Video Content Lesson 7 Flashcards

2
Q

OSI Reference Model

A
Protocols
Standards Organizations
OSI Overview
Logical Data Flow
Physical Data Flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocols

A

Computers need formal rules to communicate
Protocol - Formal set of rules that govern communication
Proprietary protocols only allow communication with similar machines (originally)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Standards Organizations

A

ISO - International Organization for Standardization (basic communication protocols)
IEEE - Institute of Electrical and Electronics Engineers (low level physical standards)
NSA - National Security Agency (Different levels for security being maintained)
NIST - National Institute for Standards and Technology
ANSI - American National Standards Institute (character sets)
CCITT - International Telegram and Telephone Consultative Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Overview

A
OSI Open Systems Interconnection reference model
Developed by ISO (also known as ISO/OSI)
Open network architectural guide 
Specifies how dissimilar systems can communicate
7 distinct protocol layers
Application
Presentation
Session
Transport
Network
Data-link
Physical
This standard allows developers to write software that works on many dissimilar machines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logical Data Flow

A

Flows from one layer on source machine to same layer on target machine (don’t have to worry about what happens in stack below us)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical Data Flow

A

Physically have to go down through every layer below, across medium, and back up each layer to the original layer)
Each Layer adds header and trailer to message (chunked into packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Layers

A
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data-link Layer
Physical Layer
TCP-IP Model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Layer

A

Provides services for high-level program (it is NOT the application)
HTTP, FTP, SMTP, EDI, POP3, IMAP, SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Presentation Layer

A

Provides data representation between systems
GIF, JPEG, MPEG
Responsible for encryption and compression (decryption and decompression)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Session Layer

A

Manages sessions and synchronizes data flow

NFS, SSL, RPC, Xwindows, AppleTalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transport Layer

A

Responsible for end-to-end transmission integrity
Provides a logical connection between machines
Ensures message delivery
TCP, UDP, SPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Layer

A

Determines the best way to get data to the destination
Providing Routing Capabilitites
IP, ICMP, IPX, RIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data-link Layer

A

Handles data packet transfer
Handles physical addressing, error handling, and flow control
SLIP, PPP, ARP, RARP, FDDI, ISDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical Layer

A

Transmits the bit stream onto the physical media

Can use transmission mechanism that is wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP-IP Model

A
Developed by the DOD
Simplified medel containing 4 layers
Application Layer
Transport Layer
Network Layer
Link Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Layer

A

All issues specific to a session or application

OSI layers 5, 6, and 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Transport Layer

A

Supports moving data between applications
OSI layer 4
Corresponds (supported by) to TCP and UDP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Layer

A

Supports moving data between netowrks
OSI layer 3
Corresponds to IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Link Layer

A

Provides physical communication and routing

Encapsulates 2 layers (physical layer 1 and data-link layer 2)

21
Q

Media-LAN Topologies

A
Twisted Pair
Coaxial
Fiber Optics
Wireless Technologies
Star Topology
Bus Topology
Ring Topology
Tree Topology
Mesh Topology
22
Q

Twisted Pair

A

Regular copper wire with each pair twisted around each other
UTP -Unshielded Twisted Pair
STP - Shielded Twisted Pair
Least expensive media

23
Q

Coaxial

A

Same media used for cable TV (copper cable core, insulator, wire mesh transmits data)
more expensive and harder to install

24
Q

Fiber Optics

A

Any transmission of light waves along glass or plastic wires
More expensive and costly to terminate
Not effected by EMI Electromagnetic interference

25
Q

Wireless Technologies

A

DSSS Direct-Sequence Spread Spectrum (transmission spread over large frequency band, reduces interference percentage)
FHSS Frequency-Hopping Spread Spectrum (Uses rapidly changing frequencies, reduces overall interferences)
OFDM Orthogonal Frequency Division Multiplexing (signal is subdivided into sub-bands, sub-bands can be transmitted together)
FDMA Frequency Division Multiple Access (analog-only sub-bands)
TDMA Time Division Multiple Access (can carry multiple conversations on each sub-band, each conversation gets a time slice)
CDMA Code Division Multiple Access (Spread spectrum like DSS, CDMA 2000 (tranmission rates up to 153.6 Mbps), Wideband CDMA (wider band that increases carrier input)
GSM Global Service for Mobile Communication (Most popular cellular technology, uses time-division multiplexing (can support up to 8 callers per simplex channel)

26
Q

Various Topologies

A

Star (multiple machines connected through one)
Bus (multiple machines connected through bus)
Ring (multiple machines connected to its neighbor)
Tree (variation of Bus Topology)
Mesh (most complex of topologies)

27
Q

Star Topology

A

All nodes are connected to a central device
All Messages must travel through the center
advantage simple, disadvantage single point of failure

28
Q

Bus Topology

A

All nodes are connected to a shared media, often called the backbone or bus
the messages travel the length of the bus
end of bus must be terminated

29
Q

Ring Topology

A

each computer is connected to its neighbor on each side
messages travel from node to node until they reach their destination
advantage no sigle point of failure because NIC passes message automatically if disconnected

