1 / 35

CISSP Training: Telecommunications and Networks

CISSP Training: Telecommunications and Networks. Prepared by T. Brian Granier March 2006 based upon Shon Harris, All in One CISSP Exam Guide, Third Edition. Domain Objectives - Telecom. OSI model TCP/IP and many other protocols LAN, WAN, MAN, intranet and extranet technologies

hanley
Download Presentation

CISSP Training: Telecommunications and Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CISSP Training: Telecommunications and Networks Prepared by T. Brian Granier March 2006 based upon Shon Harris, All in One CISSP Exam Guide, Third Edition

  2. Domain Objectives - Telecom • OSI model • TCP/IP and many other protocols • LAN, WAN, MAN, intranet and extranet technologies • Cable types and data transmission types • Network devices and services • Communications security management • Telecommunications devices • Remote access methods and technologies • Wireless technologies

  3. Never forget – CIA Model Protect confidentiality, integrity, and availability: • Confidentiality – through network protocols, authentication services, encryption services • Integrity – through firewalls and IDS • Availability – through backups and redundancy, operating performance CIA Triad Confidentiality Availability Integrity

  4. OSI Model • Physical • Data Link (Logical Link Control / Media Access Control) • Network • Transport • Session • Presentation • Application Please Do Not Throw Sausage Pizza Away or All People Seem To Need Data Processing

  5. OSI Model (Continued) The OSI (Open Systems Interconnection) reference model was developed by the International Standards Organization (ISO). It defines seven layers of functionality in data communications (protocol stack). • It is a protocol hierarchy - layer n talks to layer n on another host through interfaces with lower and upper layers on the same host. • In the OSI model, layers 1-3 are considered chained (vertical) and layers 4-7 are end-to-end between networks (horizontal), even though the actual data transmission is always vertical, except at the lowest layer.

  6. OSI Model (Continued) Physical Layer • transmits raw bit stream (1s and 0s) over a communications channel (wire or fiber connection). • unit transferred: bits • defines mechanical, functional, and electrical interface specification for connection to media • physical link characteristics include voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical connectors • physical layer hardware: cabling, transceivers, hubs

  7. OSI Model (Continued) Data Link Layer • unit transferred: frames • formats messages for transmission • transfers units of data (frames) across physical link. • breaks the raw input data stream into data frames for the network layer. • processes acknowledgement frames from the receiver. • bridge is example of L2 device • handles physical addressing (MAC address), line discipline, error notification, optional flow control • Data link layer has two sublayers defined by IEEE: MAC (Media Access Control) and LLC (Logical Link Control).

  8. OSI Model (Continued) Data Link Layer continued Media Access Control (MAC) Sublayer • MAC address is 48 bit physical address, unique for LAN interface card. • Burned into Read Only Memory. • First six bits provided by IEEE, identify vendor • MAC sublayer manages protocol access to physical network medium • how do stations on a network gain access to the media and permission to transmit their data - contention, token passing, polling Logical Link Control (LLC) Sublayer • defined in IEEE 802.2 specification • presents a uniform interface to upper layers, independent of LAN media access • allows multiple higher layer protocols to share a single physical data link • includes CRC fields responsible for frame synchronization, flow control, and error checking within the frame

  9. OSI Model (Continued) Network Layer • unit transferred: packets (datagrams) • creates and routes packets • IP addressing (if TCP/IP network) • manages connections across network. • adds routing information and selects appropriate facilities for transmitting message. • breaks messages into packets at sending end and reassembles packets into messages at receiving end. • controls operation of subnet - congestion control, accounting • devices not on the same network must communicate via intermediate system (e.g., router) • routing protocols operate at this layer

  10. OSI Model (Continued) Transport Layer • unit transferred: segments • establishes and deletes connections across the network • accepts data from session layer, splits into smaller units (fragmentation/reassembly), passes to network layer, and ensures safe arrival at other end. • provides reliable data transmission, including error correction and reestablishing communication after a network failure. • transport layer functions include flow control, multiplexing, virtual circuit management, error checking and recovery • Transport protocols: TCP (reliable), UDP (unreliable) • Ports, sockets at this layer

  11. OSI Model (Continued) Session Layer • establishes and terminates logical sessions between machines (ex. RPC, X Windows) and synchronizes communication. • AppleTalk protocol is one example • not really used in TCP/IP model.

  12. OSI Model (Continued) Presentation Layer • standardizes data presentation to application. • ensures that information is delivered in a form the recipient can understand, responsible for translating data into formats that can be readily understood by each system. • handles syntax and semantics of transmitted information, code formatting and conversion (EBCDIC-ASCII, one's or two's complements), may handle encryption • Layer 6 standards include JPEG, GIF, MPEG, MIDI

  13. OSI Model (Continued) Application Layer • manages user interface to network • interacts with software applications that implement a communicating component: file access and transfer, virtual terminal, email, web • SMTP, telnet, FTP, TFTP, HTTP, SNMP, etc.

  14. OSI Model (Continued) TCP/IP Reference Model • OSI model was developed before protocols. TCP/IP model was developed after protocols. • OSI model has some stuff that turned out not to be very useful (session and presentation layers) • TCP/IP model has 4 layers: Application, Transport, Internet (network), Host-to-network (combines Data link and Physical layers). Some people use a five layer model - leave data link and physical layers in.

