it works: A DHCP client sends a broadcast request
(DHCPDISCOVER) when it connects to the network. A DHCP server responds with an IP address
(DHCPOFFER) and other configuration settings (like DNS, gateway). The client then acknowledges and
uses the IP address (DHCPREQUEST and DHCPACK). Dynamic Assignment: DHCP dynamically assigns
IP addresses from a pool of available addresses, making management easier, especially in large
networks.
4.Vpm protocol : There are a number of VPN protocols in use that secure the transport of data traffic
over a public network infrastructure. Each protocol varies slightly in the way that data is kept secure.
IP security (IPSec) is used to secure communications over the Internet. IPSec traffic can use either
transport mode or tunneling to encrypt data traffic in a VPN The difference between the two modes
is that transport mode encrypts only the message within the data packet (also known as the payload)
while tunnelling encrypts the entire data packet, IPSec is often referred to as a "security overlay"
because of its use as a security layer for other protocols. Hoth Secure Sockets Layer (SSL) and Transport
Layer Security (TLS) use cryptography to secure communications over the Internet. Both protocols use
a "handshake" method of authentication that involves a negotiation of network parameters between
the client and server machines. To successfully initiate a connection, an authentication process
involving certificates is used. Certificates are cryptographic keys that are stored on both the server
and client. Point-To-Point Tunneling Protocol (PPTP) is another tunneling protocol used to connect a
remote client to a private server over the Internet. PPTP is one of the most widely used VPN protocols
because of its straightforward configuration and maintenance and also because it is included with the
Windows operating system. Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data
communications traffic between two sites over the Internet. L2TP is often used in tandem with IPSec
(which acts as a security layer) to secure the transfer of L2TP data packets over the Internet. Unlike
PPTP, a VPN jmplementation using L2TP/IPSec requires a shared key or the use of certificates.
5.Internal security : internal security is the process of sequrity your network from internal threats
which are generally much more common than external threats Examples of Internal threats following
as under. Internal users incorrectly accessing information, to which they should not have access, such
as payroll records, accounting records or business development information. Internal users accessing
other user's files and data to which they should not have access. Internal users impersonating other
users and causing mischief, such as sending e-mails under another person's name. Internal users
accessing systems to carry out criminal activities, such as embezzling funds. Internal users
compromising the security of the network, such as by accidentally introducing viruses to the network.
Internal users use "sniffing" packets on the network to discover user accounts and passwords.
7. Local Printer Setup: 1. Connect the printer to your computer using a USB cable. 2. Turn on the
printer. 3. Install the printer driver (software) from the manufacturer's CD or website. 4. Follow the
installation prompts to complete the setup. 5. Choose the printer model and port (e.g., USB001). 6.
Test the printer by printing a test page. Network Printer Setup (Wired or Wireless): Wired (Ethernet)
Setup: 1. Connect the printer to your router using an Ethernet cable. 2. Ensure the printer and
computer are on the same network. 3. Install the printer driver (software) from the manufacturer's
CD or website. 4. Follow the installation prompts to complete the setup. 5. Choose the printer model
and network connection. 6. Enter the printer's IP address (found on the printer or router). 7. Test the
printer by printing a test page.
8. IOS: IOS means Internetwork Operating System. Cisco IOS is software used on most Cisco Systems
routers and current Cisco network switches. IOS is a package of routing, switching, internetworking
and telecommunications functions integrated into a multitasking operating system. The core function
of Cisco IOS is to enable data communications between network nodes. Such services include
encryption, authentication, firewall capabilities, policy enforcement, deep packet inspection, Quality
of Service, intelligent routing and proxy capability. In Cisco's Integrated Services Routers (ISRs), IOS
can also support call processing and unified communications services. There are three variants of the
operating system: IOS XE, IOS XR and Nexus OS. IOS XE runs on enterprise-grade Cisco ISRs,
Aggregation Services Routers and Catalyst switches. IOS XR runs on Cisco's service provider products,
such as its Carrier Routing System routers. List of IOS command :(1) Show running-configuration: The
show running-config command shows the router, switch, or firewall's current configuration. (2) Show
version: The show version command gives you the router's configuration register (essentially, the
router's firmware settings for booting up), the last time the router was booted, the version of the IOS,
the name of the IOS file, the model of the router, and the router's amount of RAM and Flash.

List network troubleshooting tools : 1 ping 2 traceroute/tracert 3 wireshark 4 netstat 5 ns look up 6


IP config / If config 7 nmap 8 putty

You might also like