Understanding the DoD TCP/IP Networking Model

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

What is the DoD Model?

The US Department of Defense (DoD) network model created to enable users to exchange data between computer systems over a wide area network (WAN).

2
New cards

DoD Model and TCP/IP Model

  1. Network Access layer

  1. Internet layer

  1. Host-to-Host layer

  1. Process/Application layer

3
New cards

OSI model

1. The Physical Layer.

2. The Data Link Layer.

3. The Network Layer.

4. The Transport Layer.

5. The Session Layer.

6. The Presentation Layer.

7. The Application Layer.

4
New cards

Role of Application/Process Layer and its key protocols

Enables the user (human or software) to interact with the application or network for tasks like reading messages, transferring files, or performing other network-related tasks.

Key Protocols: HTTP, SMTP, POP, FTP, HTTPS, DNS.

5
New cards

Role of Transport/Host-to-Host Layer and its key protocols

It determines how much data to send, where it gets sent, and at what rate.It manages end-to-end communication, ensuring reliable data transfer, error recovery, and flow control. Key protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).

6
New cards

Role of the internet layer and key protocols

Responsible for routing data packets across different networks to reach their intended destinations.

Key Protocols: Internet Protocol (IP), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), IGMP (Internet Group Management Protocol)

7
New cards

Role of the Network Layer and key protocols

This layer determines how physical connections are set up and how bits are represented as signals.

Key Protocols: Ethernet and Wi-Fi as well as PPP (Point-to-Point Protocol), WPA2/3 security protocols for wireless networks, and STP (Spanning Tree Protocol)

8
New cards

TCP vs. UDP

TCP offers greater reliability by requiring acknowledgements, while UDP has faster response times and lower overheads.

9
New cards

Media Access Control (MAC) addressing

Unique hardware addresses set by manufacturers used to identify and communicate between devices on the same network segment.

10
New cards

Role of IP addresses

Identifies devices on the internet or a network, similar to physical addresses used by a post office.

11
New cards

Role of Subnet Masks

They are used to divide a larger network into smaller subnetworks, called subnets. Subnet masks specify which portion of an IP address refers to the network and which part refers to the host. Example: 255.255.255.0

12
New cards

IPv4 vs IPv6

IPv4 are 32-bit addresses, while IPv6 are 128-bit addresses

IPv6 allows for more adresses and have IPsec for built in security

13
New cards

Types of Tranmission media

  • Twisted Pair Cables

  • Fibre Optic Cables

  • Coaxial Cables

  • Wireless

14
New cards

Twisted Pair Cabling

involves two conductors twisted together to cancel out electromagnetic interference (EMI)

15
New cards

Fibre Optic Cables

transmit data using light pulses and offer transmission over longer distances and at higher data rates than wire cables, while being immune to EMI

16
New cards

Single Mode vs Multi Mode Fibres

Single-mode fibers are suited for long distances and high speeds, whereas multi-mode fibers are more cost-effective for short distances.

17
New cards

Coaxial Cables

has an inner conductor, insulating layer, and conducting shield, used for radio frequency signals, computer network connections, and cable television.

18
New cards

Wireless Technologies

use radio communication to connect network nodes without cables.

19
New cards

Fragmentation

The process of breaking down large packets into smaller packets for transmission.

20
New cards

Reassembly

The process of combining smaller packets back into a larger packet at the destination.

21
New cards

Network Interface Card (NIC)

Hardware that acts as the interface between a device and the network, encoding and decoding data into signals.

22
New cards

Public IP addresses

Are often given by an internet service provider (ISP) and assigned to your gateway device (usually a router), allowing the internet to recognize your network.

23
New cards

Local IP address

Every device on a local network has a unique local IP address assigned by your internal network via the router, allowing devices within your network to communicate with each other without each device needing a public IP.

24
New cards

Network Address Translation (NAT)

A process that allows a device needing something from outside the local network to use the LAN public IP to communicate with other networks via the router.

25
New cards

Modem

A device that modulates an analog carrier signal to encode digital information and demodulates it to decode transmitted information.

26
New cards

Transceiver

Acts as a device that converts analog signals to digital.

27
New cards

DSL modem

Connects a computer or router to a telephone circuit with Digital Subscriber Line service.

28
New cards

Router

A device that forwards data packets between telecommunications networks, effectively creating an internetwork.

29
New cards

Internet Layer

The layer of the DoD model responsible for routing data packets across different networks to reach their destinations.

30
New cards

IP addresses

Used by routers to forward packets based on routing tables.

31
New cards

Switch

Connects network segments or devices and processes data at the Network Access Layer of the DoD model.

32
New cards

Multi-port network bridge

Describes a switch that processes data at the Data Link layer in the OSI model.

33
New cards

Physical addressing

Involves MAC addresses and ensures reliable transmission of data frames between nodes on the same network segment.

34
New cards

Wireless Access Point (WAP)

Allows wireless devices to connect to a wired network using standards like Wi-Fi or Bluetooth.

35
New cards

IEEE 802.11

Standards supported by WAPs for sending and receiving data using radio frequencies.

36
New cards

Firewall

Can be implemented as hardware or software, controlling incoming and outgoing network traffic by analyzing data packets.

