CISSP For Dummies

In 1984, the International Standards Organization (ISO) adopted the Open Systems Interconnection (OSI) Reference Model (or simply, the OSI model) to facilitate interoperability between network devices independent of the manufacturer. The OSI model defines standard protocols for communication and interoperability by using a layered approach. This approach divides complex networking issues into simpler functional components that help the understanding, design, and development of networking solutions and provides the following specific advantages:

The OSI model consists of seven distinct layers that describe how data is communicated between systems and applications on a computer network. (See Figure 5-1.)

Figure 5-1: The seven layers of the OSI model.

In the OSI model, data is passed from the highest layer (Application; Layer 7) downward through each layer to the lowest layer (Physical; Layer 1) and is then transmitted across the network medium to the destination node, where it’s passed upward from the lowest layer to the highest layer. Each layer communicates only with the layer immediately above and below it (adjacent layers). This communication is achieved through a process known as data encapsulation. Data encapsulation wraps protocol information from the layer immediately above in the data section of the layer immediately below. Figure 5-2 illustrates this process.

Figure 5-2: Data encapsulation in the OSI model.

 Tip   Try creating a mnemonic to recall the layers of the OSI model, such as: Adult People Should Try New Dairy Products for Application, Presentation, Session, Transport, Network, Data Link, and Physical.

Physical Layer (Layer 1)

The Physical Layer sends and receives bits across the network.

It specifies the electrical, mechanical, and functional requirements of the network, including topology, cabling and connectors, and interface types, as well as the process for converting bits to electrical (or light) signals that can be transmitted across the physical medium. Various network topologies, made from wires, cables, hubs, and other physical materials comprise the Physical Layer.

Network topologies

The three basic network topologies in common use at the Physical Layer today are bus, star, and ring. Although many variations of the four basic types (meshed, Fiber Distributed Data Interface [FDDI], star-bus, star-ring) exist, we stick to the basics here.

Bus

In a bus (or linear bus) topology, all devices are connected to a single cable (the backbone) that’s terminated on both ends. Bus networks are ideal for smaller networks because they’re inexpensive and easy to install. However, in a larger environment, they’re impractical because the media have physical limitations, the backbone is a single point of failure (a break anywhere on the network affects the entire network), and tracing a fault in a large network can be extremely difficult.

Star

In a star topology, each individual node on the network is directly connected to a central hub or concentrator. All data communications must pass through the hub, which can become a bottleneck or single point of failure. Star topologies are more expensive than bus topologies because of the additional hardware (hubs) and cable lengths. However, a star topology is ideal for larger environments and is the most common basic topology in use today. A star topology is also easy to install and maintain, and network faults are easily isolated without affecting the rest of the network.

Ring

A ring topology is a closed loop connecting end devices in a continuous ring. Functionally, this is achieved by connecting individual devices to a Multistation Access Unit (MSAU or MAU). Physically, this gives the ring topology the appearance of a star topology. Ring topologies are common in token-ring and FDDI networks.

 Instant Answer   Analog and digital signaling

Analogsignaling conveys information through a continuous signal by using variations of wave amplitude, frequency, and phase.

Digital signaling conveys information in pulses through the presence or absence (on-off) of electrical signals.

Cable and connector types

Cables carry the electrical or light signals that represent data between devices on a network. Signaling over cable medium is classified as either baseband or broadband. Baseband signaling uses a single channel for transmission of digital signals and is common in LANs using twisted pair cabling. Broadband signaling uses many channels over a range of frequencies for transmission of analog signals including voice, video, and data. The three basic cable types used in networks are coaxial, twisted pair, and fiber optic.

Coaxial cable

Using coaxial (abbreviated as coax and pronounced koh-axe) cable was very common in the early days of LANs and is rebounding (sort of) with the emergence of broadband networks. Coax cable consists of a single, solid copper-wire core, surrounded by a plastic or Teflon insulator, braided-metal shielding, and (sometimes) a metal foil wrap, all covered with a plastic sheath. This construction makes the cable very durable and resistant to Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI) signals.

