Network Flashcards
Used to explain network communications between a host and remote device over LAN or WAN
OSI Model
Layer of OSI Model represent the actual network cables and radio waves used to carry date over network
Physical Layer
A data carried over a network to Physical layer
Bits
Describes how a connection is established, maintained and transferred over the physical layer and uses physical addressing
MAC Addresses
Data Link Layer
Its a group of bits in the data link layer
Frames
Uses logical address to route or switch information and between host, the network and the internetworks
Network Layer
At network layer the frames are taken and group. An example of this are the IP addresses.
Packets
Manages and ensures transmission of the packets occurs from a host to a designation using either TCP or UDP
Transport layer
Manages the establishment, termination and synchronization of a session over the network
Session Layer
Translate the information into a format that the sender and receiver both understand
Presentaion Layer
Layer from which the message is created, formed and originated. It consist of high level protocols like HTTP, SMTP and FTP
Application Layer
It is the combine evolution of hubs and bridges. It improves the data transfer and security through the intelligent use of MAC Addresses being able to figure out where a device is and only sending information out that particular port of the switch and ignoring the rest.
Switch
Attempt to overwhelmed the limited switch memory set aside to store the MAC address for each port and this is known as the content addressable memory or CAM table
MAC Flooding
Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device
MAC Spoofing
It is a man in the middle (MitM) attack that allows the attacker to intercept the communication between network devices. The forge the responses advertise that the correct MAC address for both IP addressess, belongin to the router and workstation, is the attacker’s MAC address ( MAC Spoofing). Mac spoofing is often combine with this attack.
ARP Spoofing/ ARP Poinsoning
Occurs when an attacker attempts to gain physical access.
Physical tampering