reference model has seven layers. layer one is the physical layer. layer two
is data link. layer three is network layer four is transport layer five is session.
layer six is presentation and layer seven is application. The first layer two device
that we ’re going to talk about is the switch. A switch utilizes an application
specific integrated circuit chip and a basic chip. The ASIC chip has specific
programming that allows the switch to learn when a device is on the network
and which ports it is connected to via that devices layer two MAC address.
The whap whap is a specific type of network bridge that connects or bridges
, wireless network segments with wired network segments. The most common
type of web bridges and 802 dot 11 wireless network segment with an 802 dot
three Ethernet network segment. A router can communicate with both local and
non local network devices in what it considers to be the best possible route to
reach those networks. A firewall can block packets from entering or leaving the
network. IDs and IDs are passive systems designed to identify when a network
breach or attack is occurring. They’re usually designed to inform a network
administrator when a breach has occurred.
IPS an IPS is an active system designed to stop a breach or attack from suc-
ceeding and damaging the network. IPS are programmed to make an active
response to the situation. They can block the offending IP address, close down
vulnerable interfaces, terminate network sessions and redirect the attack. The
best placement on the network segment is between a router with a firewall and
the destination network segment. A virtual private network or VPN is used by
remote hosts to access a private network through an encrypted tunnel through
a public network. There are several different types of VPNs there is the site
to site VPN, which allows a remote sites network to connect to the main sites
network and be seen as a local network segment. The use of the VPN can help
to reduce networking costs. A VPN concentrator on the local network manages
the connection. The host seeking to connect uses a web browser that supports
the correct encryption technology. The big protocol for VPN is called Internet
Protocol security IPsec. IP sec implements Internet Security Association and
key management eisah camp by default.
All modern web browsers support the secure socket layer or SSL. SSL is an
older cryptographic protocol that is very similar to TLS. The most common
use is in creating a secure encrypted internet session or SSL VPN. The Nic is
how a device connects to a network. It provides the functional means of network
communication by determining which networking protocols will be used. TAC x
plus is a triple A protocol used to help ensure that only authenticated end users
are using the network resources they are authorized to use. The accounting
services of radius are very robust. The only drawback to radius is only the
requesters the end users password is encrypted. Then we have web services
creating a means of cross communication. Web Services provides the means
for communication between software packages or disparate platforms. static IP
address assignment works fine for very small and stable networks, but quickly
becomes unwieldly and error prone as the network grows. static IP addresses
1