Introduction To Network+ Lesson5
Introduction To Network+ Lesson5
Companies with locations spread across multiple sites often require secure communications
between those sites. One option is to purchase multiple WAN connections interconnecting
those sites. Sometimes, however, a more cost-effective option is to create secure
connections through an untrusted network, such as the Internet. Such a secure tunnel is
called a Virtual Private Network (VPN).
Firewalls
A firewall stands guard at the door of your network, protecting it from malicious Internet
traffic.
.You can implement a firewall in either hardware or software form, or a combination of both
Specialized Network Devices
DNS Servers
A Domain Name System (DNS) server performs the task of taking a domain name (for
example, www.ciscopress.com ) and resolving that name into a corresponding IP
address (for example, 10.1.2.3)
A fully qualified domain name (FQDN) is the complete domain name for a specific
computer, or host, on the Internet. The FQDN consists of two parts: the hostname and
the domain name. for example www.ciscopress.com
DNS Servers
A DNS server’s database contains not only FQDNs and corresponding IP addresses, but
also DNS record types. For example, a Mail Exchange (MX) record would be the record
type for an e-mail server.
Specialized Network Devices
DDNS Servers
DHCP Servers
Proxy Servers
The proxy server receives the client’s
request, and on behalf of that client (that is,
as that client’s proxy), the proxy server
sends the request out to the Internet. When a
reply is received from the Internet, the
proxy server forwards the response on to the
client.
Content Engines
some networks used dedicated appliances to
perform this content caching. These
appliances are commonly referred to as
caching engines or content engines .
Virtual Switches
A virtual switch (vSwitch) is a software application
that allows communication between virtual
machines. A vSwitch does more than just forward
data packets, it intelligently directs the
communication on a network by checking data
packets before moving them to a destination.
Virtual Desktops
With virtual desktops, a user’s data is stored in a data
center rather than on an office computer’s hard drive.
By providing authentication credentials, a secure
connection can be established between the
centralized repository of user data and that user’s
device.
Specialized Network Devices
Cloud Computing
Loud computing is a general term for the delivery of hosted services over the internet.
Cloud computing enables companies to consume a compute resource, such as a virtual
machine (VM), storage or an application, rather than having to build and maintain
computing infrastructures in house.
A company purchasing cloud computing services has the option of public, private, or
hybrid cloud services.
Private cloud services include systems that only have interactions and
communications with other devices inside that same private cloud or system. Public
cloud services interact with devices on public networks such as the Internet and
potentially other public clouds. An environment in which there are private cloud
services but some of those services interact with public cloud is referred to as hybrid
cloud services .
Specialized Network Devices
Voice over IP Protocols and Components
A Voice over IP (VoIP) network digitizes the spoken voice into packets and transmits those
packets across a data network. This allows voice, data, and even video to share the same
medium.