communications and internetworking
What about models
threat modeling and Internetworking
Advanced persistent threat models
OSI layer 2 data link layer
Layer 2 protocols
address resolution protocol
Polling protocols
contention based protocols
Layer 2 devices
Layer 2 threats and countermeasures
OSI layer three network layer
layer 3 concepts and architecture
Internet Protocol networking
Layer 3 routing protocols
Path vector protocols
BGP finds the best path for the data.. Mostly used by ISPs
Link state protocols
multi protocol label switching
Maps : MPLS maps data packets to predefined routes
Paths: it created paths throguh the network
with
Label: Uses short labels instead of long network addresses to direct traffic
Speed: Makes routing faster by avoiding complex lookups
advantages of MPLS
OSI layer 4 transport layer
OSI layer five session layer
OSI layer 5 protocols
Layer 5 threats and countermeasures
OSI layer 6 presentation layer