Telecommunications & Network Security Flashcards
What are the layers in the OSI Model?
(A)ll (P)eople (S)eem (T)o (N)eed (D)ata (P)rocessing 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Link
What are the OSI Layers Protocol Data Units
(D)on't forget your (S)(P)(F) at the (B)each Data = Layers 7 - 5 Segments = Layer 4 Packets = Layer 3 Frame = Layer 2 Bits = Layer 1
What are the components of Layer 1
Wiring, Wireless Modem Hubs Repeaters Access Points etc.
What are the wire types of layer 1
Twisted Pair
Coaxial Cable
Fiber Optics
What are the Attack vectors of Layer 1 (Using CIA as categories)
Integrity
- Injection/modification (noise)
Confidentiality
- Tapping (Grabbing hold of wire)
- Splicing (Breaking wire and pulling off a piece)
- Emanations ( Picking up info on the outside of wire)
Availability
- Cutting wire
What are the Controls to protect Layer 1?
Physical control of perimeter
- Security Domains
- DMZ
- Dual-homed host
Conduit
- Pressurized
Radio Frequency Management
- Directional antenna
What are the Topologies of Layer 1 (Physical Layout)
- Bus
- Tree
- Ring
- Mesh
- Star
What are the components of Layer 2
Switches
Bridges
What are Switches
- Separates collision domains based on physical wire
- Hardware
- Learns MAC addresses on segments and makes connections quickly and efficiently with no collisions
- Has more than 2 points (multi port bridge)
- full duplex
- Can filter on MAC addresses
What are Bridges
- Separates collision domains based on physical wire
- Software
- 2 Points
What does Layer 2 Provide?
1) Only Layer with 2 sub layers
- LLC (Logical Link Control - error detection)
- MAC (Media Access Control - Physical)
2) Responsible for error free, reliable transmission of data
3) Frames sized for compatibility with the MAC Protocol
4) Flow control, error detection and correction, retransmission
5) Uses MAC Addresses
What Does MAC Provide in Layer 2
1) MAC is the real address of a computer
2) NIC Card is identified by MAC address (NIC is unique for every hardware card) by
How is Addressing/Resolution and Media access determined in Layer 2?
1) ARP (Address Resolution Protocol)
- Takes IP and maps to MAC
- Stores MAC in cache
(Vulnerable if false MAC address is inserted in cache; called ARP Poisoning and is caused by unsolicited replies)
2) RARP (Reverse Address Resolution Protocol)
- Takes MAC and says give me an IP (DHCP)
How is traffic controlled with MAC in Layer 2?
1) Contention
- fight for the wire
- (CSMA/CA) Carrier Sense Multiple Access with Collision Avoidance ; used in wireless.
- (CSMA/CD)”…” with Collision Detection; waits for clear then starts talking; used in Wired
- Collision Domain; where collisions occur and cause DoS or sniffing attacks
2) Token
- Who ever has the token is first
3) Polling
- A mediator decides who communicates first (mainframes)
* *** Contention is the most popular
What is Ethernet
1) Most common form of LAN networking
2) Uses CSMA/CD
3) Supports full duplex
What are the Communication Protocols of Layer 2
Communication
- x.25; Robust
- Frame Relay ; Purchase only the needed bandwidth
- ATM (Asynchronous Transfer Mode) 100 MB or better (ie Voice/Video/Data or same channel)
- MPLS (Multi Protocol Labeling Switching) sits above layer 2 but below layer 3; allows user to specify their needs and the telephone company uses whatever they need to satisfy.