Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
What is the Network Layer?
|
The network layer is the 3rd stage of the OSI model and is concerned with host to host communication tasks, like protocols, switching, routing, and addressing |
|
What does the Network Layer do?
|
It figures out where things are supposed to go and it plots out the most efficient path from your computer to the destination computer to take those things. |
|
Specifically, how does it do this?
|
forwarding, addressing and performs error handling. |
|
What is packet switching?
|
Packet switching is the act of breaking -up the message into smaller pieces so the whole thing will reassemble at the destination in one meaningful piece.
|
|
What is Store-And-Forward Packet Switching?
|
Between the sending computer and the receiving computer, this switch uses CRC(cyclic redundancy check) to confirm that the data packets coming from the sending computer is error free before making it to the receiving computer. Like a traffic cop directing traffic. |
|
What do address types does the Network Layer concern itself with?
|
It converts Logical Addresses(virtual) into Physical Addresses(real MAC) to help the message get to where its supposed to go. |
|
When converting Logical to Physical Addresses, what might you think a Network Layer is like?
|
A postman that puts zip codes on electrical messages.
|
|
What is spoofing and blind spoofing?
|
When unwanted parties sneak in by faking their credentials.
|
|
What is fragmentation?
|
A means of getting past network defenses by sending fragment sized data that evades the systems that check things like frame sizes. |
|
to use? |
Port knocking, secure IP(IPsec) and secure ICMP. |
|
What is IPsec? |
Internet Protocol Security which works by encrypting and authenticating each packet(usually with special keys known only to the two parties) so that, if hackers get past the level of trust, they will still need the keys. |