lec6 - CprE 530 Lecture 6 Topics Lower Layer Security...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
CprE 530 Lecture 6 Topics Lower Layer Security Physical Layer Overview Common attack methods • Ethernet
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Physical Network Layer Software Drivers Service Access Points Data buffers Software Upper Layer Digital Data in bytes Digital Data in bytes Medium access Medium Access Protocol Device Interface Hardware Physical Media Physical media specific signal Common Attack Methods Spoofing Sniffing Physical Attacks
Background image of page 2
Hardware Addressing D2 D4 D6 HW-D2 HW-D4 HW-D6 R1 R2 D1 D3 D5 D7 Network N1 Network N2 Network N3 HW-D1 HW-R1a HW-R1-b HW-D3 HW-D5 HW-D7 HW-R2a HW-R2b Packet Hardware Address Spoofing Computer 1 HW= A1 Computer 2 HW= C2 Router 1 HW= A2 , B1 Router 2 HW= B3 , C1 Network A Network C Network B Attacker 1 Attacker 2 Attacker 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network Sniffing Physical Attacks Bad network cable Network cable loop (both ends plugged into the same device) Bad network controlle • Bad network controller Two network controllers with the same hardware address
Background image of page 4
Wired Network Protocols Many protocols Local Area Networks (LAN) – Ethernet is the most common Wide Area Networks (WAN • Wide Area Networks (WAN) Ethernet Developed in 1973 by Xerox Speeds – 10 Mbps – 100 Mbp – 100 Mbps – 1000 Mbps (gigabit) – 10 Gigabit
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Ethernet Transmission media Name Cable type Speed Maximum Distance between devices 10Base2 Coax 10 Mbps 185 meters 10BaseF Fiber 10 Mbps
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/08/2011 for the course CPRE 530 taught by Professor Jacobson during the Fall '10 term at Iowa State.

Page1 / 16

lec6 - CprE 530 Lecture 6 Topics Lower Layer Security...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online