MODULE 6 - CERTIFICATION CYBER OPS ASSOCIATE Flashcards
Ethernet Ethernet Encapsulation Ethernet and wireless LANs (WLANs) are the two most commonly deployed LAN technologies.
Unlike wireless, Ethernet uses wired communications, including twisted pair, fiber-optic links, and coaxial cables.
Ethernet operates in the data link layer and the physical layer. It is a family of networking technologies defined in the IEEE 802.2 and 802.3 standards. Ethernet supports the following data bandwidths:
10 Mbps
100 Mbps
1000 Mbps (1 Gbps)
10,000 Mbps (10 Gbps)
40,000 Mbps (40 Gbps)
100,000 Mbps (100 Gbps)
As shown in the figure, Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies. Ethernet and the OSI Model
https://snipboard.io/GEe25a.jpg
Ethernet Frame Fields The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes.
This includes all bytes from the destination MAC address field through the Frame Check Sequence (FCS) field.
The preamble field is not included when describing the size of the frame.
Any frame less than 64 bytes in length is considered a “collision fragment” or “runt frame” and is automatically discarded by receiving stations. Frames with more than 1500 bytes of data are considered “jumbo” or “baby giant frames”.
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame.
Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid. However, the Fast Ethernet and Gigabit Ethernet interfaces of some Cisco Catalyst switches can be configured to support larger jumbo frames..
The figure shows each field in the Ethernet frame. Refer to the table for more information about the function of each field.
Ethernet Frame Fields
https://snipboard.io/s3WAlP.jpg
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame. Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid.
However, the Fast Ethernet and Gigabit Ethernet interfaces of some Cisco Catalyst switches can be configured to support larger jumbo frames..
The figure shows each field in the Ethernet frame.
Refer to the table for more information about the function of each field.
Ethernet Frame Fields
https://snipboard.io/s3WAlP.jpg
– Preamble and Start Frame Delimiter Fields
– Destination MAC Address Field
– Source MAC Address Field
– Type / Length
– Data Field
– Frame Check Sequence Field
Preamble and Start Frame Delimiter Fields :
The Preamble (7 bytes) and Start Frame Delimiter (SFD), also called the Start of Frame (1 byte), fields are used for synchronization between the sending and receiving devices.
These first eight bytes of the frame are used to get the attention of the receiving nodes.
Essentially, the first few bytes tell the receivers to get ready to receive a new frame.
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame. Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid.
However, the Fast Ethernet and Gigabit Ethernet interfaces of some Cisco Catalyst switches can be configured to support larger jumbo frames..
The figure shows each field in the Ethernet frame.
Refer to the table for more information about the function of each field.
Ethernet Frame Fields
https://snipboard.io/s3WAlP.jpg
– Preamble and Start Frame Delimiter Fields
– Destination MAC Address Field
– Source MAC Address Field
– Type / Length
– Data Field
– Frame Check Sequence Field
Destination MAC Address Field :
This 6-byte field is the identifier for the intended recipient. As you will recall, this address is used by Layer 2 to assist devices in determining if a frame is addressed to them.
The address in the frame is compared to the MAC address in the device. If there is a match, the device accepts the frame. Can be a unicast, multicast or broadcast address.
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame. Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid.
However, the Fast Ethernet and Gigabit Ethernet interfaces of some Cisco Catalyst switches can be configured to support larger jumbo frames..
The figure shows each field in the Ethernet frame.
Refer to the table for more information about the function of each field.
Ethernet Frame Fields
https://snipboard.io/s3WAlP.jpg
– Preamble and Start Frame Delimiter Fields
– Destination MAC Address Field
– Source MAC Address Field
– Type / Length
– Data Field
– Frame Check Sequence Field
Source MAC Address Field :
This 6-byte field identifies the originating NIC or interface of the frame.
A source MAC address can only be a unicast address.
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame. Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid.
However, the Fast Ethernet and Gigabit Ethernet interfaces of some Cisco Catalyst switches can be configured to support larger jumbo frames..
The figure shows each field in the Ethernet frame.
Refer to the table for more information about the function of each field.
