|
1 | 1 | # Networking and Protocols |
2 | | -1. Fundamentals of Networking |
| 2 | + |
| 3 | +### 1. Fundamentals of Networking |
3 | 4 | * TCP/IP |
4 | 5 | * Protocols |
5 | 6 | * Network Adapter |
|
17 | 18 | * Hybrid |
18 | 19 | * Point-to-multipoint |
19 | 20 |
|
20 | | -2. Network Cables and Transmission |
| 21 | +### 2. Network Cables and Transmission |
21 | 22 | * Network cables |
22 | 23 | * coaxial |
23 | 24 | * twisted-pair |
|
52 | 53 | * IEEE 802.3 |
53 | 54 | * IEEE 802.11 |
54 | 55 |
|
55 | | -3. Digital / Telecommunications Convergence |
| 56 | +### 3. Digital / Telecommunications Convergence |
56 | 57 | * Transoceanic Cable |
57 | 58 | * Digital Signal 1 |
58 | 59 | * E-carrier |
|
69 | 70 | * Very Small Aperture Terminal (VSAT) |
70 | 71 | * TCP/IP Protocol Suite |
71 | 72 |
|
72 | | -4. The OSI and TCP/IP Model |
| 73 | +### 4. The OSI and TCP/IP Model |
73 | 74 | * International Organization for Standardization (ISO) |
74 | 75 | * ISO Model |
75 | 76 | * Protocol Data Unit (PDU) |
76 | 77 | * Application Programming Interfaces |
77 | 78 |
|
78 | | -5. Introduction to Network Devices |
| 79 | +### 5. Introduction to Network Devices |
79 | 80 | * Network Interface Card (NIC) |
80 | 81 | * Repeaters |
81 | 82 | * Hubs |
82 | 83 | * Switches |
83 | 84 | * Routers |
84 | 85 |
|
85 | | -6. Addressing |
| 86 | +### 6. Addressing |
86 | 87 | * Unicast |
87 | 88 | * Multicast |
88 | 89 | * Broadcast |
|
119 | 120 | * Tunneling |
120 | 121 | * Neighbor Discovery Protocol (NDP) |
121 | 122 |
|
122 | | -8. Internet Control Message Protocol (ICMP) |
| 123 | +### 8. Internet Control Message Protocol (ICMP) |
123 | 124 | * Internet Control Message Protocol (ICMP) |
124 | 125 | * ICMPv6 |
125 | 126 |
|
126 | | -9. Transport Layer Protocols |
| 127 | +### 9. Transport Layer Protocols |
127 | 128 | * Transmission Control Protocol (TCP) |
128 | 129 | * Three-way handshake |
129 | 130 | * TCP flags |
130 | 131 | * User Datagram Protocol (UDP) |
131 | 132 |
|
132 | | -10. Application Layer Protocols |
| 133 | +### 10. Application Layer Protocols |
133 | 134 | * Ports |
134 | 135 | * Well-Known Ports |
135 | 136 | * Registered Ports |
|
168 | 169 | * Secure Shell (SSH) |
169 | 170 | * Diffie-Hellman key exchange |
170 | 171 | * Lightweight Directory Access Protocol (LDAP) |
171 | | -11. Specialty Networks |
| 172 | +### 11. Specialty Networks |
172 | 173 | * Supervisory Control and Data Acquisition (SCADA) |
173 | 174 | * Virtual Local Area Network (VLAN) |
174 | 175 | * Virtual Private Network (VPN) |
175 | | -12. Cloud Computing |
| 176 | +### 12. Cloud Computing |
176 | 177 | * Cloud |
177 | 178 | * Amazon Web Services (AWS) |
178 | 179 | * Azure |
|
186 | 187 | * Software as a Service (SaaS) |
187 | 188 | * Platform as a Service (PaaS) |
188 | 189 | * Infrastructure as a Service (IaaS) |
189 | | -13. Information and Data Security |
| 190 | +### 13. Information and Data Security |
190 | 191 | * CIA Triad |
191 | 192 | * Information Assurance (IA) |
192 | | -14. Network Security |
| 193 | +### 14. Network Security |
193 | 194 | * Network security |
194 | 195 | * Network Threats |
195 | 196 | * Uninterruptible power supply (UPS) |
|
0 commit comments