Domain 4: Communication and Network Security Flashcards
Protocol
A protocol is a set of rules that dictates how computers communicate over networks.
Application layer
Application layer
Layer 7
Contains services and protocols required by the user’s applications for networking functionality.
Presentation layer
Presentation layer
Layer 6
Formats data into a standardized format and deals with the syntax of the data, not the meaning.
Session layer
Session layer
Layer 5
Sets up, maintains, and breaks down the session (dialog) between two applications. It controls the session organization and synchronization.
Transport layer
Transport layer
Layer 4
Provides end-to-end transmissions.
Network layer
Network layer
Layer 3
Provides routing, addressing, and fragmentation of packets. This layer can determine alternative routes to avoid network congestion.
What layer do routers work at?
Routers work at the network layer, layer 3.
Data Link layer
Data link layer
Layer 2
Prepares data for the network medium by framing it.
This is where the different LAN and WAN technologies work.
Physical layer
Physical layer
Layer 1
Provides physical connections for transmission and performs the electrical encoding of data.
This layer transforms bits to electrical signals.
TCP/IP
TCP/IP is a suite of protocols that is the de facto standard for transmitting data across the Internet.
- TCP is a reliable, connection-oriented protocol
- IP is an unreliable, connectionless protocol
Encapsulation
Data is encapsulated as it travels down the network stack on the source computer, and the process is reversed on the destination computer.
During encapsulation, each layer adds its own information so the corresponding layer on the destination computer knows how to process the data.
Transport layer protocols
TCP and UDP
UDP
UDP is a connectionless protocol that does not send or receive acknowledgments when a datagram is received.
It does not ensure data arrives at its destination. It provides “ best-effort ” delivery.
TCP
TCP is a connection-oriented protocol that sends and receives acknowledgments. It ensures data arrives at the destination.
ARP vs. RARP
- ARP translates the IP address into a MAC address (physical Ethernet address)
- RARP translates a MAC address into an IP address.
ICMP
ICMP works at the network layer and informs hosts, routers, and devices of network or computer problems.
It is the major component of the ping utility.
DNS
DNS resolves hostnames into IP addresses and has distributed databases all over the Internet to provide name resolution.
ARP poisoning
Altering an ARP table so an IP address is mapped to a different MAC address
ARP poisoning can redirect traffic to an attacker’s computer or an unattended system.
Packet filtering
Packet filtering (screening routers) is accomplished by ACLs and is a first-generation firewall.
Traffic can be filtered by addresses, ports, and protocol types.
Tunneling protocol
Tunneling protocols move frames from one network to another by placing them inside of routable encapsulated frames.
Packet filtering advantages and disadvantages
- Advantages
- Provides application independence
- High performance
- Scalability
- Disadvantages
- Provides low security
- No protection above the network layer
How do you bypass a dual-homed firewall?
Dual-homed firewalls can be bypassed if the operating system does not have packet forwarding or routing disabled.
How do firewalls with proxies work?
Firewalls that use proxies transfer an isolated copy of each approved packet from one network to another network.
Application proxy
An application proxy requires a proxy for each approved service and can understand and make access decisions on the protocols used and the commands within those protocols.
Circuit-level firewall
Circuit-level firewalls also use proxies but at a lower layer. Circuit-level firewalls do not look as deep within the packet as application proxies do.
Proxy firewall
A proxy firewall is the middleman in communication. It does not allow anyone to connect directly to a protected host within the internal network.
Proxy firewalls are second-generation firewalls.
Application proxy firewall advantages and disadvantages
- Advantages
- Provide high security
- Full application-layer awareness
- Disadvantages
- Poor performance
- Limited application support
- Poor scalability
Stateful inspection
Stateful inspection keeps track of each communication session. It must maintain a state table that contains data about each connection.
It is a third-generation firewall.
What tunneling protocols can VPN use?
- PPTP
- L2TP
- TLS
- IPSec
PPTP vs. IPSec
PPTP works at the data link layer and can only handle one connection.
IPSec works at the network layer and can handle multiple tunnels at the same time.
Dedicated links
- WAN
- Usually the most expensive type of WAN connectivity method
- Fee is based on the distance between the two destinations rather than on the amount of bandwidth used.
- T1 and T3 are examples of dedicated links.
What are the packet-switched WAN technologies?
- Frame relay
- X.25
They use virtual circuits instead of dedicated ones.
How does a switch behave in a star topology?
A switch in star topologies serves as the central meeting place for all cables from computers and devices.
Switch
A switch is a device with combined repeater and bridge technology.
It works at the data link layer and understands MAC addresses.
Router
Routers link two or more network segments, where each segment can function as an independent network.
- Works at the network layer
- Works with IP addresses
- Has more network knowledge than bridges, switches, or repeaters
Bridge vs. Router
A bridge filters by MAC addresses and forwards broadcast traffic.
A router filters by IP addresses and does not forward broadcast traffic.
Layer 3 switch
Layer 3 switching combines switching and routing technology.
Attenuation
Attenuation is the loss of signal strength when a cable exceeds its maximum length.
STP & UTP
STP and UTP are twisted-pair cabling types that are the most popular, cheapest, and easiest to work with.
However, they are the easiest to tap into, have crosstalk issues, and are vulnerable to EMI and RFI.
Fiberoptic cable
- Carries data as light waves
- Expensive
- Can transmit data at high speeds
- Difficult to tap into
- Resistant to EMI and RFI.
If security is extremely important, fiber-optic cabling should be used.
ATM
- WAN technology
- Transfers data in fixed cells
- Transmits data at very high rates
- Supports voice, data, and video applications
FDDI
- LAN and MAN technology
- Usually used for backbones
- Uses token-passing technology
- Has redundant rings in case the primary ring goes down
Token Ring
Token Ring, 802.5, is an older LAN implementation that uses a token-passing technology.
CSMA/CD
Ethernet uses CSMA/CD, which means all computers compete for the shared network cable, listen to learn when they can transmit data, and are susceptible to data collisions.
Circuit-switching vs. Packet-switching
Circuit-switching technologies set up a circuit that will be used during a data transmission session.
Packet-switching technologies do not set up circuits — instead, packets can travel along many different routes to arrive at the same destination.