Domain 4: Communication and Network Security Flashcards
Protocol
A protocol is a set of rules that dictates how computers communicate over networks.
Application layer
Application layer
Layer 7
Contains services and protocols required by the user’s applications for networking functionality.
Presentation layer
Presentation layer
Layer 6
Formats data into a standardized format and deals with the syntax of the data, not the meaning.
Session layer
Session layer
Layer 5
Sets up, maintains, and breaks down the session (dialog) between two applications. It controls the session organization and synchronization.
Transport layer
Transport layer
Layer 4
Provides end-to-end transmissions.
Network layer
Network layer
Layer 3
Provides routing, addressing, and fragmentation of packets. This layer can determine alternative routes to avoid network congestion.
What layer do routers work at?
Routers work at the network layer, layer 3.
Data Link layer
Data link layer
Layer 2
Prepares data for the network medium by framing it.
This is where the different LAN and WAN technologies work.
Physical layer
Physical layer
Layer 1
Provides physical connections for transmission and performs the electrical encoding of data.
This layer transforms bits to electrical signals.
TCP/IP
TCP/IP is a suite of protocols that is the de facto standard for transmitting data across the Internet.
- TCP is a reliable, connection-oriented protocol
- IP is an unreliable, connectionless protocol
Encapsulation
Data is encapsulated as it travels down the network stack on the source computer, and the process is reversed on the destination computer.
During encapsulation, each layer adds its own information so the corresponding layer on the destination computer knows how to process the data.
Transport layer protocols
TCP and UDP
UDP
UDP is a connectionless protocol that does not send or receive acknowledgments when a datagram is received.
It does not ensure data arrives at its destination. It provides “ best-effort ” delivery.
TCP
TCP is a connection-oriented protocol that sends and receives acknowledgments. It ensures data arrives at the destination.
ARP vs. RARP
- ARP translates the IP address into a MAC address (physical Ethernet address)
- RARP translates a MAC address into an IP address.
ICMP
ICMP works at the network layer and informs hosts, routers, and devices of network or computer problems.
It is the major component of the ping utility.
DNS
DNS resolves hostnames into IP addresses and has distributed databases all over the Internet to provide name resolution.
ARP poisoning
Altering an ARP table so an IP address is mapped to a different MAC address
ARP poisoning can redirect traffic to an attacker’s computer or an unattended system.
Packet filtering
Packet filtering (screening routers) is accomplished by ACLs and is a first-generation firewall.
Traffic can be filtered by addresses, ports, and protocol types.
Tunneling protocol
Tunneling protocols move frames from one network to another by placing them inside of routable encapsulated frames.
Packet filtering advantages and disadvantages
- Advantages
- Provides application independence
- High performance
- Scalability
- Disadvantages
- Provides low security
- No protection above the network layer
How do you bypass a dual-homed firewall?
Dual-homed firewalls can be bypassed if the operating system does not have packet forwarding or routing disabled.
How do firewalls with proxies work?
Firewalls that use proxies transfer an isolated copy of each approved packet from one network to another network.
Application proxy
An application proxy requires a proxy for each approved service and can understand and make access decisions on the protocols used and the commands within those protocols.