Coax cable comes in two flavors, thick and thin:

Twisted pair cable

Twisted pair cable is the most popular LAN cable in use today because it’s lightweight, flexible, inexpensive, and easy to install. One easily recognized example of twisted pair cable is common telephone wire. Twisted pair cable consists of copper-wire pairs that are twisted together to improve the transmission quality of the cable. Currently, seven classes of twisted pair cable are defined. However, only CAT-5, CAT-5e, and CAT-6 cable are typically used for networking. Read through Table 5-1 for the lowdown.

Table 5-1: Twisted Pair Cable Classes

Open table as spreadsheet

Classes

Use

Example

1

Voice only

Telephone

2

Data (up to 4 Mbps)

Token-ring at 4 Mbps

3

Data (up to 10 Mbps)

Ethernet

4

Data (up to 20 Mbps)

Token-ring at 16 Mbps

5

Data (up to 100 Mbps)

Fast Ethernet

5e

Data (up to 1000 Mbps @ 100 MHz)

Gigabit Ethernet

6

Data (up to 1000 Mbps @ 250 MHz)

Gigabit Ethernet

Twisted pair cable can be either unshielded (UTP) or shielded (STP). UTP cabling is more common because it’s easier to work with and less expensive than STP. STP is used when RFI or EMI is a major concern.

Twisted pair cable is terminated with an RJ-type terminator. The three common types of RJ-type connectors are RJ-11, RJ-45, and RJ-49. Although these connectors are all similar in appearance (particularly RJ-45 and RJ-49), only RJ-45 connectors are used for LANs. RJ-11 connectors are used for analog phone lines, and RJ-49 connectors are commonly used for Integrated Services Digital Network (ISDN) lines and WAN interfaces.

Fiber optic cable

Fiber optic cable, the most expensive type of network cabling - but also the most reliable - is typically used in backbone networks and high-availability (FDDI) networks. Fiber optic cable carries data as light signals rather than as electrical signals. Fiber optic cable consists of a glass core or bundle, a glass insulator (commonly known as cladding), Kevlar fiber strands (for strength) and a polyvinyl chloride (PVC) or Teflon outer sheath. Advantages of fiber optic cable include higher speeds, longer distances, and resistance to interception and interference. Fiber optic cable is terminated with an SC-type, ST-type, or LC-type connector.

See Table 5-2 for a comparison of the various cable types and their characteristics.

Table 5-2: Cable Types and Characteristics

Open table as spreadsheet

Cable Type

Ethernet Designation

Maximum Length

EMI/RFI Resistance

RG58 (Thinnet)

10Base2

185 meters

Good

RG8/11 (Thicknet)

10Base5

500 meters

Better

UTP

10/100/1000BaseT

100 meters

Poor

STP

10/100/1000BaseT

100 meters

Fair to good

Fiber optic

100BaseF

2,000 meters

Best (No effect)

Interface types

The interface between the Data Terminal Equipment (DTE) and Data Communications Equipment (DCE), which we discuss in the upcoming section “Networking equipment,” is specified at the Physical Layer.

 Instant Answer   Network topologies, cable and connector types, and interfaces are defined at the Physical Layer of the OSI model.

Common interface standards include

Networking equipment

Networking devices that operate at the Physical Layer include Network Interface Cards (NICs), network media (cabling/connectors/interfaces, which we discuss in the earlier section “Cable and connector types”), repeaters, and hubs.

Network Interface Cards (NICs) are used to connect a computer to the network. NICs may be integrated on a computer motherboard or installed as an adapter card, such as an ISA, PCI, or PC card.

A repeater is a nonintelligent device that simply amplifies a signal to compensate for attenuation (signal loss) and extend the length of the cable segment.

A hub (or concentrator) is used to connect multiple LAN devices together, such as servers and workstations. The two basic types of hubs are

A switch is used to connect multiple LAN devices together. Unlike a hub, a switch does not send outgoing packets to all devices on the network, but instead sends packets only to actual destination devices.

Data Link Layer (Layer 2)

The Data Link Layer ensures that messages are delivered to the proper device across a physical network link. This layer also defines the networking protocol (for example, Ethernet and token-ring) used for sending and receiving data between individual devices. The Data Link Layer formats messages from layers above into frames for transmission, handles point-to-point synchronization and error control, and can perform link encryption.

