OSI and TCP Models Explained

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Considering the OSI model, which of the following is NOT a primary function of the application layer (Layer 7)?

  • Providing network transfer capabilities.
  • Offering application-level services for user interaction with the computer.
  • Enabling file sharing and email services.
  • Defining data formatting and encryption standards. (correct)

Which of the following is NOT a characteristic of the Physical Layer (Layer 1) in the OSI model?

  • Involves the transmission of data as bits.
  • Establishes the logical addressing scheme for routing. (correct)
  • Concerns the physical and electrical characteristics of the network.
  • Utilizes transition modulation to represent binary data.

Which of the following statements accurately contrasts TCP and UDP?

  • TCP is primarily used for audio and visual streaming due to its low overhead, unlike UDP.
  • TCP is connectionless and unreliable, while UDP is connection-oriented and reliable.
  • TCP includes sequencing and acknowledgment of segments, whereas UDP does not. (correct)
  • TCP does not use a three-way handshake, while UDP relies on it for connection establishment.

In the OSI model, what is the primary role of the Session Layer (Layer 5)?

<p>To manage sessions between applications, ensuring distinct conversations. (D)</p> Signup and view all the answers

Which of the following is NOT a typical function of the Data Link Layer (Layer 2)?

<p>Determining the best path for data packets to traverse the network. (B)</p> Signup and view all the answers

What is the significance of the TCP three-way handshake?

<p>It establishes a connection between two devices before data transmission begins, ensuring reliable communication. (A)</p> Signup and view all the answers

How does Statistical Time Division Multiplexing (StatTDM) differ from Time Division Multiplexing (TDM)?

<p>StatTDM dynamically allocates time slots based on demand, whereas TDM allocates dedicated time slots. (A)</p> Signup and view all the answers

Which of these is NOT a method of synchronization at Layer 2?

<p>Duplex Communication (C)</p> Signup and view all the answers

Which of the following is NOT directly addressed by the Internet Control Message Protocol (ICMP)?

<p>Establishing a secure, encrypted tunnel for data transmission. (D)</p> Signup and view all the answers

What is the key function of 'windowing' at Layer 4?

<p>Adjusting the amount of transmitted data in each segment to optimize throughput and bandwidth. (B)</p> Signup and view all the answers

Which of the following is NOT a typical device found at Layer 1 of the OSI model?

<p>Routers (A)</p> Signup and view all the answers

In the context of data transmission and the OSI model, what does 'encapsulation' refer to?

<p>The addition of headers (and sometimes trailers) to data as it moves down the OSI model layers. (B)</p> Signup and view all the answers

Which of the following is NOT true about MAC addresses?

<p>They are logically assigned and can be changed by the user. (A)</p> Signup and view all the answers

Which of the following statements regarding broadband technology is most accurate?

<p>Broadband divides bandwidth into separate channels. (C)</p> Signup and view all the answers

Which of the following protocols operates at Layer 5 (Session Layer) of the OSI model?

<p>H.323 (B)</p> Signup and view all the answers

Which statement is NOT correct regarding Layer 6 (Presentation Layer)?

<p>Layer 6 establishes the initial connection between two network devices. (A)</p> Signup and view all the answers

Which of the following is NOT a typical component of an IP Header (Layer 3)?

<p>Source Port (C)</p> Signup and view all the answers

Which of the following is NOT a file transfer protocol?

<p>HTTP (C)</p> Signup and view all the answers

Which statement about OSI model order is NOT correct?

<p>Moving down from Layer 1 to 7 is encapsulation (C)</p> Signup and view all the answers

Which of the following is valid example of IPv4 addresses?

<p>172.16.254.1 (B)</p> Signup and view all the answers

Which of the following options are correct about the TIA/EIA-568A and TIA/EIA-568B standards? (Select all that apply)

<p>Straight-through cables use TIA/EIA-568A on both ends. (A), Crossover cables use TIA/EIA-568A on one end and TIA/EIA-568B on the other end. (B), Straight-through cables use TIA/EIA-568B on both ends. (D)</p> Signup and view all the answers

Which of the following could cause packets to be reordered?

<p>Routers (D)</p> Signup and view all the answers

Which of the following is not a WAN accelerator?

<p>Switches (D)</p> Signup and view all the answers

Which of the following is the correct name for the data type in layer 4 for the UDP?

<p>Datagram (D)</p> Signup and view all the answers

What is the maximum size for payload, when using Ethernet?

<p>1500 bytes (A)</p> Signup and view all the answers

What is the significance of the OSI model in modern networking?

<p>It serves as a reference model for understanding and troubleshooting network functions. (D)</p> Signup and view all the answers

Which of the following is an accurate definition of encapsulation in the context of the OSI model?

<p>The addition of headers (and sometimes trailers) to data as it moves down the OSI layers. (A)</p> Signup and view all the answers

Which layer of the OSI model is responsible for converting data into bits for transmission over a physical medium?

<p>Physical Layer (B)</p> Signup and view all the answers

Which OSI layer is primarily responsible for reliable data transport, including segmentation, acknowledgement, and windowing?

<p>Transport Layer (A)</p> Signup and view all the answers

Which of the following describes a key characteristic of 'asynchronous communication' at Layer 2?

<p>Reliance on start and stop bits for out-of-sync data transmission. (C)</p> Signup and view all the answers

What is the principal function of the session layer within the OSI model?

