OSI Flashcards

(74 cards)

1
Q

OSI meaning

A

Open System Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _______________ model is a
conceptual model created by the International
Organization for Standardization which enables
diverse communication systems to communicate
using standard protocols.

A

Open Systems Interconnection (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The open systems interconnection (OSI) model is a
conceptual model created by the ________ which enables diverse communication systems to communicate using standard protocols.

A

International Organization for Standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

can be seenas a universal language for computer networking. It is based on the concept of splitting up a
communication system into seven abstract layers,
each one stacked upon the last

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the only layer that directly interacts with data from the user. Software applications like web browsers and email clients rely on the ____________ to initiate communications.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

But it should be made clear that client software
applications are not part of the application layer

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is responsible for the protocols and data manipulation that the software relies on to present meaningful data to the user

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application layer protocols include ________ as well as __________

A

HTTP and SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMTP

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is one of the protocols that enables email communications

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prepares data for the application layer by translating, encrypting, and compressing it. It ensures that data from different devices using different encoding methods is converted into a format the receiving device’s application layer can understand.

A

PRESENTATION LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If the communication is encrypted, it
handles both encryption on the sender’s side and decryption on the receiver’s side, presenting unencrypted, readable data. Additionally, it
compresses data to improve transfer speed and efficiency

A

PRESENTATION LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

manages the opening and closing of communication
between two devices, ensuring the session stays open long enough to transfer all data and then closes to save resources.

A

SESSION LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

manages the opening and closing of communication
between two devices, ensuring the session stays open long enough to transfer all data and then closes to save resources.

A

SESSION LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

handles end-to-end communication between devices. It breaks data from the session layer into segments before sending it to layer 3, and on the receiving device, it reassembles these segments.

A

TRANSPORT LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

also manages flow control, ensuring the sender’s speed doesn’t overwhelm the receiver, and error control, ensuring data integrity by requesting retransmissions if necessary.

A

TRANSPORT LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key protocols of transport layer include

A

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

handles data transfer between different networks. If the devices are on the same network, this layer isn’t needed.

A

NETWORK LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It breaks down transport layer segments into smaller packets for transmission and reassembles them on the receiving device

A

NETWORK LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The network layer also determines the best route for data to reach its destination, a process known as __________

A

routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

determines the best route for data to reach its destination

A

NETWORK LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Key protocols of network layer include

A

IP, ICMP, IGMP, and the IPsec suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

