Networking Essentials: Midterm Analysis

758 Words2 Pages

Midterm Examination Written Responses
Presented in
NET-102 Networking Essentials II

by

Ryan C Dobbs
Baker College of Auburn Hills, Michigan
5/12/14

Dr. Terrance Dillard

Professor
QUESTION 1

In a computer network, switches are devices that are used to connect devices together. Multiple cables can be connected to a switch to enable networked devices to communicate with each other. The role of a switch is to manage the flow of data throughout a network and this process is effective in its role due to the fact that the messages are sent only to the intended target. The media access control (MAC) is the identification that each device connected to the switch carries. By each device having individual IDs this increases the overall effectiveness and security of a network.
Switches operate within the OSI’s layer 2. This is known as the data link layer. The data link layer is responsible for the transfer of data frames from node to node across OSI’s layer one, the physical layer. This allows layers in the upper levels to have transmissions with error checking processes. The data link layer has several responsibilities of its function in the OSI model. The first is link establishment and termination which is where, between two separate nodes, it establishes and terminates the links that connect the two. Layer two also provides traffic control for the frames in transmission.
Network cables are another component that is used in communication between network devices. Cables are used to connect one network device to other via several different connections. The most reliable type of connection between two or more devices is to use a wired connection. These connections can be used to share data and access between servers, PCs, printer...

... middle of paper ...

...plying with this communication, the path of the connection is now going back towards the user, opposite of the original intent.
A ping of death is also another type of dos attack. This type of attack is based on the use of networking devices to send packets of data to many devices instead of one. The amplifier of this attack is the network of system under attack. The ones who send large numbers of IP packets are sending these units with fake address the victim and with the hopes that the system will become bogged down in attempts of communication with the bad address. They also use Ping floods so that by sending the victim too large of an amount of ping packets and the system cannot handle the load. It is very simple to launch and the only goal is to overload the amount that band width can support.

References
Meyers 2012, Managing and troubleshooting Networks

More about Networking Essentials: Midterm Analysis

Open Document