Ethernet Frame Fields
https://snipboard.io/s3WAlP.jpg
– Preamble and Start Frame Delimiter Fields
– Destination MAC Address Field
– Source MAC Address Field
– Type / Length
– Data Field
– Frame Check Sequence Field
Type / Length :
This 2-byte field identifies the upper layer protocol encapsulated in the Ethernet frame.
Common values are, in hexadecimal, 0x800 for IPv4, 0x86DD for IPv6 and 0x806 for ARP.
Note: You may also see this field referred to as EtherType, Type, or Length.
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame. Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid.
However, the Fast Ethernet and Gigabit Ethernet interfaces of some Cisco Catalyst switches can be configured to support larger jumbo frames..
The figure shows each field in the Ethernet frame.
Refer to the table for more information about the function of each field.
Ethernet Frame Fields
https://snipboard.io/s3WAlP.jpg
– Preamble and Start Frame Delimiter Fields
– Destination MAC Address Field
– Source MAC Address Field
– Type / Length
– Data Field
– Frame Check Sequence Field
Data Field :
This field (46 - 1500 bytes) contains the encapsulated data from a higher layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet.
All frames must be at least 64 bytes long.
If a small packet is encapsulated, additional bits called a pad are used to increase the size of the frame to this minimum size.
If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame. Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid.
However, the Fast Ethernet and Gigabit Ethernet interfaces of some Cisco Catalyst switches can be configured to support larger jumbo frames..
The figure shows each field in the Ethernet frame.
Refer to the table for more information about the function of each field.
Ethernet Frame Fields
https://snipboard.io/s3WAlP.jpg
– Preamble and Start Frame Delimiter Fields
– Destination MAC Address Field
– Source MAC Address Field
– Type / Length
– Data Field
– Frame Check Sequence Field
Frame Check Sequence Field :
The Frame Check Sequence (FCS) field (4 bytes) is used to detect errors in a frame.
It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame. The receiving device receives the frame and generates a CRC to look for errors.
If the calculations match, no error occurred. Calculations that do not match are an indication that the data has changed; therefore, the frame is dropped. A change in the data could be the result of a disruption of the electrical signals that represent the bits.
MAC Address Format :
Decimal and Binary Equivalents of 0 to F Hexadecimal
https://snipboard.io/RNdGIu.jpg
An Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits (4 bits per hexadecimal digit).
Hexadecimal digits uses the numbers 0 to 9 and the letters A to F. The figure shows the equivalent decimal and hexadecimal values for binary 0000 to 1111. Hexadecimal is commonly used to represent binary data.
IPv6 addresses are another example of hexadecimal addressing. All data that travels on the network is encapsulated in Ethernet frames. A cyber security analyst should be able to interpret the Ethernet data that is captured by protocol analyzers and other tools.
Depending on the device and the operating system, you will see various representations of MAC addresses, as displayed in the figure below.
Different Representations of MAC Addresses
https://snipboard.io/WbMDuY.jpg
All data that travels on the network is encapsulated in Ethernet frames.
A cyber security analyst should be able to interpret the Ethernet data that is captured by protocol analyzers and other tools.
IPv4 :
The network layer, or OSI Layer 3, provides services to allow end devices to exchange data across networks.
As shown in the figure, IP version 4 (IPv4) and IP version 6 (IPv6) are the principle network layer communication protocols.
Other network layer protocols include routing protocols such as Open Shortest Path First (OSPF) and messaging protocols such as Internet Control Message Protocol (ICMP).
Network Layer Protocols
https://snipboard.io/yektiq.jpg
To accomplish end-to-end communications across network boundaries, network layer 3 protocols perform four basic operations: :
– Addressing end devices
– Encapsulation
– Routing
– De-encapsulation
To accomplish end-to-end communications across network boundaries, network layer protocols perform four basic operations: :
– Addressing end devices
– Encapsulation
– Routing
– De-encapsulation
Addressing end devices :
End devices must be configured with a unique IP address for identification on the network.
To accomplish end-to-end communications across network boundaries, network layer protocols perform four basic operations: :
– Addressing end devices
– Encapsulation
– Routing
– De-encapsulation
Encapsulation :
The network layer encapsulates the protocol data unit (PDU) from the transport layer into a packet.
The encapsulation process adds IP header information, such as the IP address of the source (sending) and destination (receiving) hosts.