MAC

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ICMP
Internet Control Message Protocol
26
lGMP
Internet Group Management Protoco
27
IPsec
Internet Protocol Security
28
SNA
Systems Network Architecture
29
IBM
International Business Machines
30
VTAM
Virtual Telecommunications Access Method
31
CICS
Customer Information Control System
32
IMS
Information Management System
33
P2P
Peer-to-Peer
34
CDN
Content Delivery Network
35
is very similar to the network layer, except the data link layer facilitates data transfer between two devices on the same network.
DATA LINK LAYER
36
takes packets from the network layer and breaks them into smaller pieces called frames
DATA LINK LAYER
37
data link layer takes packets from the network layer and breaks them into smaller pieces called
frames
38
Like the network layer, the _________ is also responsible for flow control and error control in intra-network communication
DATA LINK LAYER
39
does flow control and error control for inter-network communications
TRANSPORT LAYER
40
This layer includes the physical equipment involved in the data transfer, such as the cables and switches
PHYSICAL LAYER
41
This is also the layer where the data gets converted into a bit stream, which is a string of 1s and 0s
PHYSICAL LAYER
42
The ___________ of both devices must also agree on a signal convention so that the 1s can be distinguished from the 0s on both devices.
PHYSICAL LAYER
43
is a string of 1s and 0s
bit stream
44
is the framework that defines how data, devices, and communication processes interact within a network.
SYSTEM NETWORK ARCHITECTURE
45
It includes hardware components (routers, switches, firewalls), software (network operating systems, middleware), and communication protocols.
SYSTEM NETWORK ARCHITECTURE
46
A well-structured network architecture ensures efficient, secure, and reliable data transmission, optimizing bandwidth, reducing latency, and supporting scalability. It also promotes interoperability between different devices and systems. Poor architecture can lead to inefficiencies like bottlenecks and security issues.
47
is essential for seamless digital communication
network architecture
48
In 1974, IBM introduced its ________, a set of protocols enabling communication between IBM mainframes and peripheral devices like controllers for displays, printers, and financial systems
Systems Network Architecture (SNA)
49
The mainframe subsystem supporting SNA was called
Virtual Telecommunication Access Method (VTAM)
50
became dominant in Fortune 1000 companies due to its robustness, supported by IBM’s hardware and transaction management software (CICS and IMS).
Systems Network Architecture (SNA)
51
At the time, data processing was mainly batch-based, where data was manually entered and processed in bulk. Transaction processing, introduced around 1974, allowed real-time data entry and immediate feedback, requiring reliable networking infrastructure.
52
Communication lines in the 1970s were slow and unreliable, with speeds of only _____ bits per second
9600
53
developed SNA to ensure message integrity, as even minor errors (like a missing or extra bit) could lead to disastrous outcomes, such as incorrect bank transactions. Memory limitations and slower devices further prompted the need for a robust protocol to address these challenges
IBM
54
define how computing resources, services, and data are organized and managed within a network. Different architectures are designed to meet specific needs, considering factors such as scalability, performance, security, and fault tolerance.
Network architecture
55
The most common types of network architectures include ______________________________________________________________, each with its own advantages and challenges.
centralized, distributed, client-server, and peer-to-peer (P2P) architectures
56
is one in which all computing resources, data, and processing power are controlled by a single central server or mainframe.
CENTRALIZED NETWORK ARCHITECTURE
57
This architecture is commonly used in mainframe computing environments and enterprise-level data centers.
CENTRALIZED NETWORK ARCHITECTURE
58
In this setup, client devices, such as computers or terminals, rely on the central server for data processing, application execution, and resource management.
CENTRALIZED NETWORK ARCHITECTURE
59
One of the key advantages of _____________ is that it allows for simplified management, as all data and applications are stored in one location, making it easier to enforce security policies and updates.
CENTRALIZED NETWORK ARCHITECTURE
59
a major drawback is the ______________ —if the central server experiences downtime, the entire network can become inoperable.
single point of failure
60
_____________ can become bottlenecked as demand increases, leading to potential performance degradation if the server is not adequately scaled.
CENTRALIZED NETWORKS
61
disperses computing power and resources across multiple devices or nodes, rather than relying on a single central server
DISTRIBUTED NETWORK ARCHITECTURE
62
This architecture is commonly used in cloud computing, microservices, and content delivery networks (CDNs), where tasks and services are spread across multiple locations to enhance performance and reliability.
DISTRIBUTED NETWORK ARCHITECTURE
63
The biggest advantage of a distributed architecture is _________ —since there is no single point of failure, the network can continue functioning even if individual nodes go offline
fault tolerance
64
also offer better scalability, as additional resources can be added dynamically without affecting overall performance. However, they can be more complex to manage, requiring sophisticated coordination mechanisms to ensure consistency and security across all nodes.
DISTRIBUTED NETWORK ARCHITECTURE
65
is a widely used model in which client devices request services from a central server.
CLIENT-SERVER NETWORK ARCHITECTURE
66
This model is the foundation of web applications, email services, and enterprise networks, where servers host applications, databases, and processing power, while client devices access these resources remotely.
CLIENT-SERVER NETWORK ARCHITECTURE
67
The primary advantage of a ___________ is efficient resource management, as processing is handled by powerful servers, reducing the computational burden on client devices.
CLIENT-SERVER NETWORK ARCHITECTURE
68
Additionally, security policies can be centralized, making it easier to enforce authentication and data protection measures.
CLIENT-SERVER NETWORK ARCHITECTURE
69
similar to centralized architectures, ______________ can suffer from server overload, leading to potential performance bottlenecks during high traffic periods.
CLIENT-SERVER NETWORK ARCHITECTURE
70
enables direct communication between devices without requiring a central server.
PEER TO PEER NETWORK ARCHITECTURE
71
acts as both a client and a server, sharing files, processing power, and other resources. This architecture is widely used in file-sharing applications, blockchain technology, and decentralized systems.
PEER TO PEER NETWORK ARCHITECTURE
72
The main advantage of ____________ is that they reduce dependency on central servers, making them more resilient against failures and censorship. They also offer scalability, as more peers can join the network and contribute resources
PEER TO PEER NETWORK ARCHITECTURE
73
often have weaker security controls, as they lack a centralized authority to enforce access policies and prevent malicious activity. Additionally, performance can be inconsistent, as data retrieval speeds depend on the availability and connectivity of other peers in the network.
PEER TO PEER NETWORK ARCHITECTURE