CH11 Network Design Flashcards
What are the 7 layers of OSI Model?
Please - Physical
Do - Data Link
Not - Network
Throw - Transport
Sausage - Session
Pizza - Presentation
Away - Application
What is a physical layer?
Represents the actual network cables and radio waves used to carry data over a network
Data carried over the network at the Physical Layer is known as bits.
Example : Network Cables, (fiber optic, copper, or coaxial), radio waves (Wi-Fi or Bluetooth), Hub or repeater
What is Data Link layer?
Describes how a connection is established, maintained, and transferred over the physical layer and uses physical addressing (MAC address).
Bits are grouped into Frames, and then sent over the network.
Examples are : MAC addresses, switches, and bridges
What is Network Layer?
Logical address to route or switch information between hosts, the network, and the internetworks.
Frames are grouped into packets. Example : IP Address, Routers
What is Transport layer?
Manages and ensures transmission of the packets occurs from a host to a destination using either TCP (connection-ful protocol. Has 3 way handshake) or UDP (Connection-less Protocol. Fire and forget)
Packets are now grouped into segments for TCP, or Datagrams for UDP.
What is Session Layer?
Manages the establishment, termination, and synchronization of a session over the network
What is Presentation layer?
Translates the information into a format that the sender and receiver both understand.
Ex: is it ASCII or UTF-8 encoding?
What is Application layer?
Layer from which the message is created, formed and originated
Consists of high-level protocols like HTTP, SMTP, and FTP
What is a switch?
Switches are the combined evolution of hubs and bridges
What are the 3 types of attack for switches ?
MAC Flooding,
MAC Spoofing,
Physical Tampering
What is MAC Flooding?
Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each port
If a switch is flooded, it can fail-open when flooded and begin to act like a hub and broadcasting data out every single port.
What is MAC Spoofing?
Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device.
MAC Spoofing is often combined with an ARP (Address Resolution Protocol) spoofing attack. ARP relies on the MAC addresses as a way of combining what MAC address goes to which IP, and which IP goes to which MAC address. Attacker often combines a MAC address spoof with an APR spoof as an attempt to be able to have the attacker appear that they are the destination that somebody is trying to send information to, and use that as a way to steal that information.
What are the ways to prevent MAC Spoofing?
- Configure your switch to accept limited number of static MAC addresses
- Limit duration of time for ARP entry on hosts.
- Conduct ARP inspection
What is Physical Tampering in regards to attack on switches?
occurs when an attacker attempts to gain physical access to the switch
What is a Router?
It is used to connect two or more networks to form an internetwork. They rely on a packet’s IP Addresses to determine the proper destination. Access Control List (ACL) can be configured on the router’s interface to control the flow of traffic into or out of a certain part of the network.
What layer in OSI model does Router operate on ?
Layer 3