The encapsulation process is performed by the source of the IP packet.
To accomplish end-to-end communications across network boundaries, network layer protocols perform four basic operations: :
– Addressing end devices
– Encapsulation
– Routing
– De-encapsulation
Routing :
The network layer provides services to direct the packets to a destination host on another network.
To travel to other networks, the packet must be processed by a router.
The role of the router is to select the best path and direct packets toward the destination host in a process known as routing.
A packet may cross many routers before reaching the destination host. Each router a packet crosses to reach the destination host is called a hop.
To accomplish end-to-end communications across network boundaries, network layer protocols perform four basic operations: :
– Addressing end devices
– Encapsulation
– Routing
– De-encapsulation
De-encapsulation
When the packet arrives at the network layer of the destination host, the host checks the IP header of the packet.
If the destination IP address within the header matches its own IP address, the IP header is removed from the packet.
After the packet is de-encapsulated by the network layer, the resulting Layer 4 PDU is passed up to the appropriate service at the transport layer.
The de-encapsulation process is performed by the destination host of the IP packet.
Unlike the transport layer (OSI Layer 4), which manages the data transport between the processes running on each host, network layer communication protocols (i.e., IPv4 and IPv6) specify the packet structure and processing used to carry the data from one host to another host.
Operating without regard to the data carried in each packet allows the network layer to carry packets for multiple types of communications between multiple hosts.
Unlike the transport layer (OSI Layer 4), which manages the data transport between the processes running on each host, network layer communication protocols (i.e., IPv4 and IPv6) specify the packet structure and processing used to carry the data from one host to another host.
Operating without regard to the data carried in each packet allows the network layer to carry packets for multiple types of communications between multiple hosts.
IP Encapsulation IP encapsulates the transport layer 4 (the layer just above the network layer) segment or other data by adding an IP header.
The IP header is used to deliver the packet to the destination host. The figure illustrates how the transport layer PDU is encapsulated by the network layer PDU to create an IP packet.
https://snipboard.io/xsUQXM.jpg
The process of encapsulating data layer by layer enables the services at the different layers to develop and scale without affecting the other layers.
This means the transport layer segments can be readily packaged by IPv4 or IPv6 or by any new protocol that might be developed in the future. The IP header is examined by Layer 3 devices (i.e., routers and Layer 3 switches) as it travels across a network to its destination.
It is important to note, that the IP addressing information remains the same from the time the packet leaves the source host until it arrives at the destination host, except when translated by the device performing Network Address Translation (NAT) for IPv4.
The process of encapsulating data layer by layer enables the services at the different layers to develop and scale without affecting the other layers.
This means the transport layer segments can be readily packaged by IPv4 or IPv6 or by any new protocol that might be developed in the future. The IP header is examined by Layer 3 devices (i.e., routers and Layer 3 switches) as it travels across a network to its destination.
It is important to note, that the IP addressing information remains the same from the time the packet leaves the source host until it arrives at the destination host, except when translated by the device performing Network Address Translation (NAT) for IPv4.
Note: NAT is discussed in later modules. Routers implement routing protocols to route packets between networks.
The routing performed by these intermediary devices examines the network layer addressing in the packet header.
In all cases, the data portion of the packet, that is, the encapsulated transport layer PDU or other data, remains unchanged during the network layer processes.
Characteristics of IP :
IP was designed as a protocol with low overhead. It provides only the functions that are necessary to deliver a packet from a source to a destination over an interconnected system of networks.
The protocol was not designed to track and manage the flow of packets. These functions, if required, are performed by other protocols at other layers, primarily TCP at Layer 4.
These are the basic characteristics of IP:
– Connectionless
– Best Effort
– Media Independent
Connectionless :
There is no connection with the destination established before sending data packets.
Characteristics of IP :
IP was designed as a protocol with low overhead. It provides only the functions that are necessary to deliver a packet from a source to a destination over an interconnected system of networks.
The protocol was not designed to track and manage the flow of packets. These functions, if required, are performed by other protocols at other layers, primarily TCP at Layer 4.
These are the basic characteristics of IP:
– Connectionless
– Best Effort
– Media Independent
Best Effort :
IP is inherently unreliable because packet delivery is not guaranteed.