30
Q

Tree Topology

A

Variation of Bus Topology (nodes may be connected to more than one bus)
multiple bus connections create the branches of the tree
single point of failure only exists on the node that crosses multiple branches

31
Q

Mesh Topology

A

every node is connected to every other node
very complex, but highly fault tolerant
partial mesh (not connected to all machines but to many so there are multiple paths)

32
Q

LAN-WAN-Remote Access

A
Ethernet
Other Access Methods
Signaling Types
Network Types
Dial-up
ISDN
DSL
Wireless-Cable
33
Q

Ethernet

A

Most common LAN access method
IEEE 802.3 standard
uses CSMA/CD (Carrier Sense Media Access with Collision Detection)
Listen first and then talk (Carrier signal is sampled off physical media, hardware listens for carrier signal (if carrier signal is heard this tells it that noone else is talking, headware sends message off wire) (listens to what is being echoed back to him, if same message then it was correctly sent otherwise retransmits)
Cable standards (ThinNet-10Base2, coaxial up to 185 meters; ThickNet-10Base5, coaxial up to 500 meters; most common used is UTP-10BaseT, 100BaseT, 1000BaseT used with central hub (Star Typology))

34
Q

Other Access Methods

A

ARCnet (one of earliest LAN technologies, token passed methods, have to hold token to talk, uses bus or ring typology
Ring typology uses MAU Multistation Access Unit which has all end nodes connected to it
FDDI Fiber Distributed Data Interface (token passing method, 100 Mbps using dual fiber-optic rings, rings operate in opposite directions, if one ring breaks, other ring is used to maintain a complete network)

35
Q

Signaling Types

A
Baseband transmission (digital signal, entire media filled with one signal)
Broadband (analog signal, Cable TV, multiple communication channels used simultaneously, tranmitted in channels on a carrier, digital data must be modulated first)
36
Q

Network Types

A

LAN Local Area Network (Group of networked computers and devices in relatively close proximity to one another)
WAN Wide area network (Network of computers and devices that spans a large geographic area)
Remote access/telecommuting (method of connecting to a WAN or LAN through dial-up or high-speed access lines

37
Q

Dial-up

A

POTS Plain Old Telephone Service (uses MODEM 56 Kbps, speed based on proximity to central office, condition of line, noise on the line, multiplexing, bandwidth artificially limited)

38
Q

ISDN

A

Integrated Services Digital Network (ISDN)
Basic Rate Interface (BRI) (Two 64-KB channels (digital, audio, video, communication) and one 16-KB channel (digital transfer)
Primary Rate Interface (PRI) (23 64-KB channels and one 16-KB channel)
Expensive

39
Q

DSL

A

Digital Subscriber Line (higher speed connection than dial-up using existing twisted pair)
inexpensive option
ADSL (Asynchronous digital subscriber line) used at home because higher speed for downloads and slower speeds for uploads
SDSL (Synchronous digital subscriber Line) same upload and download capability
VDSL (Very-high-speed digital subscriber line)
DSL Lite (doesn’t require splitter used by ADSL, SDSL, and VDSL)

40
Q

Wireless-Cable

A

Wireless (networking without wires)
Several emerging standards (802.11a, 802.11b, 802.11g)
Cable Modems (great alternative to DSL) (can be substantially faster than DSL if number of concurrent users is not excessive)

41
Q

Remote Access Security

A
VPN
PPTP
IPSec
Connection Security
User Authentication
Node Authentication
42
Q

VPN

A

Virtual Private Network
Tunnel (like envelope–encapsulation technique)
often associated with secure transmissions
can connect two systems or two networks
offers an inexpensive secure communication using public networks

43
Q

PPTP

A

Point-to-Point Tunneling Protocol
Built to provide encrypted PPP tunnel
After negotiation all PPP traffic is encrypted
L2F Layer 2 Forwarding (developed by Cisco to provide mutual authentication tunneling)
L2TP Layer 2 Tunneling Protocol (extended PPTP and L2F, supports TACACS+ and RADIUS)

44
Q

IPSec

A
Operates as a standalone VPN protocol OR along with L2TP
can provide encryption for L2TP
Transport mode (payload is encrypted but header is NOT) for connecting two systems
Tunnel mode (both payload and header are encrypted) for connecting two networks
45
Q

Connection Security

A

Remote access without VPN
SSH - Secure Shell (more secure than Telnet) provides a sure method to access a remote machine
SSL/TLS - Secure Sockets Layer (secures communication between client and web server) (ONLY encrypts communication between client and web server not behind them)

46
Q

User Authentication

A

Centralized remore user authentication
1-RADIUS Remote Authentication Dial-in User Service
2-TACACS - Terminal Access Controller Access Control System
TACACS+ (adds two-factor authentication)

47
Q

Node Authentication

A

Password Authentication Protocol (PAP) (this is standard authentication protocol for PPP; no encryption; user IDs and passwords passed in the clear)
Challenge Handshake Authentication Protocol (CHAP) (similar to PAP; encrypts user IDs and password; operates over PPP)