Page 186 - CISSO_Prep_ Guide
P. 186

themselves and their MAC address as the owner of an IP
            address. If the switch accepts that information, it will begin
            passing the information to the MAC address of the malicious
            person as well as, or instead of sending it to the correct owner.
            This would allow the malicious individual to monitor all traffic
            meant for another person.


            Tree Network

            A star network can be quite large but will often be integrated
            into an even larger network as a part of a tree network. With the
            use of trees, a network is very scalable and can become quite
            large. A breakage in the connection between the various
            branches of the tree could cause a loss of communications, but
            that may be addressed through the use of a redundant route.


            Ring Networks

            A ring network connects all the devices on a network in one
            ring. This network configuration is rarely used today for local
            area networks but is still used a lot for internet backbones where
            a high level of throughput and reliability is required. The use of
            dual rings can provide failover capability through redundancy.
   181   182   183   184   185   186   187   188   189   190   191