Advanced Networks Flashcards

(141 cards)

1
Q

Modulation

A

The encoding of data in a radio wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Carrier Signal

A

The basis upon which information is superimposed allowing for transmission of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AM

A

Amplitude Modulation

Varies the amplitude of a carrier signal to encode the message signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ASK

A

Amplitude Shift Keying

Toggles the amplitude of the carrier signal depending on the message signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FSK

A

Frequency Shift Keying

Toggles the frequency of the carrier signal between two distinct values depending on the message signal (0 or 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PSK

A

Phase Shift Keying

Toggles the phase of a carrier signal depending on the digital signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Binary PSK

A

Toggles the phase between two states to encode 1 bit (2 states)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quadrature PSK

A

Toggles the phase between four states to encode 2 bits (4 states)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eight-PSK

A

Toggles the phase between eight states to encode 3 bits (8 states)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QAM

A

Quadrature Amplitude Modulation

Varies both the phase and amplitude of the to improve bandwidth efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

FDMA

A

Frequency Division Multiple Access

Divides a band into channels and assigns each user a channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Dynamic) TDMA

A

Time Division Multiple Access

Divides time into slots and allocates each user a time slot

Guard Periods may help space out time slots

Dynamic TDMA considers user requirements and allocates multiple time slots if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CDMA

A

Code Division Multiple Access

Uses orthogonal modulation codes to allow multiple transmissions over the same frequency bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11

A

Wi-Fi

Specifications for PHY Layer and MAC Layer for Wireless Local Area Networks (WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DSSS

A

Direct Sequence Spread Spectrum

Wi-Fi Modulation Technique

Spreads signal across an entire allocated frequency by modulating with a spreading code (known only to the sender and receiver) at a higher bit-rate
A higher bit-rate (spreading ratio) uses more frequency and improves interference immunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FDM

A

Frequency Division Multiplexing

Wi-Fi Modulation Technique

Combines multiple signals into one signal for transmission over a single channel
Guard bands between each signal avoid overlap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OFDM

A

Orthogonal FDM

Wi-Fi Modulation Technique

Sub-carrier frequencies are orthogonal with the peak coinciding with the nulls of adjacent subcarriers
Saves bandwidth, allowing for higher data rate but is more susceptible to noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OFDMA

A

OFDM With Multiple Access

Wi-Fi Modulation Technique

Not every packet utilises the entire bandwidth of a sub-carrier. So sub-carriers (and time allocations) are divided amongst users
Improves efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Beamforming

A

Wi-Fi Spatial Performance Improvement

Focuses radio waves in the direction of a specific client
Improves medium range communications (Provides no benefit for long range and is not needed for short range)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MIMO

A

Multiple-Input Multiple-Output

Wi-Fi Spatial Performance Improvement

Uses multiple antennas at both the transmitter and receiver for simultaneous transmission and reception of multiple data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MU-MIMO

A

Multi-User MIMO

Wi-Fi Spatial Performance Improvement

Enables parallel communication with multiple clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CSMA/CD

A

Carrier Sense Multiple Access/Collision Detection

Ethernet Multiple Access Technique

Detects collisions and retransmits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSMA/CA

A

Carrier Sense Multiple Access/Collision Avoidance

Wi-Fi Multiple Access Technique

Avoid collisions by checking if a channel is clear before transmitting
Transmitter sends RTS (Ready to Send) message to Receiver
Receiver responds with CTS (Clear to Send) message to Transmitter
Nodes that hear CTS don’t transmit until data is sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

