Summary
513
Token Passing
This is the LAN media access technology that performs communications
using a digital token. Possession of the token allows a host to transmit data. Once its trans-
mission is complete, it releases the token to the next system. Token passing is used by Token
Ring networks, such as FDDI. Token Ring prevents collisions since only the system possess-
ing the token is allowed to transmit data.
Polling
This is the LAN media access technology that performs communications using a
master-slave configuration. One system is labeled as the primary system. All other systems
are labeled as secondary. The primary system polls or inquires of each secondary system in
turn whether they have a need to transmit data. If a secondary system indicates a need, it is
granted permission to transmit. Once its transmission is complete, the primary system moves
on to poll the next secondary system. Synchronous Data Link Control (SDLC) uses polling.
Polling addresses collisions by attempting to prevent them from using a permission system.
Polling is an inverse of the CSMA/CA method. Both use masters and slaves (or primary and
secondary), but while CSMA/CA allows the slaves to request permissions, polling has the
master offer permission. Polling can be configured to grant one (or more) system priority
over other systems. For example, if the standard polling pattern was 1, 2, 3, 4, then to give
system 1 priority, the polling pattern could be changed to 1, 2, 1, 3, 1, 4.
Summary
The tasks of designing, deploying, and maintaining security on a network require intimate
knowledge of the technologies involved in networking. This includes protocols, services,
communication mechanisms, topologies, cabling, endpoints, and networking devices.
The OSI model is a standard against which all protocols are evaluated. Understanding
how the OSI model is used and how it applies to real-world protocols can help system
designers and system administrators improve security. The TCP/IP model is derived directly
from the protocol and roughly maps to the OSI model.
Most networks employ TCP/IP as the primary protocol. However, numerous subpro-
tocols, supporting protocols, services, and security mechanisms can be found in a TCP/IP
network. A basic understanding of these various entities can help you when designing and
deploying a secure network.
In addition to routers, hubs, switches, repeaters, gateways, and proxies, firewalls are an
important part of a network’s security. There are several types of firewalls: static packet
filtering, application-level gateway, circuit-level gateway, stateful inspection, deep-packet
inspection, and next-gen.
Converged protocols are common on modern networks, including FCoE, MPLS, VoIP,
and iSCSI. Software-defined networks and content-distribution networks have expanded
the definition of network as well as expanded the use cases for it. A wide range of hardware
components can be used to construct a network, not the least of which is the cabling used
to tie all the devices together. Understanding the strengths and weaknesses of each cabling
type is part of designing a secure network.
514
Chapter 11
■
Secure Network Architecture and Securing Network Components
Wireless communications occur in many forms, including cell phone, Bluetooth
(802.15), RFID, NFC, and networking (802.11). Wireless communication is more vulner-
able to interference, eavesdropping, denial of service, and man-in-the-middle attacks.
The most common LAN technology is Ethernet. There are also several common network
topologies: ring, bus, star, and mesh.
Exam Essentials
Do'stlaringiz bilan baham: