Page 186 - CISSO_Prep_ Guide
P. 186
themselves and their MAC address as the owner of an IP
address. If the switch accepts that information, it will begin
passing the information to the MAC address of the malicious
person as well as, or instead of sending it to the correct owner.
This would allow the malicious individual to monitor all traffic
meant for another person.
Tree Network
A star network can be quite large but will often be integrated
into an even larger network as a part of a tree network. With the
use of trees, a network is very scalable and can become quite
large. A breakage in the connection between the various
branches of the tree could cause a loss of communications, but
that may be addressed through the use of a redundant route.
Ring Networks
A ring network connects all the devices on a network in one
ring. This network configuration is rarely used today for local
area networks but is still used a lot for internet backbones where
a high level of throughput and reliability is required. The use of
dual rings can provide failover capability through redundancy.