5GHz Wi-Fi

A

More bandwidth but worse penetration than 2.4GHz
Interferes with radar, requiring Dynamic Frequency Selection (DFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
DFS
Dynamic Frequency Selection Avoids interference with radar by checking if it is detected on a channel and avoiding it if necessary In-use channels are monitored and channel is changed if radar detected Adds cost and complexity and is susceptible to false triggers
26
802.11ax
Wi-Fi 6 Designed for efficiency in dense environments Uses 1024-QAM Uses 2.4GHz, 5GHz and provisionally 6GHz
27
TWT
Target Wake Time Allows clients to schedule times with Wi-Fi access points for waking up and sending data Ideal for IoT and Sensor Networks
28
LPWAN
A category of wireless communication that covers low-power long-range connection.
29
LoRaWAN
LPWAN Technology Low Power Long Range Wide Area Network
30
LoRaWAN Cost
Expensive Proprietary Physical Layer Pricey Gateways
31
LoRaWAN Transmission Speeds
50 kbit/s Slow
32
LoRaWAN Packet Size
256 bytes
33
LoRaWAN Range
10km
34
LoRaWAN Power
Low
35
LoRaWAN Layer
Data Link & Physical
36
LoRaWAN Topology
Star-of-Stars
37
LoRaWAN Advantages
Uses Chirp Modulation - Doppler Resistant: Ideal for moving objects - Interference Resistant - Multipath Resistant - Highly Scalable Uses IP for communication between Gateways and Cloud Services Uses sub-GHz frequencies that penetrate obstacles and don’t collide with other communication protocols Up to 10km range in rural areas
38
LoRaWAN Disadvantages
Proprietary PHY Layer Relatively Low Data Rate
39
Sigfox
LPWAN Technology Uses Ultra Narrow Band modulation for very slow data transmission
40
NB-IoT
LPWAN Technology Uses a low-cost sim-card within a narrowband of 4G LTE and 2G GSM for 4x faster speeds than LoRaWAN. Used in Asset Tracking
41
Nano Satellites
LPWAN Technology Low Earth Orbit satellites that forward data from devices onto ground stations. Requires subscription
42
LTE-M
LPWAN Technology Uses 4G LTE for 1Mbit/s speeds at relatively high-power consumption
43
Bluetooth
Short range, personal area network wireless communication technology 2.4GHz band is divided into 79 Bluetooth channels, communication is divided into 1600 time slots per second
44
Bluetooth Layer
Data Link & Physical
45
Bluetooth Range
1m - 100m
46
Bluetooth Transmission Speeds
1 Mbit/s
47
Bluetooth Power
Low if BLE
48
Bluetooth Topology
Star
49
Bluetooth Cost
Inexpensive
50
Bluetooth Piconet
One controller forms up to seven active connections with responders creating a Piconet Up to 255 responders can be parked, maintain a connection but not communicating
51
Bluetooth (Adaptive) Frequency Hopping
Reduces interference by having transmission hop between channels. Adaptive Frequency Hopping avoids channels in use such as those used by Wi-Fi
52
Bluetooth GATT Profile
GATT Profiles standardise exchange of data for specific device types e.g. Heart Rate Sensor
53
Bluetooth Advantages
Frequency hopping improves security as all channels must be sniffed Interleaving allows communication with multiple responders TDMA allows contention-free networking Ubiquitous integration among devices
54
Bluetooth Disadvantages
Operates in unlicensed 2.4GHz ISM band, interference prone Relatively low data rate
55
802.15.4
A standard covering specification of the Physical and Data Link layers for low-rate wireless PANs
56
802.15.4 Layer
Data Link & Physical
57
802.15.4 Range
<100m
58
802.15.4 Transmission Speeds
250 kbit/s
59
802.15.4 Power
Very Low
60
802.15.4 Topology
Star & Peer-to-Peer
61
802.15.4 Cost
Inexpensive
62
802.15.4 Packet Size
127 bytes
63
802.15.4 PAN Coordinator
Acts as a central network controller
64
802.15.4 Coordinator
Provide synchronisation services to devices
65
802.15.4 FFD
Full Function Device Capable of acting as a PAN Coordinator and can associate with multiple devices simultaneously
66
802.15.4 RFD
Reduced Function Device Capable of associating with only **one** FFD at a time Suitable for simple sensors or actuators
67
802.15.4 Routing
Routing between devices not in range of each other is not handled by 802.15.4 and instead is handled by higher-layer protocols e.g. RPL
68
802.15.4 Addressing
Uses 64-bit MAC addresses and (sometimes) a 16-bit address valid only within the PAN
69
802.15.4 Advantages
Low cost, Low power: Ideal for IoT and Sensor Networks Peer-to-Peer topology acts as a basis of mesh networking allowing for self-healing, self-organising networks
70
802.15.4 Disadvantages
Relatively low data rate Operates in 2.4GHz, prone to interference
71
802.15.4 Duty Cycling
Alternates radio between active/idle to save power
72
802.15.4 ContikiMAC
An *asynchronous* duty cycling protocol has retransmissions until the receiver periodically wakes up and responds with an acknowledgement
73
802.15.4 TSCH
Time-slotted Channel Hopping A *synchronous* duty cycling protocol (defined in the 802.15.4 standard ) that divides time into slots assigned for communication between two specific devices. Devices synchronise their schedule and use different channels to avoid interference
74
Zigbee
A specification of the application and network layer to facilitate mesh and multi-hop networking Builds on 802.15.4
75
Zigbee Layer
Application & Network
76
