OBJ 1.1 X Flashcards

1
Q

OSI Model Layers

A
  1. Physical
  2. Data link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethernet Header

A

Fields in a frame used to identify source and destination MAC addresses, protocol type, and error detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP (transmission control protocol)

A

Protocol in the TCP/IP suite operating at the transport layer to provide connection-oriented, guaranteed delivery of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UDP (user datagram protocol)

A

Protocol in the TCP/IP suite operating at the transport layer to provide connectionless, non-guaranteed communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP Flags

A

Field in the header of a TCP segment designating the connection state, such as SYN, ACK, or FIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Protocol (IP) Header

A

Fields in a datagram used to identify source and destination IP addresses, protocol type, and other layer 3 properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTU (Maximum transmission unit)

A

Maximum size in bytes of a frame’s payload. If the payload cannot be encapsulated within a single frame at the Data Link layer, it must be fragmented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Physical Layer
A

Transmission of bits across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Data link layer
A

Packages data into frames and transmitting those frames on the network, performing error detection/correction, and uniquely identifying network devices with an address (MAC), and flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Network layer
A

Forwards traffic (routing) with logical address. (example: IP address IPv4 or IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Transport layer
A

Dividing line between upper and lower layers of the OSI model. Data is sent as segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Session layer
A

Think of a session as a conversation that must be kept separate from others to prevent intermingling of the data. Setting up, maintaining, and tearing down sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Presentation layer
A

Responsible for formatting the data exchanged and securing that data with proper encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Application layer
A

Provides application-level services. The layer where the users communicate with the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Physical layer (How are bits represented on the medium?)
A

Electrical voltage ((copper wiring) or light (fiber optics) represents 1’s and 0’s (bits) If 0 volts, then 0 is represented. If +/-5 volts, then 1 is represented.

Transition modulation: If it changed during the clock cycle, then a 1 is represented, otherwise, a 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Physical layer (How are the cables wired?)
A

TIA/EIA-568-B is standard wiring for RJ-45 cables and ports. Crossover cables use T-568A and T-568B. Straight thru cables typically use T-568 B on both ends, but could use T-568A on both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Physical layer (How are the cables connected?)
A

Layer 1 devices view networks from a physical topology perspective. Bus, Ring, Star, Hub-and-Spoke, Full Mesh, Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Physical layer (How is communication synchronized?)
A

Asynchronous: uses start bits and stop bits to indicate when transmissions occur from sender to receiver

Synchronous: Uses a reference clock to coordinate the transmissions by both sender and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Physical layer (examples)
A

Cables (ethernet, fiber optic)
Radio frequencies (Wi-Fi, bluetooth)
Infrastructure devices (hubs, wireless access points, media converters)

20
Q
  1. Data link layer (physical addressing)
A

Physical addressing
uses 48-bit address assigned to a network interface card by manufacturer. First 24 bits is the vendor code, second 24-bits is a unique value.

21
Q
  1. Data link layer (logical topology)
A

Layer 2 devices view networks logically (ring, bus, star, mesh, hub-and-spoke)

22
Q
  1. Data link layer examples
A

Network Interface Cards, Bridges, Switches

23
Q
  1. Network Layer (Logical addressing)
A

Numerous routed protocols were used for logical addressing over the years. (AppleTalk, IPX, IP) Only IP remains dominant. IP v4, IP v6

24
Q
  1. Network Layer (how data should be forwarded or routed?)
A

Packet switching (routing) where data is divided into packets and forwarded.

Circuit switching - dedicated communication link is established between two devices.

Message switching (data is divided into messages, similar to packet switching, except these messages may be stored then forwarded

25
Q
  1. Network layer (route discovery and selection)
A

Routers maintain a routing table to understand how to forward a packet based on destination IP address. Manually configured as a static route or dynamically through a routing protocol. (RIP, OSPF, EIGRP)

26
Q

ICMP

A

Internet Control Message Protocol (ICMP) used to send error messages and operational information about an IP destination. Not regularly used by end-user applications, used in troubleshooting (ping and traceroute)

27
Q
  1. Network Layer examples
A

Routers, Multilayer swtiches, IPv4 protocol, IPv6 protocol, ICMP

28
Q

TCP (transmission control protocol) (L4)

A

Connection-oriented, reliable transport of segments, (if segment is dropped, protocol detects it and resends segment), acknowledgements received for successful communications, used for all network data that needs to be assured to get to its destination

29
Q

UDP (user datagram protocol) (L4)

A

Connectionless protocol, unreliable transport of segments, (if dropped, sender is unaware), no retransmission, good for audio/video streaming, lower overhead for increased performance.

