Please enable JavaScript.
Coggle requires JavaScript to display documents.
4.1 Assess and implement secure design principles in network architectures…
4.1 Assess and implement secure design principles in network architectures
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
Secure protocols
Kerberos SSH SSL and TLS SFTP IPsec
TCP/IP
Network access
- Data transfer done at this layer - Token ring • Frame Relay • FDDI • Ethernet • X.25
Internet
- Create small data chunks called datagrams to be transferred via network access layer - IP • RARP • ARP • IGMP • ICMP
Transport
- Flow control and integrity - TCP • UDP
Application
- Convert data into readable format - Telnet • SSH • DNS • HTTP • FTP • SNMP • DHCP
Formatting data happens at presentation layer 6
Internet Protocol (IP) networking (e.g., Internet Protocol Security (IPSec), Internet Protocol (IP) v4/6)
Any computer on a network can communicate with the internet, it will need an IP address, a default gateway, and a subnet mask
Subnets
are used for the following reasons:
to expand the network, to reduce congestion, te reduce CPU use, to isolate network problems, to improve security, to allow combinations of media because each subnet can support a different medium
Implications of multilayer protocols
Micro-segmentation (e.g., Software Defined Networks (SDN), Virtual eXtensible Local Area Network (VXLAN), Encapsulation, Software-Defined Wide Area Network (SD-WAN)
Wireless networks (e.g., Li-Fi, Wi-Fi, Zigbee, satellite)
Wireless personal Area Standards (WPAS)
IEEE 802.15 Bluetooth
IEEE 802.3 Ethernet
IEEE 802.11 Wi-Fi
IEEE 802.20 LTE
Wi-Fi
802.11a 54 Mbps 2.4 GHz
802.11b 11 Mbps 5 GHz
802.11g 54 Mbps 2.4 GHz
802.11n 200+ Mbps 2.4/5 GHz
802.11ac 1Gbps 5 GHz
Standards 802.11b DSSS 802.11a OFDM
802.11 uses CSMA/CA
Periodically complete a
site survey
to ensure that no unauthorized wireless access points are established
Footprint
is used to describe the area that is covered by satellite. A footprint covers an area on Earth for a small amount of time.
Cellular networks (e.g., 4G, 5G)
Content Distribution Networks (CDN)
Converged protocols
(e.g., Fiber Channel Over Ethernet (FCoE),
Internet Small Computer Systems Interface (iSCSI), Voice over Internet Protocol (VoIP