You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
197 lines
15 KiB
Plaintext
197 lines
15 KiB
Plaintext
_.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._JARGON FILE_.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._
|
|
|
|
is the router a node???????????????? yes
|
|
|
|
#network
|
|
|
|
* node (nodocentrism)
|
|
* client - asks
|
|
* server - answers, never initiates the communication
|
|
* paranodal ("the paranodal is an atopia: a society without borders)
|
|
* link
|
|
|
|
* computer networking
|
|
* network infrastructure
|
|
* communications network
|
|
* DIY network
|
|
* network architecture / *network topology
|
|
* centralized
|
|
* de-centralized
|
|
* distributed
|
|
* federated networks
|
|
* scale
|
|
* trust
|
|
* peer-to-peer
|
|
|
|
|
|
# communication protocols *protocol families / protocol suite
|
|
|
|
## Internet Protocol Suite
|
|
|
|
### application layer
|
|
|
|
### transport layer
|
|
|
|
### internet layer
|
|
|
|
### link layer
|
|
|
|
## TCP/IP
|
|
are two protocols (TCP & IP) that allows to establish communication between computers. Now widely adopted as a network standard, its archetype is the Defense Data Network, developed as part of Department of Defense.
|
|
|
|
## TCP
|
|
(Transmission Control Protocol)
|
|
In the transport layer within the Internet Protocol Suite, TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.
|
|
|
|
## UDP
|
|
|
|
(User Datagram Protocol) - In Transport Layer, Applications that do not require reliable data stream service may use the User Datagram
|
|
Protocol (UDP), which provides a connectionless datagram service that emphasizes reduced **latency** over reliability.
|
|
|
|
## Latency
|
|
|
|
Time interval between stimulation and response.
|
|
|
|
## IP - (Internet Protocol) -
|
|
|
|
* (WAN, Wide Area Network) external IP (WAN); (LAN, Local Area Network) internal, local IP - 192.168.x.x
|
|
* IPv4 / IPv6 -IPv4 is short for Internet Protocal version 4. IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol(TCP).
|
|
|
|
## MAC address
|
|
|
|
-media access control address A media access control address (MAC address) of a device is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet, Wi-Fi and Bluetooth.
|
|
|
|
#MAC address anonymization
|
|
|
|
-performs a one-way function on a MAC address so that the result may be used in tracking systems for reporting and the general public, while making it nearly impossible to obtain the original MAC address from the result. The idea is that this process allows companies like Google,[1] Apple[2] and iInside[3] - which track users movements via computer hardware to simultaneously preserve the identities of the people they are tracking, as well as the hardware itself.
|
|
|
|
#IP Addressing
|
|
|
|
-IPv4 uses 32-bit addresses which limits the address space to 4294967296 (2^32) addresses.
|
|
|
|
#DNS (Domain Name System) -
|
|
|
|
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network. DNS is in the application layer within IP Suite.
|
|
*8.8.8.8 / 8.8.4.4 / 4.4.4.4 - google DNS
|
|
*openDNS -OpenDNS is a company and service that extends the Domain Name System (DNS) by adding features such as phishing protection and optional content filtering in addition to DNS lookup, if its DNS servers are used.
|
|
Phishing - Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site.
|
|
|
|
#TLD (Top Level Domain) -
|
|
|
|
A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet
|
|
-country-code top-level domains (ccTLD)
|
|
-generic top-level domains (gTLD)
|
|
-sponsored top-level domains (sTLD)
|
|
-unsponsored top-level domains
|
|
-infrastructure top-level domain (.arpa)
|
|
|
|
#IDN (Internationalize Domain System)
|
|
|
|
- An internationalized domain name (IDN) is an Internet domain name that contains at least one label that is displayed in software applications, in whole or in part, in a language-specific script or alphabet, such as Arabic, Chinese, Cyrillic, Tamil, Hebrew or the Latin alphabet-based characters with diacritics or ligatures, such as French.
|
|
|
|
#HTTP (HyperText Transfer Protocol)
|
|
|
|
- The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermediainformation systems. HTTP is the foundation of data communication for the World Wide Web, where hypertextdocuments include hyperlinks to other resources that the user can easily access, for example by a mouse click or by tapping the screen. HTTP was developed to facilitate hypertext and the World Wide Web. Developed by Tim Berners-Lee
|
|
Tim Berners-Lee is an English engineer and computer scientist, best known as the inventor of the World Wide Web. Development of HTTP was initiated by Tim Berners-Lee at CERN in 1989. Development of HTTP standards was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs).
|
|
|
|
#HTTP is an application layer protocol designed within the framework of the Internet protocol suite. Its definition presumes an underlying and reliable transport layer protocol, and Transmission Control Protocol (TCP) is commonly used. However, HTTP can be adapted to use unreliable protocols such as the User Datagram Protocol (UDP), for example in HTTPU and Simple Service Discovery Protocol (SSDP).
|
|
|
|
#HTTPS (HyperText Transfer Protocol over Secure Socket Layer) - Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or, formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS, or HTTP over SSL.
|
|
|
|
#SSL (Secure Socket Layer) - SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. On application layer on IP Suite.
|
|
|
|
#TLS Transport Layer Security - Transport Layer Security (TLS), and its now-deprecated predecessor, Secure Sockets Layer (SSL), are
|
|
cryptographic protocols designed to provide communications security over a computer network.
|
|
|
|
#SSH (Secure Shell) - Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line login and remote command execution, but any network service can be secured with SSH. On application layer of IP Suite.
|
|
|
|
#FTP (File Transfer Protocol) -The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
|
|
|
|
#SFTP (SSH File Transfer Protocol) -In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream.
|
|
|
|
#SCP - Secure Copy Protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. "SCP" commonly refers to both the Secure Copy Protocol and the program itself.
|
|
|
|
#XMPP (Extensible Messaging and Presence Protocol) - Extensible Messaging and Presence Protocol (XMPP) is a communication protocol for message-oriented middlewarebased on XML (Extensible Markup Language). It enables the near-real-time exchange of structured yet extensible data between any two or more network entities. Originally named Jabber, the protocol was developed by the homonym open-source community in 1999 for near real-time instant messaging (IM), presence information, and contact listmaintenance. Designed to be extensible, the protocol has been used also for publish-subscribe systems, signalling for VoIP, video, file transfer, gaming, the Internet of Things (IoT) applications such as the smart grid, and social networking services. On application layer of Internet Protocal Suite.
|
|
|
|
#OMEMO -OMEMO is an extension to the Extensible Messaging and Presence Protocol (XMPP, "Jabber") for multi-client end-to-end encryption developed by Andreas Straub. According to Straub, OMEMO uses the Double Ratchet Algorithm "to provide multi-end to multi-end encryption, allowing messages to be synchronized securely across multiple clients, even if some of them are offline".
|
|
#wireless
|
|
*wifi
|
|
*bluetooth
|
|
|
|
#internet -
|
|
#web (www) -
|
|
|
|
#network packet - A network packet is a formatted unit of data carried by a packet-switched network. A package has a maximum size of 150kb.
|
|
#Packet Structure
|
|
|
|
|
|
#Router - just another computer, splitting up the network into multiple routes. A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node.
|
|
A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the network address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey.
|
|
The most familiar type of routers are home and small office routers that simply forward IP packets between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices, software-based routers also exist.
|
|
#Residential Gateway - home and small office routers A Residential Gateway is a small consumer-grade router which provides network access between LAN hosts to a WAN via a modem. The modem may or may not be integrated into the hardware of the Residential Gateway.
|
|
|
|
Multiple devices have been described as "residential gateways":
|
|
* Cable modem - A cable modem is a type of network bridge that provides bi-directional data communication via radio frequency channelson a hybrid fibre-coaxial (HFC) and radio frequency over glass (RFoG) infrastructure. Cable modems are primarily used to deliver broadband Internet access in the form of cable Internet, taking advantage of the high bandwidth of a HFC and RFoG network. They are commonly deployed in Australia, Europe, Asia and America.
|
|
DSL modem - A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line service for connectivity to the Internet, which is often called DSL broadband.
|
|
* Wireless router -A wireless router is a device that performs the functions of a router and also includes the functions of a wireless access point. It is used to provide access to the Internet or a private computer network. Depending on the manufacturer and model, it can function in a wired local area network, in a wireless-only LAN, or in a mixed wired and wireless network.
|
|
* Voice over internet protocol (VoIP) analog telephone adapter TBC!
|
|
* Wireless access point TBC!
|
|
* Wired router TBC!
|
|
|
|
#Modem - A modem is a hardware device that converts data between transmission media so that it can be transmitted from computer to computer (historically over copper telephone wires). The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used with any means of transmitting analog signals, from light-emitting diodes to radio. A common type of modem is one that turns the digital data of a computer into modulated electrical signal for transmission over telephone lines and demodulated by another modem at the receiver side to recover the digital data.
|
|
#Firewall
|
|
#Modem & Router specification - While the router and modem are often separate entities, it has been more common for the modem and router to be combined into a single device. This type of hybrid device (sometimes called a gateway) is offered by some ISPs to simplify the setup process.
|
|
|
|
routes - No server/node has a map of the full network. But every computer knows about its neighbours.
|
|
|
|
#List_of_TCP_and_UDP_port_numbers
|
|
ssh (22), http (80), https (443) ftp 20 21
|
|
*internal port (high port ?) - from LAN
|
|
*external port (low port ?) - from WAN
|
|
*physical port - the actual port in the router
|
|
|
|
*port mapping/port forwarding - In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.
|
|
|
|
encoding
|
|
dependencies
|
|
ISP (Internet Server Provider)
|
|
WAN (Wide Area Network)
|
|
LAN (Local Area Network)
|
|
*LAN party :)
|
|
WLAN
|
|
subnet mask - the maximum quantity of the network 255.255.255.0, but can be changed (enlarged or linked to another router)
|
|
gateway - the router of your router (of the WAN). a hardware somewhere where all your data pass through.
|
|
mirroring - hosts contents for someone else, also for pirate and political purpose
|
|
dropping
|
|
pi hole - block adds in the network level
|
|
NAT - network translation Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device
|
|
apache(2)
|
|
openSSH
|
|
openWRT
|
|
DHCP binding - static DHCP - seting for a static IP
|
|
VPN
|
|
DSL
|
|
cryptography
|
|
*end-to-end encryption
|
|
*OWS
|
|
data
|
|
information
|
|
General Purpose Computer
|
|
Sub-Network
|
|
Overloading Server
|
|
DHC Client
|
|
SNTP Protocol
|
|
Framasoft, Chatons, Disroot, Indiehost, Autistici/Inventati, Anachaserver
|
|
hostname
|
|
url - protocol://subdomain.domain(name).TLD http://www.ciao.com
|
|
html
|
|
serving
|
|
denial-of-service attack
|
|
browser
|
|
netcat
|
|
Tor Onion browser
|
|
|
|
|
|
_.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._.-*-._
|
|
|