37
New cards

Software-based firewalls

Often operate at the Internet Layer of the DoD model, acting as packet filters based on established rules.

38
New cards

Hardware-based firewalls

Commonly operate at the Application Layer of the DoD model, working at the application level to intercept traffic for specific applications.

39
New cards

Multiple layers

More advanced firewalls and security appliances may operate across multiple layers of the DoD model, examining traffic based on IP addresses, port numbers, and application-specific data to identify and mitigate security threats.

40
New cards

Need for Preventing Unauthorised Access to a Network

Network security is needed to protect vital information while still allowing necessary access, including sensitive data like trade secrets, medical records, and financial information.

41
New cards

Authentication and access control

A key goal of network security is to provide authentication and access control for resources.

42
New cards

Prevent and monitor unauthorized access

Network security involves adopting policies to prevent and monitor unauthorized access.

43
New cards

Confidentiality

A core principle of computer security, ensuring that only those who are supposed to access the data can access it.

44
New cards

Role of Firewalls in Securing Networks

Firewalls are software and hardware devices positioned between an internal computer network and the Internet to improve system security.

45
New cards

Firewall rules

A network manager sets up rules for the firewall to filter out unwanted intrusions, making unauthorized access much more difficult.

46
New cards

Packet filters

Firewalls can operate as packet filters, allowing or blocking packets based on whether they match established rules.

47
New cards

Role of Operating Systems in Network Security

The operating system plays a vital role in maintaining the security within a computer system, including the security of the information it holds and the network it operates in.

48
New cards

Authentication

The OS provides Authentication as a protective method to ensure a user accessing a program is authorized.

49
New cards

Backup and Restore

The OS can provide Backup and Restore capabilities, allowing users to create copies of data, files, and folders, or even entire system image backups.

50
New cards

Intrusion Detection and Prevention

The OS supports Intrusion Detection and Prevention by monitoring the system for vulnerabilities and file integrity.

51
New cards

Prevent Viruses, Malware, and Trojans

Operating systems have inbuilt software components to help prevent viruses, malware, and Trojans from infiltrating and damaging systems.

52
New cards

Firewall in Operating Systems

In modern operating systems, a Firewall is often incorporated as part of the OS, controlling access to system resources based on defined policies.

53
New cards

Factors that Affect Network Performance

Various factors can affect network performance, including bandwidth.

54
New cards

Bandwidth

Bandwidth refers to the maximum amount of data that can be transmitted over a network connection in a given time, representing the capacity of the connection or channel.

55
New cards

Bits per second

Bandwidth is usually expressed in bits per second (bps), with common units including kilobits per second (Kbps) and megabits per second (Mbps).

56
New cards

Conversion from Mbps to MBps

To convert Mbps to megabytes per second (MBps), you divide by 8 (the number of bits in a byte).

57
New cards

Throughput

The actual amount of data transmitted over a connection in a given time.

58
New cards

Network Design

A critical factor in performance that involves considering both physical and logical aspects.

59
New cards

Physical Network Design

Addresses things like running copper and fiber cabling, the number of switch ports required, Wi-Fi access point positioning, rack layout, cooling, and power.

60
New cards

Logical Network Design

Deals with IP addressing and subnetting, VLANs, data flows, and network topology.

61
New cards

Network Topology

The choice of layout (e.g., Bus, Star, Ring, Mesh, Hybrid) that can significantly affect network performance, scalability, and reliability.

62
New cards

Expansion

Consideration in network design to avoid simply adding devices organically without considering potential bottlenecks.

63
New cards

Tiering

A method to manage growth, build in redundancy, and mitigate bottlenecks in medium or large networks.

64
New cards

Virtualized Infrastructure

Infrastructure like Amazon Web Services or Google Cloud services that are flexible and can dynamically expand.

65
New cards

Redundancy

Having alternate or additional network devices to ensure the network stays up in case of an outage.

66
New cards

Load Balancing

Necessary when incoming traffic is high to prevent slowdowns, lag, stoppages, or crashes.

67
New cards

Quality of Service (QoS)

A measure of how a network performs under load, ensuring applications like streaming media, VoIP, and web services are appropriately handled.

68
New cards

Data Collisions

A factor that affects network performance, which can be controlled by setting up routers and switches to use Carrier Sense Detection and Avoidance.

69
New cards

CSMA/CD

Carrier Sense Multiple Access with Collision Detection, which uses 'carrier-sensing' to detect signals on connecting media.

70
New cards

Excess Broadcast Traffic

Can negatively impact network performance and sometimes create a broadcast storm.

71
New cards

Broadcast Storm

Occurs when messages broadcast on a network cause receiving nodes to respond by broadcasting their own messages, flooding the LAN with packets.

72
New cards

Poor Network Architecture

Can lead to broadcast storms, such as having too many nodes on one network or needing VLANs or subnetting.

73
New cards

Spanning Tree Protocol (STP)

A link management protocol that prevents media access control (MAC), switching/bridge loops, and broadcast delays on a LAN.

74
New cards

Storm Control Protocols

Methods to reduce storm activity on a network.

75
New cards

IP-Directed Broadcasts

Should be disabled on Layer 3 devices to help reduce broadcast storms.

76
New cards

Broadcast Domains

Can be split up by creating new VLANs or subnets to reduce storm activity.