<p>To manage and synchronize conversations between applications. (B)</p> Signup and view all the answers

Which layer in the OSI model is responsible for data formatting, encryption, and presentation?

<p>Presentation Layer (C)</p> Signup and view all the answers

In networking, what is the primary role of a 'MAC address'?

<p>To uniquely identify a device on a local network. (D)</p> Signup and view all the answers

What is the primary function of 'packet switching' at the network layer?

<p>Dividing data into packets and then forwarding them individually across the most efficient path. (C)</p> Signup and view all the answers

Which of the following best describes the function of 'windowing' in TCP (Transmission Control Protocol)?

<p>Managing the flow of data to prevent overwhelming the receiver. (A)</p> Signup and view all the answers

What is the purpose of the Internet Control Message Protocol (ICMP)?

<p>For sending error messages and operational information to an IP destination. (A)</p> Signup and view all the answers

Which OSI layer do 'routers' primarily operate at to forward traffic using logical addresses?

<p>Network Layer (B)</p> Signup and view all the answers

Which of the following best describes the purpose of TIA/EIA-568A and TIA/EIA-568B standards in networking?

<p>They specify wiring and connector standards for Ethernet cables. (C)</p> Signup and view all the answers

What is the main difference between 'baseband' and 'broadband' in the context of bandwidth utilization?

<p>Baseband uses all frequency of the cable all the time, while broadband divides bandwidth into separate channels. (C)</p> Signup and view all the answers

Which layer of the OSI model is responsible for determining the best path for data to flow across a network, often utilizing dynamic routing protocols?

<p>Network Layer (A)</p> Signup and view all the answers

What is the fundamental difference between TCP and UDP protocols in the transport layer?

<p>TCP provides reliable, connection-oriented communication; UDP provides unreliable, connectionless communication. (C)</p> Signup and view all the answers

Which of the following is a key function of the Application Layer (Layer 7) in the OSI model?

<p>Providing network services directly to applications. (B)</p> Signup and view all the answers

In the context of OSI model, what does 'Statistical Time Division Multiplexing (StatTDM)' achieve?

<p>Dynamically allocates time slots based on demand. (B)</p> Signup and view all the answers

Which of the following is NOT a standard image format handled by the presentation layer?

<p>MP3 (A)</p> Signup and view all the answers

Select all options that describe a characteristic of synchronous communication:

<p>Devices use the same clock (C), Real-time communication using common time source (D)</p> Signup and view all the answers

Which options are the responsibility of the Physical Layer?

<p>Physical and electrical network characteristics (B), Transmission of bits across the network (D)</p> Signup and view all the answers

What is the correct data type in layer 4 for the TCP and UDP, respectively?

<p>Segments and Datagram (A)</p> Signup and view all the answers

Which of the following describe the main function of the Data Link Layer? (Select all that apply)

<p>Packaging bits into frames (B), Performing error detection and correction (C), Transmitting frames across the network (D)</p> Signup and view all the answers

What does the Ethernet header at Layer 2 include? (Select all that apply)

<p>EtherType field (A), Destination MAC address (B), Source MAC address (C)</p> Signup and view all the answers

Which statements are true regarding the TCP header? (Select all that apply)

<p>It contains 10 mandatory fields totalling 20 bytes of information (A), It uses flags like SYN, ACK, and FIN for connection control (B), It includes source and destination port numbers (C)</p> Signup and view all the answers

Considering asynchronous communication, which of the following is the most accurate regarding its data transmission methodology within the physical layer?

<p>It incorporates start and stop bits for each character transmitted, allowing for flexibility in timing but increasing overhead due to these additional bits. (B)</p> Signup and view all the answers

In the context of Layer 1 of the OSI model, which statement accurately differentiates baseband and broadband technologies?

<p>Baseband uses the entire frequency of the cable for one signal, while broadband divides the bandwidth into separate channels for multiple signals. (B)</p> Signup and view all the answers

Within the context of the OSI model's Physical Layer (Layer 1), what role does transition modulation play, and how does it achieve its function?

<p>Transition modulation involves switching between voltage or light levels to represent binary 1s and 0s, facilitating data transmission over physical media. (C)</p> Signup and view all the answers

In the labyrinthine domain of network synchronization at Layer 2, differentiate between isochronous and synchronous methods, emphasizing their intricacies.

<p>Isochronous employs a common reference clock and time slots with less overhead, while synchronous methods use the same clock with defined beginning and ending frames. (C)</p> Signup and view all the answers

Elaborate on the distinct roles of the Logical Link Control (LLC) sublayer within the Data Link Layer (Layer 2) of the OSI model.

<p>The LLC sublayer establishes and manages connections, providing reliable data flow, acknowledging message receipts, and employing checksums for error detection. (D)</p> Signup and view all the answers

Analyze the complexities involved in packet reordering at Layer 3, detailing possible causes and implications.

<p>Packet reordering arises from varying paths, network congestion, or load balancing, potentially causing delays and requiring reassembly mechanisms. (A)</p> Signup and view all the answers

In the context of Layer 4 of the OSI model, what differentiates TCP from UDP? (Select all that apply)

<p>TCP is connection-oriented, providing reliable transport through acknowledgments, while UDP is connectionless and offers no guarantee of delivery. (A), TCP employs a three-way handshake to establish a connection, whereas UDP does not. (B)</p> Signup and view all the answers

Within the context of Layer 4 protocols, elaborate on the significance and mechanisms of 'windowing'.

