Section 11 Network Design Flashcards
Used to explain network communications between a host and remote device over a LAN or Wan.
OSI Model
Represents the actual network cables and radio waves used to carry data over a network.
Physical Layer
Describes how a connection is established, maintained, and transferred over the physical layer and uses physical addressing (MAC addresses).
Data Link Layer
Uses logical address to route or switch information between hosts, the network, and the internet works.
Network Layer
Manages and ensures transmission of the packets occurs from a host to a destination using either TCP or UDP.
Transport Layer
Manages the establishment, termination, and synchronization of a session over the network.
Session Layer
Translates the information into a format that the sender and receiver both understand.
Presentation Layer
Layer from which the message is created, formed, and originated.
Application Layer
Attempt to overwhelm the limited switch memory set aside to store the MAC addresses for each part.
MAC Flooding
Occurs when an attacker masks their own MAC address to pretend they have the MAC address of another device.
MAC Spoofing
Occurs when an attacker attempts to gain physical access.
Physical Tampering
Used to connect two or more networks to form as internetowrks.
Routers
An ordered set of rules that a router uses to decide whether to permit or deny traffic based upon given characteristics.
Access Control List
Focused on providing controlled access to publicly available servers that are hosted within your organizational networks.
De-Militarized Zone (DMZ)
Specialized type of DMZ that is created for your partner organizations to access over a wide area network.
Extranet