30
Q

Windowing (L4)

A

Allows the clients to adjust the amount of data sent in each segment, continually adjusts to send more or less data per segment transmitted. Adjusts lower as number of retransmissions occur, adjusts upwards as retransmissions are eliminated.

31
Q

Buffering (L4)

A

Devices, such as routers, allocate memory to store segments if bandwidth isn’t readily available. When available, it transmits the contents of the buffer, if the buffer overflows, segments will be dropped.

32
Q
  1. Transport Layer examples
A

TCP, UPD, WAN Accelerators, Load Balancers, Firewalls

33
Q
  1. Session Layer (set up, maintain, tear down)
A

Setting up - check user credentials, assign numbers to session to identify them, negotiate services needed for session, negotiate who begins sending data.

Maintaining - transfer the data, reestablish a disconnected session, acknowledging receipt of data

Tearing down a session - due to mutual agreement (after the transfer is done), due to the other party disconnecting the session

34
Q
  1. Session layer examples
A

H.323 (used to setup, maintain, and tear down a voice/video connection)
NetBIOS (used by computers to share files over a network)

35
Q
  1. Presentation Layer (Data formatting, Encryption)
A

Data formatting - formats data for proper compatibility between devices, ASCII, GIF, JPG, ensures data is readable by receiving system, provides proper data structures, negotiates data transfer syntax for the application layer (7)

Encryption - Used to scramble the data in transit to keep it secure from prying eyes.

36
Q
  1. Presentation layer examples
A

HTML, XML, PHP, JAVASCRIPT, ASCII, EBCDIC, UNICODE, GIF, JPG, TIF, SVG, PNG, MGP, MOV, TLS, SSL

37
Q
  1. Application layer (App services, Service Advertisement)
A

Application services - unite communicating components from more than one network application. Ex: file transfers and sharing, e-mail, remote access, network mgmt activities, client/server processes.

Service Advertisement - some apps send out announcements, states the services they offer on the network, some centrally register with Active Directory server instead (printers, file servers)

38
Q
  1. Application layer examples
A

E-mail (POP3, IMAP, SMPT)
Web browsing (HTTP, HTTPS)

DNS< FTP< FTPS< TELNET< SSH< SNMP

39
Q

Encapsulation

A

the process of putting headers (and sometimes trailers) around some data

40
Q

Decapsulation

A

Action of removing the encapsulation that was applied.
If we move down the OSI layers from 7 to 1, we ENCAPSULATE data
If we move upward from layers 1 to 7 we DECAPSULATE data

41
Q

Protocol data unit

A

a single unit of info transmitted within a computer network
Layer 1 - bits
Layer 2 - frames
Layer 3 - packets
Layer 4 - segments if TCP or datagrams if UDP

42
Q

SYN (synchronization flag)

A

The most well-known flag in TCP communications because it is used to
synchronize the connection during the three-way handshake

43
Q

ACK (or acknowledgement) flag

A

Used during the three-way handshake, but it is also used to acknowledge
the successful receipt of packets

44
Q

FIN (or finished) packet

A

-Used to tear down the virtual connections created using the three-way
handshake and the SYN flag

-The FIN flag always appears when the last packets are exchanged
between a client and server and the host is ready to shutdown the
connection

45
Q

RST (or reset) flag

A

▪ Used when a client or server receives a packet that it was not expecting
during the current connection

46
Q

PSH (or PUSH) flag

A

Used to ensure that the data is given priority and is processed at the
sending or receiving ends

47
Q

URG (or urgent) flag

A

It is like the Push flag and identifies incoming data as “urgent”

The main difference is PSH is used by a sender to indicate data with a
higher priority level where URG is sent to tell the recipient to process it
immediately and ignore anything else in queue