<p>Windowing adjusts the amount of data a client sends in each segment, optimizing throughput and bandwidth based on network conditions and retransmissions. (D)</p> Signup and view all the answers

Analyze the role and function of the Internet Control Message Protocol (ICMP) within the TCP/IP suite, detailing its operational scope.

<p>ICMP is used for sending error messages and operational information, such as testing network connectivity using PING and tracing routes with Traceroute. (C)</p> Signup and view all the answers

Contrast the operational characteristics of multi-layer switches versus traditional Layer 2 switches, paying close attention to their respective functions within a network.

<p>Multi-layer switches combine Layer 2 switching and Layer 3 routing features, offering enhanced routing at the distribution or core layers, whereas Layer 2 switches operate only at the data link layer. (D)</p> Signup and view all the answers

In the context of Layer 5 (Session Layer) of the OSI model, what are the key functions?

<p>Managing sessions, ensuring separate conversations, setting up, maintaining, and tearing down connections. (C)</p> Signup and view all the answers

Analyze the operational significance of the TIA/EIA-568A and TIA/EIA-568B standards in network cabling, highlighting both similarities and differences.

<p>TIA/EIA-568A and TIA/EIA-568B define the pin/pair assignments for twisted pair cables, differing in the arrangement of the orange and green pairs. (C)</p> Signup and view all the answers

Evaluate the role of the Presentation Layer(Layer 6) in the OSI model, especially in the context of data formatting and encryption.

<p>It handles data formatting, encryption, and presentation to ensure compatibility and security. (C)</p> Signup and view all the answers

Within the OSI reference model, what is the significance of Protocol Data Units (PDUs), how are they named, and what special considerations exist?

<p>PDUs are data containers with specific formats at each layer, named as L(layer number) PDU, with special names for Layers 1, 2, 3, and 4. (D)</p> Signup and view all the answers

Within the context of Layer 2 Ethernet frames, what is the purpose of the EtherType field, and which protocols can it indicate?

<p>The EtherType field identifies the protocol encapsulated in the frame's payload, such as IPv4 or IPv6. (A)</p> Signup and view all the answers

Within the TCP header structure, which control flags are essential for managing connections, and what specific functions do they perform?

<p>SYN (synchronize), ACK (acknowledgment), and FIN (finished) manage connection establishment, data acknowledgment, and connection termination, respectively. (A)</p> Signup and view all the answers

How does Statistical Time Division Multiplexing (StatTDM) optimize bandwidth utilization compared to traditional Time Division Multiplexing (TDM)?

<p>StatTDM dynamically allocates time slots based on demand, optimizing bandwidth, whereas TDM allocates dedicated, fixed time slots. (C)</p> Signup and view all the answers

Which of the following options accurately describe the process of encapsulation and decapsulation within the OSI model? (Select all that apply)

<p>Encapsulation is the process of adding headers and trailers around data as it moves down the OSI layers, while decapsulation removes these headers as data moves up. (C)</p> Signup and view all the answers

What is the purpose of buffering at Layer 4, and how does it contribute to network performance and reliability?

<p>Buffering allocates memory to store segments when bandwidth is not readily available, preventing overflow by clearing segments and optimizing data flow. (A)</p> Signup and view all the answers

In the context of Layer 5, what are the key characteristics and functions of the NetBIOS protocol? (Select all that apply)

<p>It is utilized by computers for file sharing over a network, especially associated with Windows file sharing. (A)</p> Signup and view all the answers

In the context of Layer 6, how do standard text formats like ASCII, Unicode and EBCDIC differ in representing text?

<p>ASCII is used for representing only English characters as 7-bit code, Unicode supports multiple international language characters, and EBCDIC, an 8-bit encoding, is primarily used on IBM mainframe systems. (B)</p> Signup and view all the answers

Within the context of data transmission, what role do crossover cables play, and how are they specifically constructed according to TIA/EIA standards?

<p>Crossover cables are constructed with TIA/EIA-568A on one end and TIA/EIA-568B on the other, used for direct device-to-device connections. (B)</p> Signup and view all the answers

Elaborate on the encryption algorithms utilized at Layer 6 emphasizing how they contribute to data transit security.

<p>These algorithms scramble data to ensure confidentiality and security, including TLS and SSL, used during transit and storage. (D)</p> Signup and view all the answers

How do devices at Layer 1 operate and how do their functionalities affect overall network performance?

<p>Layer 1 devices simply repeat received signals without logic or decision-making, and directly impact signal quality and transmission distances. (A)</p> Signup and view all the answers

What mechanisms does the Data Link Layer utilize to detect corrupted data frames?

<p>Cyclic Redundancy Checks (CRCs) or checksums, which mathematically verify the data integrity across transmission. (C)</p> Signup and view all the answers

Assuming a network packet is traversing from an application on one host to another, which of the following is the correct sequence of OSI layers that the packet's data will be encapsulated through?

<p>Application, Presentation, Session, Transport, Network, Data Link, Physical (C)</p> Signup and view all the answers

During encapsulation within the OSI model, at which layer is the process responsible for adding source and destination MAC addresses to a data frame?

<p>Layer 2 (Data Link Layer) (B)</p> Signup and view all the answers

In the context of OSI model encapsulation, which layer is responsible for adding source and destination port numbers?

<p>Layer 4 (Transport) (D)</p> Signup and view all the answers

During the decapsulation process, at what layer are headers removed and examined to route data based on IP addresses?