Zigbee Power
Very Low
77
Zigbee Advantages
Zigbee-certified devices have a battery life of at least 2 years Enables mesh networking
78
Zigbee Disadvantages
Non-IP Certification required to add Zigbee logo to device
79
6LoWPAN
A specification of the network layer to allow IPv6 over 802.15.4 addresses Builds on 802.15.4
80
6LoWPAN Layer
Network
81
6LoWPAN Advantages
IPv6 Compatible allowing for Interoperability Small headers
82
Thread
A standard that provides encrypted, self-healing, resilient mesh networking Uses 6LoWPAN
83
RPL
IPv6 Routing Protocol for Low-Power and Lossy Networks An IPv6 Routing Protocol suitable for routing over mesh networks, allowing for multi-hop networking Builds on 802.15.4
84
RPL Layer
Network
85
RPL Topology
Uses network traffic to build a picture of network (traffic decreases as network stabalises) Creates a tree-like DODAG topology and assigns a distance-dependent rank to nodes further from the root to prevent routing to closer nodes via farther nodes
86
MQTT
A lightweight publish-subscribe messaging protocol
87
MQTT Layer
Application
88
MQTT Broker
Brokers forward messages from publishers onto appropriate subscribers Clients connect to the broker using Wi-Fi typically and transfer JSON
89
MQTT Topics
Topics are hierarchical - # acts as a multi-level wildcard - + acts as a single level wildcard
90
CoAP
A lightweight RESTful messaging protocol designed for resource-constrained devices Follows REST principles, providing interoperability with HTTP (and the Web) Border gateways/proxies translate between HTTP and CoAP
91
CoAP Layer
Application
92
CoAP Request Types Support
- Confirmable (requiring acknowledgement) requests - Non-confirmable requests - Timeouts - Delayed payload responses with tokens - Resource observation - Block transfers for large payloads
93
CoAP Resource Discovery
Request to **GET .well-known/core** returns descriptions of resources available on nodes allowing for automatic configuration
94
CoAP Advantages
Small packet size; header is fixed-size at 4 bytes Highly suited for use with 802.15.4, a basic packet will fit into a single radio frame Uses UDP, ideal for prolonging battery life CoAP proxies cache data allowing nodes to sleep Supports multicast allowing interactions with multiple nodes at once
95
Matter
A unifying application layer that leverages existing communication standards. It specifies - Device Onboarding - Device Messaging - Security Sits on-top of Thread, Ethernet, Wi-Fi, Bluetooth and unifies interactions
96
Matter Layer
Application
97
Matter Advantages
Non-matter devices can be bridged into a Matter network Big-players in home automation are onboard
98
Improving Wi-Fi
Modulation Techniques Spatial Performance Improvements Multiple Access Wi-Fi 6
99
Wi-Fi Modulation Techniques
DSSS FDM OFDM OFDMA
100
Wi-Fi Spatial Performance Improvements
Beamforming MIMO MU-MIMO
101
Wi-Fi Multiple Access
CSMA/CD (Ethernet) CSMA/CA (Wi-Fi)
102
IPv4 Exhaustion Mitigitation
- Address Conservation: RIRs avoid giving out large blocks of address space - Network Address Translation (NAT): Multiple private IPs, one public IP - Release of Reserved Address Space: Challenging as client configurations need updating - Address Recovery: Challenging as reputation of IP must be recovered - CGNAT: ISP shares single IP address among multiple homes
103
CGNAT Issues
Breaks end-to-end connectivity Public IP abuse causes multiple homes to be punished Security and privacy implications Scalability issues Does not solve IPv4 exhaustion
104
Reasons for lack of IPv6 Adoption
Hardware Infrastructure Training Lack of Urgency Implementation Challenges Money HInT LimM
105
IPv6 Benefits
Resolves IPv4 Exhaustion Direct end-to-end global addressability Simplified networks with reduced latency
106
IPv6 DNS Adoption
IPv4 DNS servers can serve AAAA (IPv6) records and vice-versa
107
Dual Stack Deployment
Supporting of both IPv4 and IPv6 protocols with devices having addresses in both forms
108
Dual Stack Deployment Issues
Essentially two networks running in parallel: - Each protocol needs its own firewall - More issues to troubleshoot - Double the IP config - More hardware usage e.g. routing table
109
IPv6 Deployment Strategy
1. Plan Ahead 2. Comprehensive Planning 3. Initial IPv6 Deployment During a Network Upgrade (Reduces cost) 4. Aim to keep parity of service no matter the strategy (No not damage IPv4 performance)
110
Imperial College IPv6 Deployment
Deployed a dual-stack system Used SLAAC as DHCPv6 was not well supported and still is not supported on Android Has both IPv6 and IPv4 used on the same network Switched early for to lower cost Motivation was from CERN requiring IPv6 and they were running out of IPv4
111
Microsoft IPv6 Deployment Case Study
RFC1918 (Private Network) Address space is running out due to overlapping from acquired companies and their networks Dual-stack is operationally complex and hence Microsoft's desire to switch to IPv6 solely
112
IPv6 Transition Mechanisms
Tunnelling NAT64 VPN
113
IPv6 Tunnelling
Encapsulates IPv6 packets in IPv4 packets between two destinations - Reduces MTU - Increases Latency - Causes issues with GeoIP-restricted services
114
6in4 Tunnelling