 Cross-Reference   We go into detail about link encryption in Chapter 8.

The Data Link Layer consists of two sublayers: the Logical Link Control (LLC) and Media Access Control (MAC) sublayers.

 Instant Answer   The Data Link Layer is responsible for ensuring that messages are delivered to the proper device across a physical network link.

The Logical Link Control (LLC) sublayer is defined in Institute of Electrical and Electronic Engineers (IEEE) standards 802.1 (Internetworking) and 802.2 (Logical Link Control). See Table 5-3 for more information about the IEEE 802 standards. The LLC sublayer operates between the Network Layer above and the MAC sublayer below. The LLC sublayer performs the following three functions:

Table 5-3: The IEEE 802 Standards

Open table as spreadsheet

Standard

Description

802.1

Internetworking

802.2

Logical Link Control (LLC)

802.3

Ethernet

802.4

Physical Bus

802.5

Token Ring

802.6

Metropolitan Area Networks (MANs)

802.7

Broadband Technical Advisory Group

802.8

Fiber Optic Technical Advisory Group

802.9

Integrated Voice/Data Networks

802.10

Network Security

802.11

Wireless Networks

802.12

High-speed Networks

The Media Access Control (MAC) sublayer is defined in IEEE standards 802.3 (Ethernet), 802.4 (Physical Bus), 802.5 (Token Ring), and 802.12 (High-speed Networks).

 Instant Answer   The Logical Link Control (LLC) and Media Access Control (MAC) are sublayers of the Data Link Layer.

The MAC sublayer operates between the LLC sublayer above and the Physical Layer below. It is primarily responsible for framing and performs the following three functions:

 Instant Answer   The Logical Link Control (LLC) and Media Access Control (MAC) are sub-layers of the Data Link Layer.

LAN protocols and transmission methods

Common LAN protocols are defined at the Data Link (and Physical) Layer. They include the following:

LAN data transmissions are classified as

 Instant Answer   LAN data transmissions are classified as unicast, multicast, or broadcast.

WLAN technologies and protocols

WLAN (wireless LAN) technologies function at the lower layers of the OSI Reference Model. WLAN protocols define how frames are transmitted over the airlink. See Table 5-4 for standard WLAN protocols.

Table 5-4: Wireless LAN Protocols

Open table as spreadsheet

Type

Speed

Description

802.11

1 Mbit/s

Legacy protocol

802.11b

11 Mbit/s

First widely used protocol

802.11a

54 Mbit/s

Operated in 5 GHz band (less interference)

802.11g

54 Mbit/s

 

802.11n

540 Mbit/s

 

WLAN networks were first encrypted with the WEP (Wired Equivalent Privacy) protocol, which was soon proven to be unsafe. New standards of encryption include WPA (WiFi protected access) and WPA2.

WAN technologies and protocols

WAN technologies function at the lower three layers of the OSI Reference Model (the Physical, Data Link, and Network Layers), primarily at the Data Link Layer. WAN protocols define how frames are carried across a single data link between two devices. These include

Networking equipment at the Data Link Layer

Networking devices that operate at the Data Link Layer include bridges, switches, DTEs, and DCEs.

A bridge is a semi-intelligent repeater used to connect two or more (similar or dissimilar) network segments. A bridge maintains an Address Resolution Protocol (ARP) cache containing the MAC addresses of individual devices on connected network segments. When a bridge receives a data signal, it checks its ARP cache to determine whether the destination MAC address is on the local network segment. If it’s determined to be local, the data signal isn’t forwarded. However, if the MAC address isn’t local, the bridge forwards (and amplifies) the data signal to all other connected network segments. A serious networking problem associated with bridges is a broadcast storm, in which broadcast traffic is automatically forwarded by a bridge, thus effectively flooding a network.