<p>Layer 3 (Network Layer) (B)</p> Signup and view all the answers

Which of the following occurs at the Physical Layer during the encapsulation process?

<p>Conversion of data into bits (C)</p> Signup and view all the answers

What is the role of the Presentation Layer (Layer 6) during OSI model encapsulation?

<p>Data encryption and formatting (D)</p> Signup and view all the answers

When data is decapsulated, which layer is first to receive the data?

<p>Physical Layer (C)</p> Signup and view all the answers

Which header is added during encapsulation to ensure reliable transport between two hosts and includes sequence numbers?

<p>TCP Header (D)</p> Signup and view all the answers

At which layer of the OSI model does the addition of a trailer typically occur during encapsulation, and what is its primary function relate to?

<p>Data Link Layer; error detection (B)</p> Signup and view all the answers

In OSI model decapsulation, at which layer are session management protocols interpreted to maintain dialogue control?

<p>Session Layer (B)</p> Signup and view all the answers

During encapsulation, which layer determines the availability of communication partners and resources?

<p>Application Layer (C)</p> Signup and view all the answers

Which layer's header, added during encapsulation, includes fields such as TTL, protocol type, and fragmented offset?

<p>IP Header (C)</p> Signup and view all the answers

A network administrator captures a packet and observes that it contains both a TCP header and an IP header. What is the correct order in which these headers were added during the encapsulation process?

<p>TCP header first, then IP header (D)</p> Signup and view all the answers

In the process of decapsulation, at which layer would a network appliance inspect packet headers for Quality of Service (QoS) markings to prioritize traffic?

<p>Network Layer (C)</p> Signup and view all the answers

Considering a scenario where an application is sending encrypted data, at which layer is the decryption process initiated during decapsulation?

<p>Presentation Layer (C)</p> Signup and view all the answers

If a network device is tasked with reassembling fragmented IP packets, at which layer of decapsulation does this process primarily occur?

<p>Network Layer (D)</p> Signup and view all the answers

During encapsulation, if a data packet exceeds the Maximum Transmission Unit (MTU) of a network, at which layer is the packet typically fragmented?

<p>Network Layer (D)</p> Signup and view all the answers

Which layer in the OSI model is responsible for translating data into a format that the application layer can understand during decapsulation?

<p>Presentation Layer (D)</p> Signup and view all the answers

In a network environment utilizing VLANs, at which layer is a VLAN tag added during encapsulation, and what does this tag primarily influence?

<p>Data Link Layer; frame forwarding (C)</p> Signup and view all the answers

During decapsulation, at which layer are TCP control flags (such as SYN, ACK, FIN) processed to manage connection states?

<p>Transport Layer (A)</p> Signup and view all the answers

In a network application that requires guaranteed delivery of data, which mechanism implemented at the transport layer relies on encapsulation to achieve reliability?

<p>TCP's three-way handshake and acknowledgments (C)</p> Signup and view all the answers

If an application needs to ensure data is prioritized, such as in VoIP, which layer is responsible for setting the appropriate flags within the header during encapsulation?

<p>Network Layer using DiffServ or ToS fields (A)</p> Signup and view all the answers

Consider a situation where a network is experiencing high levels of packet loss. At which layer can devices use acknowledgments and retransmission requests (ARQ) during decapsulation to mitigate this?

<p>Transport Layer (B)</p> Signup and view all the answers

What is the role of the Application Layer in initiating the encapsulation process, and how does it contribute to network communication?

<p>It provides the interface between the application and the network, defining the communication endpoint and selecting the transport protocol. (C)</p> Signup and view all the answers

Within the OSI model, which layer establishes, manages, and terminates connections between applications, ensuring a session remains active and coordinated?

<p>Session Layer (B)</p> Signup and view all the answers

Flashcards

OSI Model

A reference model developed in 1977 used to categorize network functions and for troubleshooting.

Physical Layer (Layer 1)

The first layer of the OSI model, responsible for transmitting bits across a network, and includes physical and electrical network characteristics.

Transition Modulation

Representing data by switching between levels (e.g., voltage or light) to signify 1s and 0s.

RJ-45 Connector

A connector standard using CAT5/CAT6 cables.

Signup and view all the flashcards

Crossover Cables

Cables using TIA/EIA-568A on one end and TIA/EIA-568B on the other.

Signup and view all the flashcards

Straight-Through Cables

Cables using the same wiring standard (TIA/EIA-568B) on both ends.

Signup and view all the flashcards

Physical Topology

Different physical arrangements of network layouts.

Signup and view all the flashcards

Asynchronous Communication

Data transmission using start and stop bits for out-of-sync transmission.

Signup and view all the flashcards

Synchronous Communication

Real-time communication using a common time source.

Signup and view all the flashcards

Broadband

Dividing bandwidth into separate channels.

Signup and view all the flashcards

Baseband

Using all the frequency of the cable all the time.

Signup and view all the flashcards

Multiplexing

Taking a limited resource and using it more efficiently, allowing multiple people to use a baseband connection at the same time.

Signup and view all the flashcards

Time Division Multiplexing (TDM)

Allocating dedicated time slots.

Signup and view all the flashcards

Statistical Time Division Multiplexing (StatTDM)

Dynamically allocates time slots based on when people need it.

Signup and view all the flashcards

Frequency Division Multiplexing (FDM)

Divides the medium into channels.

Signup and view all the flashcards

Layer 1 Device Characteristics

Simply repeat whatever they receive with no logic or decision-making.

Signup and view all the flashcards

Data Link Layer (Layer 2)

Responsible for packaging bits from Layer 1 into frames, error detection/correction, MAC address identification, and flow control.

Signup and view all the flashcards

MAC Address (Media Access Control Address)

A means for physically identifying a device and allowing it to operate on a logical topology, a unique 48-bit physical address assigned to every NIC.

Signup and view all the flashcards

Logical Link Control (LLC)

Provides connection services, acknowledges message receipt, and ensures controlled data flow and is the most basic form of flow control.

Signup and view all the flashcards

Isochronous Mode

Using a common reference clock and time slots for transmission with less overhead.

Signup and view all the flashcards

Synchronous Method

Devices use the same clock with beginning and ending frames, and control characters for synchronization.

Signup and view all the flashcards

Asynchronous

Devices reference their own clock cycles with no strict control over communication timing.

Signup and view all the flashcards

Network Layer (Layer 3)

Concerned with routing and forwarding traffic using logical addresses.

Signup and view all the flashcards

IP Variants

Common logical addressing schemes written in dotted octet notation.

Signup and view all the flashcards

Packet Switching (Routing)

Dividing data into packets and then forwarded.

Signup and view all the flashcards

Bits (Layer 1)

The name given to data at Layer 1 of the OSI model.

Signup and view all the flashcards

Frames (Layer 2)

The name given to data at Layer 2 of the OSI model.

Signup and view all the flashcards

Packets (Layer 3)

The name given to data at Layer 3 of the OSI model.

Signup and view all the flashcards

Segments (Layer 4)

The name given to data at Layer 4 of the OSI model.

Signup and view all the flashcards

Copper Wire Voltage

Copper wire uses voltage levels to represent binary data.

Signup and view all the flashcards

Fiber Optic Light

Fiber optic cables use light to represent binary data.

Signup and view all the flashcards

Infrastructure Devices

Hubs, access points and media converters

Signup and view all the flashcards

Switch Operation

Switches use CAM tables with MAC addresses to identify physical ports connected to devices.

Signup and view all the flashcards

IPv4

Written in dotted octet notation, which are four sets of numbers separated by dots.

Signup and view all the flashcards

Circuit Switching

A dedicated communication link is established between two devices.

Signup and view all the flashcards

Message Switching

Data is divided into messages which may be stored and then forwarded.

Signup and view all the flashcards

Routing Tables

Routers maintain these for determining the best path for data.

Signup and view all the flashcards

Dynamic Protocols

Dynamic protocols enable routers to share and update route information.

Signup and view all the flashcards

ICMP (Internet Control Message Protocol)

Used for sending error messages and operational information to an IP destination.

Signup and view all the flashcards

Multi-layer switches

Combines Layer 2 switch and Layer 3 router features.

Signup and view all the flashcards

Transport Layer

Dividing line between the upper layers and the lower layers of the OSI model.

Signup and view all the flashcards

TCP (Transmission Control Protocol)

Connection-oriented protocol that is a reliable way to transport segments across the network.

Signup and view all the flashcards

Three-Way Handshake

SYN - synchronization, SYN-ACK – synchronization - acknowledgement, ACK - acknowledgement.

Signup and view all the flashcards

UDP (User Datagram Protocol)

A connectionless protocol that is an unreliable way to transport segments (datagram).

Signup and view all the flashcards

Windowing

Allows clients to adjust the amount of data in each segments during transmission.

Signup and view all the flashcards

Buffering

Occurs when devices allocate memory to store segments if bandwidth is not readily available.

Signup and view all the flashcards

Session Layer (Layer 5)

Manages sessions, ensuring separate conversations to prevent data intermingling.

Signup and view all the flashcards

Presentation Layer (Layer 6)

Responsible for formatting data for exchange and securing it through encryption.

Signup and view all the flashcards

Application Layer (Layer 7)

Provides application-level services where users communicate with the computer.

Signup and view all the flashcards

TCP/IP Mode

The framework under which networks operate today, a suite of protocols that governs how devices communicate.

Signup and view all the flashcards

Copper Wire

A voltage signal is used on the wire to transmit the signal.

Signup and view all the flashcards

Bandwidth division

Divides bandwidth into separate channels, commonly used in cable television to transmit multiple channels over a cable at once allowing you to watch your favourite show.

Signup and view all the flashcards

Layer 1 Cables

Consists of fiber optic, ethernet, coaxial, and wireless methods like bluetooth and wi-fi.

Signup and view all the flashcards

MAC Address Structure

Unique identifier consisting of 48 bits, first 24 bits identify the manufacturer, with the remaining 24 identifying the specific device.

Signup and view all the flashcards

Routing Protocols

Routers use a routing protocol to choose the best path, assisting in how data will flow and how they will communicate the information.

Signup and view all the flashcards

PING

Common troubleshooting tool, used most commonly for helping troubleshoot common network issues by testing connectivity and response times.

Signup and view all the flashcards

Traceroute

Trace the route of a packet through the network by identifying all of the devices connected to it.

Signup and view all the flashcards

OSI Upper Layers

Upper layers of the OSI model include transport, session, presentation and application.

Signup and view all the flashcards

Three-way Handshake Types

SYN - synchronize, SYN-ACK – synchronize - acknowledgement, ACK - acknowledgement, all used for setting up the three-way handshake.

Signup and view all the flashcards

H.323

Used for setting up, maintaining, and tearing down voice and video connections, operates over the real-time transport protocol.

