19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

accordance with security requirements, and thus achieves a controlled linkage<br />

between insecure networks and networks requiring protection.<br />

On the other hand, it might become necessary to separate two networks if one<br />

needs to be protected against access from the other and vice versa, if the<br />

network availability in the event of a failure needs to be increased, or if the<br />

load on the individual network segments needs to be decreased.<br />

To prevent manipulation, all network coupling devices must be installed so<br />

that only authorised persons have physical access to them.<br />

Repeaters<br />

Repeaters operate on layer 1 of the OSI model, and simply comprise signal<br />

amplifiers. As a result, they allow the maximum cable length of an existing<br />

network segment to be increased, or several network segments to be linked<br />

together. In an Ethernet network based on coaxial cables, for example,<br />

repeaters can be used to extend the maximum cable length to more than 185 m<br />

and 500 m respectively (for thin and thick Ethernet cables). Observance is<br />

required here of the configuration rules for repeaters, which impose<br />

constraints on the number and arrangement of repeaters.<br />

In the case of twisted-pair cabling, repeaters are often used as central or<br />

decentral network nodes for the purpose of linking individual network<br />

subscribers. As several repeaters need to be connected together in one device<br />

for this purpose, such a device is termed multi-port repeater. Multiport<br />

repeaters are often also identified as hubs or mini-hubs.<br />

<strong>The</strong> separation thus achieved on layer 1 of the network restricts electrical<br />

errors to just one segment. However, this does not apply to errors occurring on<br />

higher layers (e.g. excessively frequent collisions or broadcast storms). Some<br />

manufacturers now also offer multi-port repeaters which evaluate information<br />

from layer 2 (but do not act as bridges), thus allowing the implementation of<br />

access restrictions. With such devices, for example, it is possible to grant<br />

network access only to certain network users.<br />

Bridges<br />

Connection of networks on layer 2 of the ISO/OSI reference model is<br />

performed using bridges. A bridge connects two networks which generally use<br />

the same logical link control protocol (LLC), but different medium access<br />

control (MAC) protocols. For instance, a bridge can connect an Ethernet with<br />

a Token-Ring network. Such a bridge is termed translation bridge or T-bridge.<br />

This results in three essential advantages:<br />

- <strong>The</strong> bridge separates collision domains, i.e. performance-reducing<br />

collisions occurring in one segment of a CSMA/CD-based network do not<br />

impair other segments.<br />

- A bridge only routes data packets to another segment if the destination<br />

address of the packets is located in that segment. This restricts the data<br />

traffic to the required segment in each case, thus lowering susceptibility to<br />

eavesdropping.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!