  15. OSI Model (Continued) • OSI Model vs. TCP/IP Model

  16. OSI Model (Continued) Resources • "Understanding IP Addressing: Everything You Ever Wanted To Know", Chuck Semaria, • http://www.3com.com/nsc/501302.html (this is a great tutorial if you want to understand IP addressing, subnetting, etc.) • CISSP preparation slides, Domain 2 Review, Ben Rothke, • http://www.rothke.com • Books: Computer Security Basics (Russell & Gangemi), Computer Networks (Tanenbaum)

  17. TCP/IP and many other protocols • Connection oriented protocol (TCP) • TCP Three way hand shake • Connectionless protocol (UDP) • ARP • RARP (DHCP and Bootp) • ICMP • Routing Protocols Common Ports: ftp, http, https, dns, smtp, ssh, snmp 20/21, 80, 443, 53, 25, 22, 161/162

  18. TCP/IP… (Continued) IPv4 • Class A (0.0.0.0 – 127.255.255.255) /8 • Class B (128.0.0.0 - 191.255.255.255) /16 • Class C (192.0.0.0 – 223.255.255.255) /24 • Class D (224.0.0.0 – 239.255.255.255) • Class E (240.0.0.0 – 255.255.255.255) IPv6

  19. TCP/IP… (Continued) • Unicast – I want to talk to you • Multicast – I want to talk to my subscribers • Broadcast – I want to talk to everyone

  20. LAN, WAN, MAN, intranet and extranet technologies LAN Topologies • Ring Topology, Bus Topology, Star Topology, Mesh Topology • Physical vs. Logical topologies Ethernet (802.3) – most common today • 10Base2, 10Base5, 10Base-T, FastEthernet Token Ring (802.5) – logical ring, physical star FDDI (802.8) – two counter-rotating fiber rings

  21. LAN, WAN, MAN, intranet and extranet technologies • LAN, MAN and WAN • T-Circuit types • 24 normal 64 kbs channels = 1 T1 • 28 T1s = 1 T3 • Frame-relay • X.25 • ATM • SONET Ring

  22. Cable and data transmission types Data Transmission types • Analog and Digital • Asynchronous and Synchronous • Broadband and Baseband Cable types • Coaxial (Thicknet and Thinnet) • Twisted Pair (STP and UTP) – Cat 1 through Cat 7 • Fiber-optic

  23. Cable and data transmission types Cable issues • Noise – did you check for fluorescent lights? • Attenuation – you ran the cable how long? • Crosstalk – do you splice the wires together? • Plenum cabling and fire safety

  24. Cable and data transmission types Media Access Technologies • Token Passing • CSMA/CD • CSMA/CA • Collision Domains • Polling

  25. Network devices and services • Repeaters (Layer 1) • Bridges (Layer 2) • Switches (Layer 2, but…….) • VLANs • Routers (Layer 3 usually) • Gateway (Layer 7 usually)

  26. Network dvcs and svcs (Cont) Firewalls • Packet Filtering (think router acls) • Stateful Inspection (Checkpoint, iptables) • Proxy (Sonicwall, Eagle>Ratpor>Axent>Symantec) • Application level proxy • Circuit level proxy (sometimes called GSP) • Dynamic Packet filtering (Reflexive) • Kernel Proxy firewalls

  27. Network dvcs and svcs (Cont) Firewall architectures • Bastion Host • Dual-homed firewall • Screened host • Screened subnet

  28. Network dvcs and svcs (Cont) Other concepts • Spoofing • Honeypots • DNS – cache poisoning and split DNS (split-split DNS) • NAT (Static, Dynamic aka Hide, PAT) • Intranets and Extranets

  29. Telecommunications devices • QoS – Quality of Service • Constant Bit Rate (CBR) for the delay intolerant • Variable Bit Rate (VBR) for bursty traffic • Unspecified Bit Rate (UBR) best effort service • Available Bit Rate (ABR) take what’s left • http://www.cell-relay.com/cell-relay/FAQ/d/d16.html • SMDS – Switched Multimegabit Data Source • SDLC – Synchronous Data Link Control • HDLC – High-level Data Link Control • HSSI – High-Speed Serial Interface

  30. Telecom devices (Continued) • PSTN • VoIP • H.323 Gateways • CSU/DSU • Switching

  31. Remote access methods and technologies • Dial-up and RAS • ISDN, DSL and Cable • VPN • Tunneling Protocols • PPP • PPTP • LT2P • Authentication • PAP – Send in clear text • CHAP – challenge response • EAP – open the door wide to other methods

  32. Wireless technologies • Spread spectrum • Frequency Hopping Spread Spectrum • Direct Sequence Spread Spectrum - use it all • WLAN Terminology • Access Point (AP) • Service Set ID (SSID) • Ad hoc or infrastructure • WEP, LEAP, WPA, WPA-2 • War driving

  33. Wireless technologies (Continued) • Wireless standards • 802.11b (2.4 Ghz) – 11 Mbps • 802.11a (5 Ghz) – 54 Mbps • 802.11e - guaranteed delivery • 802.11f – enables roaming • 802.11g (2.4 Ghz) – 54 Mbps • 802.11h – follow on to 802.11a for European countries • 802.11i – security models • 802.1x

  34. Wireless technologies (Continued) • More wireless standards • 802.11j – International interoperability • 802.11n – 5 GHz WWiSE for > 100 MBps throughput with intent to maintain backwards compatability • 802.16 – MAN wireless standard • 802.15 – WPAN for PDAs and cell phones • Bluetooth • WAP – gateway between small handheld devices and normal web applications

  35. The End Questions?

More Related