Signup and view all the flashcards

Data Formatting

Responsible for formatting data for exchange and securing it through encryption on Layer 6.

Signup and view all the flashcards

Transport Layer Security (TLS)

Ensures secure data transfer and creates and encrypted tunnel and protects sensitive information.

Signup and view all the flashcards

Application Layer Focus

Protocols used within lower-level applications.

Signup and view all the flashcards

Application Services

Web browsing, file transfer, and domain name service.

Signup and view all the flashcards

Encapsulation

Process of putting headers and sometimes trailers around data when moving down layers of the OSI model.

Signup and view all the flashcards

Decapsulation

Removing the applications to access the original data where moving up the OSI model.

Signup and view all the flashcards

Protocol Data Units (PDUs)

A single unit of information transmitted in a computer network, terminology for each layer is written as L(layer number) PDU.

Signup and view all the flashcards

TCP Header (Layer 4)

Total 10 mandatory fields, totalling 20 bytes of information containing source port, destination port and sequence number.

Signup and view all the flashcards

RST (Reset)

Used when an unexpected packet is received.

Signup and view all the flashcards

EtherType Field

Indicates which protocol is encapsulated in the payload of a frame, can be IPv4 or IPv6.

Signup and view all the flashcards

Payload

Data that is being set across the network, either 42 bytes when using (VLANs) or 46 bytes with no (VLANs).

Signup and view all the flashcards

Wiring Standards

A standard for wiring and pin assignments in network cables.

Signup and view all the flashcards

Maximum Transmission Unit (MTU)

The maximum size of the payload.

Signup and view all the flashcards

Jumbo Frames

Frames larger than the standard MTU, often requiring reconfiguration.

Signup and view all the flashcards

Data (Layer 7)

Name of data as it flows through Layer 7 of the OSI model.

Signup and view all the flashcards

Packet Reordering

Ensures data packets arrive in the correct sequence at Layer 3.

Signup and view all the flashcards

Buffer

A temporary data storage used to manage data flow.

Signup and view all the flashcards

NetBIOS

Used for file sharing over a network, commonly associated with Windows.

Signup and view all the flashcards

ASCII

ASCII is a text based language to use.

Signup and view all the flashcards

Email Applications (Layer 7)

Email specific protocols for use with email applications.

Signup and view all the flashcards

SYN Flag

A flag used in the TCP header to synchronize a connection in a three-way handshake.

Signup and view all the flashcards

ACK Flag

A flag used for acknowledgement when the successful receipt of the data.

Signup and view all the flashcards

FIN (Finished) Flag

A flag used for terminating a connection.

Signup and view all the flashcards

IP Header (Layer 3)

Contains contains various fields, version, and header length.

Signup and view all the flashcards

MAC Address

A physical address that is used to identify a network card on a local area network and is processed by switches.

Signup and view all the flashcards

Maximum Transmission Unit (MTU)

Maximum Transmission Unit, Maximum size for payload, 1500 bytes for Ethernet.

Signup and view all the flashcards

Study Notes

OSI Model and TCP Model

  • Objective 1.1 explains the concepts related to the Open Systems Interconnection (OSI) reference model
  • The Open Systems Interconnect (OSI) model was developed in 1977 by the International Organization for Standardization
  • OSI is a reference model used to categorize network functions and for troubleshooting
  • Networks operate under the TCP/IP mode
  • Networks are designed to make data flow across networks

OSI Layers

  • Layer 1: Physical
  • Layer 2: Data Link
  • Layer 3: Network
  • Layer 4: Transport
  • Layer 5: Session
  • Layer 6: Presentation
  • Layer 7: Application

What Data is Called at Each Layer

  • Bits - Layer 1
  • Frames - Layer 2
  • Packets - Layer 3
  • Segments - Layer 4
  • Data - Layer 5
  • Data - Layer 6
  • Data - Layer 7

Physical Layer (Layer 1)

  • It is the first layer of the OSI model
  • Transmission of bits across the network with physical and electrical network characteristics.
  • Data type occurs as bits, where binary bits are represented as a series of 1s and 0s

Transition Modulation

  • Switching between levels represents 1 or 0:
    • Copper Wire (Cat5/Cat6) utilizes voltage (0V for 0, +5V/-5V for 1)
    • Fiber Optic Cable uses light (on for 1, off for 0)
  • Connector Standards incorporate the RJ-45 Connector used in CAT5/CAT6 cables and Wiring Standards.
  • Cabling standards include TIA/EIA-568A and TIA/EIA-568B
  • Crossover cables use TIA/EIA-568A on one end and TIA/EIA-568B on the other end where straight-through cables use TIA/EIA-568B on both ends.