Characteristics of IP :
IP was designed as a protocol with low overhead. It provides only the functions that are necessary to deliver a packet from a source to a destination over an interconnected system of networks.
The protocol was not designed to track and manage the flow of packets. These functions, if required, are performed by other protocols at other layers, primarily TCP at Layer 4.
These are the basic characteristics of IP:
– Connectionless
– Best Effort
– Media Independent
Media Independent :
Operation is independent of the medium (i.e., copper, fiber-optic, or wireless) carrying the data.
Connectionless IP is connectionless, meaning that no dedicated end-to-end connection is created by IP before data is sent.
Connectionless communication is conceptually similar to sending a letter to someone without notifying the recipient in advance.
The figure summarizes this key point.
Connectionless - Analogy
https://snipboard.io/lHoJku.jpg
Connectionless data communications work on the same principle.
As shown in the figure, IP requires no initial exchange of control information to establish an end-to-end connection before packets are forwarded.
Connectionless - Network :
https://snipboard.io/a08isI.jpg
Best Effort IP also does not require additional fields in the header to maintain an established connection. This process greatly reduces the overhead of IP.
However, with no pre-established end-to-end connection, senders are unaware whether destination devices are present and functional when sending packets, nor are they aware if the destination receives the packet, or if the destination device is able to access and read the packet.
The IP protocol does not guarantee that all packets that are delivered are, in fact, received. The figure illustrates the unreliable or best-effort delivery characteristic of the IP protocol.
https://snipboard.io/Kk8w3U.jpg
The IP protocol does not guarantee that all packets that are delivered are, in fact, received.
The figure illustrates the unreliable or best-effort delivery characteristic of the IP protocol.
https://snipboard.io/Kk8w3U.jpg :
As an unreliable network layer protocol, IP does not guarantee that all sent packets will be received. Other protocols manage the process of tracking packets and ensuring their delivery.
Media Independent :
Unreliable means that IP does not have the capability to manage and recover from undelivered or corrupt packets. This is because while IP packets are sent with information about the location of delivery, they do not contain information that can be processed to inform the sender whether delivery was successful.
Packets may arrive at the destination corrupted, out of sequence, or not at all. IP provides no capability for packet retransmissions if errors occur. If out-of-order packets are delivered, or packets are missing, then applications using the data, or upper layer services, must resolve these issues.
This allows IP to function very efficiently. In the TCP/IP protocol suite, reliability is the role of the TCP protocol at the transport layer.
IP operates independently of the media that carry the data at lower layers of the protocol stack.
As shown in the figure, IP packets can be communicated as electronic signals over copper cable, as optical signals over fiber, or wirelessly as radio signals.
https://snipboard.io/hQrgVR.jpg
IP packets can travel over different media.
IP operates independently of the media that carry the data at lower layers of the protocol stack.
As shown in the figure, IP packets can be communicated as electronic signals over copper cable, as optical signals over fiber, or wirelessly as radio signals.
https://snipboard.io/hQrgVR.jpg
IP packets can travel over different media.
The OSI data link layer 2 is responsible for taking an IP packet and preparing it for transmission over the communications medium.
This means that the delivery of IP packets is not limited to any particular medium. There is, however, one major characteristic of the media that the network layer considers: the maximum size of the PDU that each medium can transport.
This characteristic is referred to as the maximum transmission unit (MTU). Part of the control communication between the data link layer and the network layer is the establishment of a maximum size for the packet.
The data link layer passes the MTU value up to the network layer. The network layer then determines how large packets can be.
The OSI data link layer 2 is responsible for taking an IP packet and preparing it for transmission over the communications medium.
This means that the delivery of IP packets is not limited to any particular medium. There is, however, one major characteristic of the media that the network layer considers: the maximum size of the PDU that each medium can transport.
This characteristic is referred to as the maximum transmission unit (MTU). Part of the control communication between the data link layer and the network layer is the establishment of a maximum size for the packet.
The data link layer passes the MTU value up to the network layer. The network layer then determines how large packets can be.
In some cases, an intermediate device, usually a router, must split up an IPv4 packet when forwarding it from one medium to another medium with a smaller MTU.
This process is called fragmenting the packet, or fragmentation. Fragmentation causes latency (delay).
IPv6 packets cannot be fragmented by the router.