19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.60 Selection of a suitable backbone technology<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section, Administrator<br />

<strong>The</strong> selection of a network protocol for the backbone is a decisive factor for<br />

the security and availability of the local network because the protocol has<br />

major influence on the available bandwidth and performance. If the cabling is<br />

planned without commitment to special services (e.g. proprietary solutions)<br />

(see also T 2.45 conceptual weaknesses in the network), a change in backbone<br />

technology is principally feasible. Even though this requires a considerable<br />

organisational, personnel and financial effort.<br />

A general recommendation with regards to <strong>IT</strong> security for a specific backbone<br />

technology cannot be given because many individual aspects have to be taken<br />

into account. <strong>The</strong> advantages and disadvantages of the most common network<br />

protocols are given in the following:<br />

<strong>The</strong>re are four base technologies Ethernet, Token-Ring, FDDI, and ATM<br />

which can be described as follows:<br />

Ethernet<br />

Ethernet technology is defined in the IEEE 802.3 standard and based on the<br />

CSMA/CD (Carrier Sense Multiple Access / Collision Detection) technique.<br />

With this technique, all stations are equally entitled to access the transmission<br />

medium, although it can only be used by one station at a time. When a station<br />

needs to transmit data, it first checks if the transmission medium is available<br />

for use (carrier sense). If it is, the station starts data transfer. If several stations<br />

start transmitting data simultaneously (multiple access), a collision occurs and<br />

is detected by the affected stations (collision detection), whereupon the<br />

medium is checked again and a renewed attempt is made at transmission.<br />

As CSMA/CD is a stochastic technique, it does not guarantee the availability<br />

of any dedicated bandwidths. For this reason, it is not very suitable for<br />

multimedia applications which require a fixed bandwidth, for example.<br />

Consequently, Ethernet-based networks do not ensure any particular Quality<br />

of Service (QoS) in general. Gigabit Ethernet systems have a technique<br />

similar to QoS.<br />

<strong>The</strong>re are three types of Ethernet which basically differ from each other only<br />

in terms of the supported transmission rates:<br />

- Standard Ethernet<br />

Standard Ethernet, a predecessor to the other two variants, has been in use<br />

for a long time. It provides a transmission rate of 10 Mbit/s, it is an<br />

unsuitable backbone technology for most local networks, as a rise in the<br />

network load is accompanied by a sharp increase in the number of<br />

collisions, causing the throughput to drop steadily.<br />

- Fast Ethernet<br />

Due to the rising number of networked computers and the resulting<br />

increase in network loads, Standard Ethernet urgently needed to be<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!