Physical Topology

  • Refers to different physical network layouts based on how cables are physically connected
  • These include Bus, Ring, Star, Hub-and-Spoke, Full Mesh, and Partial Mesh
  • Synchronization:
    • Asynchronous Communication involves start and stop bits for out-of-sync data transmission
    • Synchronous Communication is real-time communication using a common time source.
  • Bandwidth Utilization:
    • Broadband divides bandwidth into separate channels such as cable TV
    • Baseband uses all the frequency of the cable all the time such as a telephone

Multiplexing

  • Involves efficiently using a limited amount of resources
  • Allows multiple people to use a baseband connection simultaneously
  • Time Division Multiplexing (TDM) allocates dedicated time slots
  • Statistical Time Division Multiplexing (StatTDM) dynamically allocates time slots based on when people need it
  • Frequency Division Multiplexing (FDM) divides the medium into channels

Layer 1 Devices

  • Cables include fiber optic, Ethernet, and coaxial
  • Wireless Media includes Bluetooth, Wi-Fi, and near field communication
  • Infrastructure Devices include hubs, access points, and media converters
  • Layer 1 devices simply repeat what they receive, without logic or decision-making.
  • Responsible for packaging bits from Layer 1 into frames and transmitting these across the network
  • Performs error detection and correction, identifying devices using MAC addresses, and provides flow control

MAC Address (Media Access Control Address)

  • Means of physical device identification for operation on a logical topology.
  • Every NIC has a unique 48-bit physical addressing system assigned
    • Written in hexadecimal numbers
    • First 24 bits identifies the manufacturer
    • Remaining 24 bits identifies the specific device
  • Crucial for logical topology to identify devices on the network
  • LLC provides connection services and acknowledges message receipt for controlled data flow
  • It is the most basic form of flow control as it limits sender data and prevents receiver overwhelm
  • Uses a checksum to detect corrupted data frames

Synchronization Methods at Layer 2

  • Isochronous Mode uses a common reference clock with time slots for transmissions and less overhead
  • Synchronous Method uses the same clock, with beginning and ending frames, and control characters for synchronization
  • Asynchronous Method includes devices that reference their own clock cycles with no strict control over communication timing

Layer 2 Devices

  • Network Interface Cards (NICs)
  • Bridges
  • Switches intelligently use logic to learn and send data to specific devices based on MAC addresses

Switch Operation

  • Switches use CAM tables with MAC addresses to identify physical ports connected to devices, enabling selective data transmission to specific areas within the network

Network Layer (Layer 3)

  • Concerned with routing and forwarding traffic with logical addresses
  • Logical Addressing includes IP variants as common logical addressing schemes
  • IPv4 is written in dotted octet notation as it uses four sets of numbers separated by dots (e.g., 172.16.254.1)
  • Other protocols such as AppleTalk and IPX (Internetwork Packet Exchange) were replaced by IP (Internet Protocol)

Switching/Routing Methods

  • Packet Switching (Routing) divides data into packets and then forwards them
  • Circuit Switching establishes a dedicated link between two devices
  • Message Switching divides data into messages stored and then forwarded

Route Discovery and Selection

  • Routers maintain routing tables to determine the best path with dynamic protocols (e.g., RIP, OSPF) enabling sharing and updating of route information
  • Routing protocols help decide how data flows across a network

Connection Services at Layer 3

  • Augments Layer 2 services and includes flow control to prevent sender overwhelm and packet reordering to ensure correct data assembly.
  • Internet Control Message Protocol (ICMP) sends error messages and operational information to an IP destination, used in PING as the most common ICMP

Troubleshooting

  • Traceroute traces the route of a packet through the network
  • Devices and Protocols are Routers, Multi-layer switches which have both Layer 2 switch and Layer 3 router features (A switch is always a Layer 2 device unless specified as multi-layer, then it is considered as a Layer 3 device)
  • Layer 3 protocols include IPv4, IPv6, and ICMP.
  • IP and routers are commonly encountered Layer 3 devices in exams

Transport Layer (Layer 4)

  • Forms the dividing line between the upper and lower layers of the OSI model
  • Upper Layers includes Transport, Session, Presentation and Application

Segments

  • Data Type in Transport Layer
  • Protocols in Layer 4
    • TCP (Transmission Control Protocol) is a connection-oriented protocol that is a reliable way to transport segments across the network with acknowledgement
      • Employs a Three-Way Handshake (SYN - synchronization, SYN-ACK – synchronization - acknowledgement, ACK - acknowledgement)

Windowing

  • For flow control
  • Used for all network data that needs assurance to get to its final destination
  • UDP (User Datagram Protocol) is connectionless and transports segments unreliably (datagram)
  • Used for audio and visual streaming, involves no three-way handshake, has less overhead, and has no acknowledgement or retransmission.

Layer 4 Examination

  • Segment is the Data type for TCP, datagram is the data type for UDP.
  • TCP is reliable, uses a Three-way Handshake, is connection-oriented, involves segment retransmission and flow control through windowing, sequencing, and acknowledgement of segments
  • UDP is unreliable, uses No Three-way Handshake, is connectionless, involves no retransmission or windowing, sequencing, and no acknowledgment of datagrams

Windowing

  • Allows clients to adjust the amount of data in segments during transmission
  • Optimizes throughput and bandwidth
  • Opens or closes window based on retransmissions.
  • Buffering occurs when devices allocate memory to store segments if bandwidth is not readily available

Buffer

  • Temporary memory storage for segments
  • Prevents overflow by clearing segments
  • Layer 4 Devices can use protocols such as TCP and UDP
  • WAN accelerators, Load balancers and firewalls are devices used at Layer 4

Session Layer (Layer 5)

  • Manages sessions, ensuring separate conversations to prevent data intermingling
  • Setting Up Session involves checking user credentials and assigning numbers to sessions to help identify
  • Maintaining Session requires continuous data transfer, and requires re-establishment if a connection breaks, acknowledges data
  • Tearing Down a Session ends it when communication goals are achieved, and involves mutual agreement or one party disconnects

Layer 5 Examination

  • Layer 5 issues involve protocols and software rather than specific devices
  • H.323 is used for setting up, maintaining, and tearing down voice and video connections and operates over the real-time transport protocol (RTP)
  • NetBIOS is utilized by computers for file sharing and commonly associated with Windows file sharing

