CISSP Introduction Module

CISSP Module 01

CISSP Module 02

CISSP Module 03

CISSP Module 04

CISSP Module 05

CISSP Module 06

CISSP Module 07

CISSP Module 08

CISSP Module 09

Part 04 – Layer 2 Data Link Part I Media Access

Invite Friends
Facebook Twitter Google+ LinkedIn Email
Description
Virtual Practice Lab
Practice Test
Resources
Part 04 – Layer 2 Data Link Part I Media Access

As we begin our ascent up through the layers of the OSI reference model from the Physical Layer, our next stop is the Data Link layer otherwise known as Layer 2. This layer is unique in that it is comprised of two sub-layers known as the LLC (Logical Link Control) layer and the MAC (Media Access Control) layer respectively.

The LLC layer is responsible for the detection of errors that result from data collisions. We’ll see in a moment how it also is responsible for implementing strategies for minimizing such collisions.

The MAC sub-layer is where the 48-bit physical device addresses reside. These addresses are unique for every device in the world (in theory anyway) and are comprised of a manufacturer’s ID portion and a device ID portion. Mapping from IP addresses to MAC addresses is handled by the Address Resolution Protocol (ARP) and conversely, mapping in the other direction is handled by the Reverse ARP protocol. Makes sense, right?

As with each layer that we’ll examine, there are threats that exist at the MAC layer, most prominently, poisoning of the ARP cache. This is an exploit where an unsolicited reply is generated in order to cause data misdirection for malicious purposes.

We conclude this section by examining the collision detection and management strategies present at the LLC sub-layer. CSMDA/CD (Carrier Sense Multiple Access with Collision Detection) “listens” for data on the line and only transmits when the line is quiet. It also listens for collisions (Collision Detection) and implements a backoff protocol prior to retrying if a collision is detected.

CSMDA/CA (Carrier Sense Multiple Access with Collision Avoidance) similarly listens on the media for data, but instead of immeditately transmitting when quiet is detected, instead signals its desire to transmit, much like raising your hand in class to ask a question. An older collision avoidance strategy and one little-used today, is that of Token Ring where a token is passed around to endpoints desiring to transmit. This technique is analogous to passing a mic on to the next person wishing to speak in an audience.

Watch the Course Intro Video
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google PlayGet it on the App Store
Practice Labs and Exam Vouchers

Congratulations! You're taking the first step to getting certified. Get some hands on experience with available practice labs OR save some money, support Cybrary, and purchase discounted exam vouchers. Ready to earn your next industry certification? Join cyber security's largest community and start learning today.

JOIN CYBRARY

Upcoming Industry Events

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel