Week 4 Discussion
.docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
425
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
3
Uploaded by mdshay
After reading this week's materials, please respond to one or more of the following questions.
1.
Describe the differences between bus, ring, star and mesh topologies.
A bus topology is just a straight line with the nodes branching off (Karris, 2009). This topology is easy to set up but isn’t efficient. Traffic on the network has to travel up and down the line to get to its destination. Also, one break in the line means the whole network is broken.
A ring topology is a circle of nodes. Its also easy to setup, but isn’t terribly efficient, either. Traffic travels through around the ring through the nodes to get to its destination (Knapp, 2015). As with the bus, a break in the line breaks the whole network.
In a star topology, all the nodes are connected to a central point (a hub). All nodes are connected through the hub. The star topology is easy to set up and expand. It’s more stable in the sense that a single line going down won’t shut it down, but if there’s something wrong with the hub, the network will
be down.
In a mesh topology, all nodes are interconnected. This is the most expensive and time-consuming to set up, but all the redundancy in connections makes it very reliable (Solomon, 2015).
Sources:
Karris, S. (2009). Networks: design and management, second edition
. [Books24x7 version] Available from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=30200
.
Knapp, E. & Langill, J. (2015). Industrial network security: securing critical infrastructure networks for smart grid, scada, and other industrial control systems, second edition
. [Books24x7 version] Available from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=77754
.
Solomon, M. & Kim, D. & Carrell, J. (2015). Fundamentals of communications and networking, second edition
. [Books24x7 version] Available from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?
bookid=69825
.
2.
Explain the TCP/IP Model in terms of functions at each layer. How do the layers map to the OSI Model layers?
3.
The Transport layer provides two service protocols: UDP and TCP. Explain the differences between the two protocols in terms of guaranteed vs. non-guaranteed service and connection-
oriented versus connection-less communication.
4.
Describe the different WLAN standards within the 802.11 family. What is a rogue access point?
After reading this week's materials, please respond to one or more of the following questions.
1.
Describe the functions of hubs/repeaters, bridges, switches, routers, and gateways. At what layers of the OSI model does each device operate?
2.
Describe the following types of network attacks: denial of service (and DDoS), malformed packet
attacks, flooding, sniffing, Ransomware, DNS hijacking, and drive-by download. Give an example
of a DoS or DDoS attack and describe how it overwhelms a target system.
Denial of service (DoS) attacks are about taking steps to denying network access, usually by overwhelming it in some way. Distributed denial of service (DDoS) attacks come from different places, meaning they are not bound by the bandwidth of a single location (Messier, 2017).
Malformed packet attacks manipulate transmitted data packets to leverage a potential software vulnerability (Messier, 2017).
Flooding attacks send data to as many network ports as possible in an effort to exhaust network resources.
Sniffing is a passive activity that either scans transmitted data or maps out network logical structure.
Ransomware is a malicious program that infects a system and encrypts its data. The sender of the ransomware then tries to sell the decryption key to the victim for money (Winkler, 2017).
DNS hijacking is when, through some malicious effort, an entity redirects a system to a different Domain Name Server (DNS). This means that they when you try to connect to a web address, the malicious DNS server can direct you wherever it wants. A drive-by-download is when a malicious program is somehow downloaded absent of a user’s knowledge or permission. These kind of downloads may happen via a browser or plug-in exploit when a user visits a webpage on the internet.
The Mirai IoT botnet is a good example of DDoS. Mirai is malicious code that infects unprotected IoT devices, making them a part of a DDoS attack (Hulme, 2017). Marai greatly increases the strength of a DDoS attack by increasing the number of systems attacking and the number of places that they are coming from.
Sources
Hulme, G. V. (2017, September 22). 6 DoS attacks that made headlines. Retrieved from https://www.csoonline.com/article/3226399/security/6-dos-attacks-that-made-headlines.html#slide7
Messier, R. (2017). Network forensics
. [Books24x7 version] Available from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=125725
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help