Presentation Layer (Layer 6)

  • Responsible for formatting data for exchange and securing it through encryption
  • Data Formatting allows a computer to have compatibility between different devices

Formats

  • American Standard Code for Information Interchange (ASCII) is text-based language to use,
  • Ensures data is readable by receiving system, provides proper data structures, and negotiates data transfer syntax for the Application Layer (Layer 7)
  • File types such as GIFs, JPEGs, and PNGs
  • Formats enable compatibility between different devices

Encryption

  • Used to scramble data in transit to keep it secure and provide data confidentiality
  • Transport Layer Security (TLS) ensures secure data transfer and creates an encrypted tunnel, protecting sensitive information
  • Scripting languages in Layer 6 control ASCII text display which include HTML, XML, PHP, and JavaScript
  • Standard text formats include ASCII, Unicode, and EBCDIC
  • Image formats includes GIFs, JPEGs, and TIFFs

Movie File Formats

  • 1s and 0s formatted to create watchable videos and utilize MP4s, MPEGs and MOV
  • Encryption Algorithms scrambles data to provide confidentiality and security during transit and storage with TLS and SSL (Secure Sockets Layer)
  • Focus on Security

Application Layer (Layer 7)

  • Provides application-level services where users communicate with the computer and focuses on lower-level applications involving file and network transfer

Application Services

  • Unites components for more than one network application
  • Application services may include file transfer, file sharing, email and low-level protocols include POP3 (Post Office Protocol 3), IMAP (Internet Message Access Protocol), and SMTP (Simple Mail Transfer Protocol)
  • It includes remote access, network management, and client-server processes
  • Service Advertisement requires applications to send announcements to other devices on the network and devices to advertise the services they offer

Layer 7 protocols

  • Used for email applications using POP3, IMAP, and SMTP
  • Used for Web Browsing via HTTP and HTTPS
  • Used for Domain Name Service (DNS)
  • Used for File Transfer Protocols via FTP, FTPS, and SFTP
  • Remote Access uses Telnet, SSH, and SNMP

Encapsulation.

  • The process of putting headers and trailers around data

Decapsulation

  • The process of removing the encapsulation applied to access the original data
  • In the OSI Model Layers, moving down from Layer 7 to 1 is encapsulation and moving up from Layer 1 to 7 is decapsulation

Protocol Data Units (PDUs)

  • A single unit of information transmitted in a computer network
  • Terminology for each layer is written as L(layer number) PDU: Example - L7 PDU for Layer 7
  • Special names for the PDUs for layers 1, 2, 3, and 4:
    • Layer 1 - Bits
    • Layer 2 - Frames
    • Layer 3 - Packets
    • Layer 4 - Segments (TCP) or Datagrams (UDP)

TCP Header (Layer 4)

  • The TCP Header has 10 mandatory fields, totaling 20 bytes, including source & destination ports, sequence & acknowlegment numbers, data offset, reserved data and control flags
  • SYN synchronizes the connection in a three-way handshake
  • ACK acknowledges the successful receipt of data
  • FIN (Finished) tears down connections created by three-way handshake

TCP Header Control Flags

  • RST (Reset) indicates an unexpected packet was received
  • PSH (Push) ensures given data is prioritized
  • URG (Urgent) identifies incoming data as urgent
  • Window size
  • TCP checksum and urgent pointer
  • mTCP - optional

UDP Header (Layer 4)

  • Uses an 8-byte header
  • Includes source and destination port
  • length is the total packet bytes
  • a checksum that is not mandatory

IP Header (Layer 3)

  • Contains various fields
  • Version and length of IP header
  • Type of service
  • Total length of packet and header
  • Identifier & Flags
  • Fragmented offset
  • Time to live & Protocol
  • Header checksum
  • Source and destination IP Addresses
  • Options and Padding
  • Ethernet Header (Layer 2)
    • Destination and source MAC address
    • Uses MAC Address- physical address to identity a network card
      • Physical address to identity a network card on a local area network
      • Processed by switches
    • EtherType field indicates which protocol is encapsulated in the payload of a frame and can be IPv4 or IPv6

LAN

  • VLAN Tag - optional
    • IEEE 802.1Q
    • IEEE 802.1AD
  • A frame being sent at Layer 2 will include a payload containing:
    • Data sent across the network
    • 42 bytes - using VLANs
    • 46 bytes - no VLANs
    • Maximum Transmission Unit (MTU)
    • Maximum size for payload (1500 bytes for Ethernet)
  • Jumbo Frames can be larger than 1500 bytes, and may require reconfiguring MTU

Data Transmission

  • Encapsulation adds a header at each layer:
    • Layer 4 works with source/destination ports
    • Layer 3 works with source/destination IP addresses
    • Layer 2 works with source/destination MAC addresses
    • Layer 1 transmits data as 1s/0s
  • Decapsulation occurs at each intermediate device until the final host is reached, and the final host decapsulates up to Layer 7 for application understanding

Understanding the OSI Model: Practical Example

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Networking Lecture 3: OSI and TCP/IP Models
10 questions
OSI Model vs TCP/IP
18 questions

OSI Model vs TCP/IP

GoldEucalyptus38 avatar
GoldEucalyptus38
Networking Quiz: OSI and TCP/IP Models
10 questions
Use Quizgecko on...
Browser
Browser