A switch is essentially an intelligent hub that uses MAC addresses to route traffic. Unlike a hub, a switch transmits data only to the port connected to the destination MAC address. This transmission method creates separate collision domains (called network segments) and effectively increases the data transmission rates available on the individual network segments. Additionally, a switch can be used to implement Virtual LANs (VLANs) to logically segregate a network and limit broadcast domains. Switches are traditionally considered to be Layer 2 (or Data Link Layer) devices, although newer technologies allow switches to function at the upper layers including Layer 3 (the Network Layer) and Layer 7 (the Application Layer).

Asynchronous and synchronous communications

Asynchronous communication transmits data in a serial stream with control data (start and stop bits) embedded in the stream to indicate the beginning and end of characters. Asynchronous devices must communicate at the same speed, which is controlled by the slower of the two communicating devices. Because no internal clocking signal is used, parity bits are used to reduce transmission errors.

Synchronous communications utilize an internal clocking signal to transmit large blocks of data, known as frames. Synchronous communication is characterized by very high-speed transmission rates.

Data Terminal Equipment (DTE) is a general term used to classify devices at the user end of a user-to-network interface (such as computers). A DTE connects to Data Communications Equipment (DCE; also know as a Data Circuit-Terminating Equipment), which consists of devices at the network end of a user-to-network interface. The DCE provides the physical connection to the network, forwards network traffic, and provides a clocking signal to synchronize transmissions between the DCE and DTE. Examples of DCEs include NICs (Network Interface Cards), modems, and CSU/DSUs (Channel Service Unit/Data Service Unit).

Network Layer (Layer 3)

The Network Layer (Layer 3) provides routing and related functions that enable data to be transported between systems on the same network or on interconnected networks or internetworks. Routing protocols, such as the Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP) are defined at this layer. Logical addressing of devices on the network is accomplished at this layer by using routed protocols, including the Internet Protocol (IP) and Internetwork Packet Exchange (IPX).

 Instant Answer   The Network Layer is primarily responsible for routing.

Internet Protocol (IP)

Internet Protocol (IP) contains addressing information that enables packets to be routed. IP is documented in RFC 791 and is part of the TCP/IP protocol suite, which is the language of the Internet. IP has two primary responsibilities:

IP Version 4 (IPv4), which is currently the most commonly used, uses a 32-bit logical IP address that’s divided into four 8-bit sections (octets) and consists of two main parts: the network number and the host number.

IP addressing supports five different address classes indicated by the high-order (left-most) bits in the IP address, as listed in Table 5-9.

Table 5-9: IP Address Classes

Open table as spreadsheet

Class

Purpose

High-Order Bits

Address Range

Maximum Hosts

A

Large networks

0

1 to 126

16,777,214 (224-2)

B

Medium networks

10

128 to 191

65,534 (216-2)

C

Small networks

110

192 to 223

254 (28-2)

D

Multicast

1110

224 to 239

N/A

E

Experimental

1111

240 to 254

N/A

Several IP address ranges are also reserved for use in private networks (for example, 10.x.x.x, 172.16.x.x to 172.31.x.x, and 192.168.x.x). These addresses aren’t routable on the Internet and are thus often implemented on firewalls and gateways by using Network Address Translation (NAT) to conserve IP addresses, mask the network architecture, and enhance security. NAT translates private, non-routable addresses on internal network devices to registered IP addresses when communication across the Internet is required.

IP Version 6 (IPv6) uses a 128-bit logical IP address and incorporates additional functionality to provide security, multimedia support, plug-and-play compatibility, and backward compatibility with IPv4. IPv6 hasn’t yet been widely implemented on the Internet.

Internetwork Packet Exchange (IPX)

Internetwork Packet Exchange (IPX) is a connectionless protocol used primarily in NetWare networks for routing packets across the network. It’s part of the IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) protocol suite, which is analogous to the TCP/IP protocol suite.

The Network layer is also responsible for converting logical addresses into physical addresses.The Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP) accomplish this.

Address Resolution Protocol (ARP)

The Address Resolution Protocol (ARP), defined in RFC 826, maps Network Layer IP addresses to MAC addresses. ARP discovers physical addresses of attached devices by broadcasting ARP query messages on the network segment. IP address to MAC address translations are then maintained in a dynamic table that is cached on the system.

Reverse Address Resolution Protocol (RARP)

The Reverse Address Resolution Protocol (RARP) maps MAC addresses to IP addresses. This is necessary when a system, such as a diskless machine, needs to discover its IP address. The system broadcasts a RARP message providing its MAC address and requests to be informed of its IP address. A RARP server replies with the requested information.

The Network Layer also defines a management protocol for IP known as the Internet Control Message Protocol (ICMP).

Internet Control Message Protocol (ICMP)

The Internet Control Message Protocol (ICMP) reports errors and other information back to the source regarding the processing of transmitted IP packets. ICMP is documented in RFC 792.

Common ICMP messages include Destination Unreachable, Echo Request and Reply, Redirect, and Time Exceeded. The Packet Internet Groper (PING) is a popular utility that uses ICMP messages to test the reachability of network device.

Networking equipment at the Network Layer

The primary networking equipment defined at Layer 3 are routers and gateways.

Routers

Routers are intelligent devices that link dissimilar networks and forward data packets based on logical or physical addresses to the destination network only (or along the network path). Routers consist of both hardware and software components and employ various routing algorithms (for example, RIP, OSPF, and BGP) to determine the best path to a destination based on different variables including bandwidth, cost, delay, and distance.

Gateways

Gateways are created with software running on a PC (workstation or server) or router. Gateways link dissimilar programs and protocols by examining the entire data packet to translate incompatibilities. For example, a gateway can be used to link an IP network to an IPX network or a Microsoft Exchange mail server to a Lotus Notes server (a mail gateway).

Transport Layer (Layer 4)

The Transport Layer (Layer 4) provides transparent, reliable data transport and end-to-end transmission control. The Transport Layer hides the details of the lower layer functions from the upper layers.

Specific Transport Layer functions include

 Instant Answer   The Transport Layer is responsible for providing transparent, reliable data transport and end-to-end transmission control.

Two important host-to-host protocols defined at the Transport Layer include

 Instant Answer   UDP is a connectionless protocol.

Several examples of connection-oriented and connectionless protocols are identified in Table 5-10.

Table 5-10: Connection-oriented and Connectionless Protocols

Open table as spreadsheet

Protocol

Layer

Type

TCP (Transmission Control Protocol)

4 (Transport)

Connection-oriented

UDP (User Datagram Protocol)

4 (Transport)

Connectionless

IP (Internet Protocol)

3 (Network)

Connectionless

IPX (Internetwork Packet Exchange)

3 (Network)

Connectionless

SPX (Sequenced Packet Exchange)

4 (Transport)

Connection-oriented

Transport Layer security protocols include the following:

Session Layer (Layer 5)

The Session Layer (Layer 5) establishes, coordinates, and terminates communication sessions (service requests and service responses) between networked systems.

 Instant Answer   The Session Layer is responsible for establishing, coordinating, and terminating communication sessions.

A communication session is divided into three distinct phases, as follows:

Some examples of Session Layer protocols include

Procedures are created on clients and performed on servers.

Presentation Layer (Layer 6)

The Presentation Layer (Layer 6) provides coding and conversion functions that are applied to data being presented to the Application Layer (Layer 7). These functions ensure that data sent from the Application Layer of one system are compatible with the Application Layer of the receiving system.

 Instant Answer   The Presentation Layer is responsible for coding and conversion functions.

Tasks associated with this layer include:

Application Layer (Layer 7)

The Application Layer (Layer 7) is the highest layer of the OSI model. It supports the components that deal with the communication aspects of an application requiring network access and provides an interface to the user. That is, both the Application Layer and end user interact directly with the application.

The Application Layer is responsible for the following:

 Instant Answer   The Application Layer is responsible for identifying and establishing availability of communication partners, determining resource availability, and synchronizing communication.

Don’t confuse the Application Layer with software applications such as Microsoft Word or WordPerfect. Applications that function at the Application Layer include operating systems (such as Windows and NetWare), OSI applications, such as File Transfer, Access, and Management (FTAM) and Virtual Terminal Protocol (VTP), and TCP/IP applications, including:

Application Layer security protocols include the following:

Категории