This domain foucuses on communications over the network as obviously stated. Less obviously stated, this domain dives into the how and what with these communications are done. Are you going to have to know all 65536 TCP and UDP ports? Probably not. Are you going to need to distinguish protocols or technology used in each layer? More than likely.
OSI Layers
- Application: This is where you interface with the application layer. An FTP program, your browser, etc.
- Presentation: Presents data to the applcation and user in a comprehensible way. Think image formats
- Session: Manages sessions for connections between applications such as Remote Procedure Calls (RPC).
- Transport: Handles Packet Sequencing, flow control and error detection. Encapsulation is in Segments. Think TCP/UDP ports
- Network: Describes routing from one LAN to another. Encapsulation is in Packets. Think IP addresses, Routers
- Data Link: Divided into Media Access Control (MAC) and Logical Link Control (LLC). Encapsulation is in Frames. Think Switches.
- Physical: Cabling, and cabling standards. Encapsulation is in Bits. Think Ethernet, Fiber Optic Cables.
Network Devices
- Hubs/Repeaters: Layer 1 device. Receives bits on one port, sends on another.
- Switches: Layer 2 device. Provides traffic isolation associateing the MAC address of each connected device with its port on the switch.
- Bridges: Layer 2 device. A bridge has two ports and two collision domains.
- Routers: Layer 3 device.
- Class A: 10.0.0.0 - 10.255.255.255 (10/8 prefix)
- Class B: 172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
- Class C: 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
- Class A: 0.0.0.0 - 127.255.255.255
- Class B: 128.0.0.0 - 191.255.255.255
- Class C: 192.0.0.0 - 223.255.255.255
- SYN: Connection between a client and server are established
- SYN/ACK: Server receives SYN packet and returns an Acknowledgement receipt to the Client
- ACK: Client receives the SYN/ACK from the server and responses with an ACK packet
- Packet Filtering: Oldest and most basic firewalls that check the source and destination IP/Port to determine whether to allow or deny passage.
- Circuit Level Gateway: Works at the session layer, verify and keep track of active sessions using minimal resources. Not reliable for inspecting packets for Malware
- Stateful Inspection: Inspects packets; however consume more resources, thus vulnerable to DDoS attacks
- Application level gateways: aka Proxy Firewalls. Connections go through this firewall which perform stateful inspection of packets
