• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
What is the Network Layer?

The network layer is the 3rd stage of the OSI model and is concerned with host to host communication tasks, like


protocols, switching, routing, and addressing



What does the Network Layer do?

It figures out where things are supposed to go and it plots out the most efficient path from


your computer to the destination computer to take those things.



Specifically, how does it do this?


It selects protocols, switching, routing,


forwarding, addressing and performs error handling.

What is packet switching?
Packet switching is the act of breaking -up the message into smaller pieces so the whole thing will reassemble at the destination in one meaningful piece.
What is Store-And-Forward Packet Switching?

Between the sending computer and the


receiving computer, this switch uses CRC(cyclic redundancy check) to confirm that the data packets coming from the sending computer is error free before making it to the receiving computer. Like a traffic cop directing traffic.

What do address types does the Network Layer concern itself with?

It converts Logical Addresses(virtual) into Physical Addresses(real MAC) to help the message get to where its supposed to go.
When converting Logical to Physical Addresses, what might you think a Network Layer is like?
A postman that puts zip codes on electrical messages.
What is spoofing and blind spoofing?
When unwanted parties sneak in by faking their credentials.
What is fragmentation?

A means of getting past network defenses by sending fragment sized data that evades the systems that check things like frame sizes.


What defenses is the Network Layer prepared


to use?

Port knocking, secure IP(IPsec) and secure


ICMP.




What is IPsec?

Internet Protocol Security which works by encrypting and authenticating each packet(usually with special keys known only to the two parties) so that, if hackers get past the level of trust, they will still need the keys.