Adds IPv4 header in front of IPv6 packet - Protocol 41 is not supported by many consumer routers and so they cannot provide options to support it
115
NAT64
Embeds IPv4 DNS web addresses within an IPv6 address with a specific prefix - DNS64 Servers synthesise AAAA records for a web domain that only has A records - NAT64 Gateway translates packets with the specified prefix to IPv4
116
NAT64 Example
1. User requests IP of URL from DNS64 server 2. The DNS64 server does not know the IP and contacts a DNS server which returns an A record IPv4 address 3. The DNS64 server prefixes the IPv4 address to create a AAAA record 4. The user contacts the IP address via a NAT64 gateway which strips the prefix and contacts the IPv4 web server
117
464XLAT
Allows IPv4 Connectivity over an IPv6 Network with two translators - Stateless Customer Translator (CLAT): Converts IPv4 to IPv6 - Stateful Provider Translator (PLAT): Converts back to IPv4. Must track connections, ports, addresses etc.
118
Google IPv6 Transition Case Study
Uses 464XLAT with DHCPv4 Option 108
119
DHCPv4 Option 108
Devices are either - In need of IPv4 - Capable of operating IPv6 only Devices capable of IPv6 only send DHCP requests with Option 108 which indicates IPv4 is not necessary if IPv6 is available - DHCPv4 servers will not provide IPv4 address if Option 108 is specified and supported. Forcing a device to use IPv6
120
Steps of the Mandiant Cyber Attack Life Cycle
1. Initial Recon 2. Initial Compromise 3. Establish Foothold 4. Escalate Privileges 5. Internal Recon 6. Move Laterally 7. Maintain Presence (Loop back to 4.) 8. Complete Mission
121
Initial Recon
Scope out a target through methods such as - *Port & Network Scanning*: Identify open ports - *Banner Grabbing*: Extract information on system software versions and configurations - *Signature Recognition*: Different versions of software respond in different ways - *DNS Brute Forcing*: Look for common subdomains i.e. `vpn.xyz` or `login.xyz` and reverse DNS - *Dumpster Diving*: Physical rummaging through discarded documents or hardware (network switches, hard drive etc. need to be wiped) - *Social Engineering*: Psychological manipulation to deceive individuals - *Man-in-the-Middle*: Intercept communication - *Google & Shodan*: Identify publicly available information
122
Defending Against Initial Recon
Difficult to defend as malicious recon blends in with normal network traffic Security through obscurity can impede an attacker
123
Initial Compromise
Execute malicious code on the target's system using - Social Engineering - Remote Execution: SQL Injection - Brute Force - Password Reuse
124
Defending Against Initial Compromise
User Education Appropriate technical methods
125
Establish Foothold
Gain some level of control over a target system using - Rootkits - Backdoors - Introduction of further vulnerabilities
126
Defending Against Establish Foothold
Block vulnerabilities Update Systems
127
Escalate Privileges
Gain more control by increasing privileges and eventually gaining root access using - Exploitation of privilege escalation vulnerabilities - Dumping and cracking hashed passwords/access password managers
128
Defending against Escalate Privileges
Implement Least Privilege Principle, Minimum level of access to perform necessary tasks MFA
129
Internal Recon
Gain a more thorough understanding of the target's network and systems - Where are key files stored - What is known about key individuals (for social engineering) - What internal systems are used?
130
Defending against Internal Recon
Network segmentation
131
Move Laterally
Gain more access to more systems
132
Defending against Move Laterally
Firewalls
133
Maintain Presence
Establish persistent access - Additional rootkits - Multiple backdoors - Deploy more malware - Gain access via existing legitimate remote access services/VPN
134
Defending against Maintain Presence
Network monitoring and audits
135
Complete Mission
136
Security Policies
Identify the rules and procedures for people and systems accessing networks and sets out responsibilities of those managing networks
137
A good security policy should
- Ensure confidentiality, integrity and availability of systems - It should be organisation specific, practical, enforceable and regularly updated - It should include processes for users to report security issues and detail how issues will be responded to and who is responsible - It should define a password policy - It should cover incident responses, who's is responsible
138
A bad security policy will
- Encourage users to be less secure - Users who dont understand the goal of the policy are less likely to apply it - Users who feel it hinders their work are more likely to bypass it - Users who feel security is driven from top-down are less likely to report incidents
139
Employee Training
Employees should be educated on - Why you shouldn't bypass security policies - Phishing - Fake websites - Malicious Downloads
140
Ongoing Network Maintenance
Updated devices often have less vulnerabilities - OS Patches - Drivers, Firmware, BIOS updates - Mobile device firmware - Routers - IoT firmware
141
IP Reputation
Block or alert on access from IP known for malware/botnets, or dodgy URLs Geographic IP restricts e.g. restrict incoming Russian traffic