Network Design Flashcards
OSI Model
Application Presentation Session Transport Network Data Link Physical
Physical Layer
§ Represents the actual network cables and radio waves used to carry data over a network
§ Bits
Data Link Layer
§ Describes how a connection is established, maintained, and transferred over the physical layer and uses physical addressing (MAC addresses)
§ Frames
Network Layer
§ Uses logical address to route or switch information between hosts, the network, and the internetworks
§ Packets
Transport Layer
§ Manages and ensures transmission of the packets occurs from a host to a destination using either TCP or UDP
§ Segments (TCP) or Datagrams (UDP)
Session Layer
Manages the establishment, termination, and synchronization of a session over the network
Presentation Layer
Translates the information into a format that the sender and receiver both understand
Application Layer
§ Layer from which the message is created, formed, and originated
§ Consists of high-level protocols like HTTP, SMTP, and FTP
MAC Flooding
§ Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each port
§ Switches can fail-open when flooded and begin to act like a hub
MAC Flooding
§ Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each port
§ Switches can fail-open when flooded and begin to act like a hub
MAC Spoofing
Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device
MAC Spoofing is often combined with an ARP spoofing attack
MAC Spoofing - Protection
§ Limit static MAC addresses accepted
§ Limit duration of time for ARP entry on hosts
§ Conduct ARP inspection
Routers operate at OSI Layer
Routers operate at OSI Layer 3 (Network)
Routers rely on a _______ to determine the proper
destination
Routers rely on a packet’s IP Addresses to determine the proper
destination
De-Militarized Zone
A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports
Focused on providing controlled access to publicly available servers that are hosted within your organizational network