You are on page 1of 2

DELIVERY

Let us consider source ‘A’ transmitting to Destination ‘D’

B
The delivery should always be to the

Intended user as depicted in this

A C Image.

D
CORRECT (according to Scenario)

B
Here data is being broadcast to all

the nodes in such a case the data

that was only intended for ‘D’ is


A C
now received by all the nodes.

D
WRONG (according to Scenario)

Later on in the course you will see this issue of broadcasts can be prevented by using layer 2
devices.
A D

WRONG (according to Scenario)


Attacker
Requires preventive measures like

firewall, ACLs, IDS/IPS etc.

In this case again the intention was the same to deliver the data from node ‘A’ to ‘D’ this time
an attacker has intervened to eavesdrop /listen to the communication

The concept is that we should protect the data from floating to places that might cause
damage to the user/node/network.

You might also like