19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.46 Exceeding the maximum allowed cable/bus<br />

length or ring size<br />

In accordance with the types of cable, topology and transmission protocols<br />

involved, maximum cable and bus lengths, as well as maximum ring sizes for<br />

networks have been stipulated in order to ensure the functions of the network<br />

as defined by applicable standards. Excessively long cables and buses, as well<br />

as excessively large rings, prolong signal transmission times beyond the limit<br />

specified for the type of transmission protocol involved, thus reducing the<br />

availability of the network segment or the communications bandwidth.<br />

<strong>The</strong> phenomena which can occur depend on the type of the access control<br />

method used:<br />

- In the case of network segments which use the CSMA/CD (Carrier Sense<br />

Multiple Access/Collision Detection) access method, all stations have the<br />

same access rights to the medium, although it can only be used by one<br />

station at a time. For this purpose, every station first checks whether the<br />

medium is free for use (carrier sense). If so, the station starts the<br />

transmission of data. If several stations carry out this procedure in a<br />

parallel context (multiple access), a collision occurs and is recognised by<br />

all sending stations (collision detection), whereupon the medium is<br />

checked again and transmission is repeated.<br />

If the maximum defined signal propagation delay is exceeded on the<br />

medium, collisions might not be detected in the specified time interval<br />

(collision detection). This means that one end appliance already started to<br />

transfer data while another end appliance still assumes the transfer medium<br />

to be free. In this case, so-called late collisions occur, thus corrupting the<br />

affected data packet and, depending on the length of the data packet, the<br />

medium may be blocked beyond reasonable limits. This can severely<br />

impair the effective transmission bandwidth of the medium. Although<br />

individual data packets might be discarded in this process, the network<br />

access protocol normally prevents data from being lost. For example,<br />

Ethernet and Fast Ethernet use the CSMA/CD communication protocol.<br />

- Transmission techniques based on the token passing procedure use a<br />

special data packet (named token) to determine which station may occupy<br />

the medium. A station which receives this token occupies the medium and,<br />

in accordance with the token passing procedure in use, passes the token on<br />

to the next station. This ensures that the medium is only occupied by a<br />

single station at one time.<br />

Synchronous data transmission at a constant bit rate is a characteristic of<br />

network segments using token passing procedures. When the medium is<br />

busy, the relevant time intervals are used to transmit the data packets.<br />

When the medium is free, these time intervals are used to forward the<br />

token. If the maximum signal propagation time is exceeded, the constant<br />

bit rate specified for the transmission protocol in use can no longer be<br />

guaranteed, thus causing a break down of all communication. For example,<br />

Token Ring and FDDI use the token passing procedure.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!