OSI Model Flashcards

1
Q

Translation

A

Presentation Layer explained - Presentation layer receives data from Application layer in raw form of character and numbers. So it translates the data in the format that a machine can understand (which is binary).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption & Decryption

A

Presentation Layer explained - If two devices are communicating over an encrypted connection, then presentation layer encrypts the data on the sender before it is transmitted to the receiver. When data arrives at the receiving end, it decrypts the data back to its original form. Presentation layer provides the data security. If someone intercept (прихващам) the data when two devices are communicating, then data will not be visible in its original form. It will be encrypted. Data only gets decrypted at the destination Presentation layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Compression (it uses compress algorithms)

A

Presentation Layer explained - It compresses the data by reducing the number of bits that need to be transmitted. File compression allows the data transmission to be faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creating & Terminating sessions

A

Session layer explained - It creates and manages sessions. Each session means the time when communication or connection started and ended. It handles opening and closing off communication between 2 devices. It makes sure that session remains open for long enough to transfer all the data. After transferring everything it terminates the session. Session layer only creates new session after a successful authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Session layer explained - Authentication basically verifies whether an authorized person is accessing or trying to access the system. Authentication is mostly performed by the server. For example when you log in your Amazon account. Termination of session will be when you log out of your Amazon’s account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

Session layer explained - Authorization means things that you can and cannot access or use after successful authentication. For example when you are logged in your Amazon account you can browse and purchase items, this is your authority that Amazon has given you. But you cannot change the price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Checkpoints

A

Session layer explained - It keeps the track of data that has been transferred or downloaded. Let’s say you are downloading a 20 megabyte file from internet. Then Session layer could set a checkpoint after downloading 5 megabytes. It will create 4 checkpoints of five megabytes in our case. Number varies from application to application. Each application set their checkpoint by their requirements. In the case of disconnection after downloading, let’s say 12 megabytes, when you start downloading again, downloading will start from the last checkpoint, which in our case is 10. So checkpoints help the Session layer to keep track of what has been transferred or downloaded. Real life examples of download managers are IDM or FDM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why first 3 layers are called Software layers | PDU (Protocol Data Unit)

A

The first 3 layers are called upper or software layers. The reason why is because functions of first three layers are implemented (изпълнява) by software’s network application (мрежово приложение на софтуера) such as web browser, Outlook or Zoom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Segmentation

A

Transport layer explained - Data is divided into smaller parts at the Transport Layer, called segments. That’s why data unit is called segment (look the last picture).

How segments are created?
Transport Layer receives data from Session Layer in the raw form of binaries, zeroes and ones. Transport layer takes the bits, and then convert bits into bytes are put or grouped into segments. Transport Layer deals with data in the form of bytes. Each segment is a collection of certain number of bytes. After putting bytes in the segment, TCP assigns a unique sequence number to each byte in the segment. Sequence numbers help reassemble data in the correct order, even if segments reach out of order at the destination.
In simple words, transport layer takes the data or a file > breaks it into many segments > through IP protocol, each segment is sent separately to receiver in the form of packet > at the destination segments are reassembled with the help of sequence numbers to form the correct file or message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Process to Process Delivery

A

Transport layer explained - After creating the segment the very next thing Transport Layer does is that, it adds the source and destination port number to each segment. Transport Layer, add two port numbers to each segment – source and destination. Source port number includes the port number of sender’s machine and destination number contains the port number of destination’s machine.

Port numbers help in directing or forwarding data to the correct process (a computer runs many processes simultaneously like sending an email, make a VoIP video or audio call and browse at the same time (all of this from different applications)) or application. Port numbers uniquely identifies each process that is running in a computer. A computer identifies each service or a process by a port number. Each process has a unique number assign to it. For example, port 80 handles the web pages or actually http request. Port 587 handles the secure emailed. Port 21 manages the file transfer.

Let’s say you send an email to your friend. When email reaches at your friend’s device than how the receiving device knows that where or to which process the email should be delivered? Receiver’s device is also running multiple processes. The Transport Layer takes the data segment and checks the destination port number in the segment. Then it forwards data to the specified port number. Transport Layer requires port number to correctly deliver the data segment to the correct process or application. This is also called Port to Port Delivery or End to end data delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Flow control

A

Transport layer explained - Flow control decides the amount of data that needs to be transmitted. Transport Layer makes sure that sender does not send more data than a receiver can handle or process. For example you want to download a file from the internet. The server where you are downloading files from can transfer data at 200 Mbps speed, but your device has slow internet connection and it only accepts or processes data at 1 Mbps speed. If the server starts sending data at 100 Mbps rate, which is greater than what your device can handle, so obviously data is lost.
How flow control fix this problem?
So before receiving data, receiver informs sender about its receiving capacity. Then sender sends the data according to the rate that receiver advertised. Flow control is managed through window size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Error control

A

Transport layer explained - Transport layer takes care of errors in the data. If data is corrupted (повреден) or does not reach to the destination, then it uses automatic rebate request method (автоматичен метод за заявка за отстъпка) to retransmit to the lost or corrupted data. Transport layer adds checksum (A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect high-level errors within data transmissions. [Контролни суми]) to make sure that added free data is delivered to their destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Reliable & Unreliable Data Delivery
A

Transport layer explained - Reliable Data Delivery
Transport Layer provides both reliable and unreliable data delivery, depending of the application. We have two major protocols at the Transport Layer- TCP and UDP (also SCTP but UDP and TCP are the most used and dominant). Most applications need the guaranteed data delivery, but there are some applications that necessarily do not prioritize the guaranteed data delivery. Lost packets do not need to be retransmitted there. Transport Layer uses either TCP or UDP protocol for process to process data delivery, depending on the application. For example, Transport Layer uses TCP protocol, where data is a must. Service like sending email use TCP. Emails need the guaranteed data delivery rate. Anything you download from internet uses TCP. So TCP is a reliable protocol. TCP is a connection oriented protocol because in order to guarantee the data delivery, TCP establishes a connection between the sender and receiver before exchanging the data. It makes sure that a receiver is ready and willing to exchange the data. TCP uses a method called acknowledgement to guarantee a data delivery. When data is send through TCP, it waits for an acknowledgement from receiver whether their data has been received or not by the receiver. TCP retransmit the lost and corrupted data.

Unreliable Data Delivery
Transport Layer uses UDP protocol, where the guaranteed data delivery is not priority. Examples of application which don’t care about reliability are live streaming, VoIP audio or video calling. Let’s take an example of live streaming. If you are watching a live stream and your internet connection stops or disconnects for a few seconds and when you join back the live streaming, live streaming application will not resume where you left when you lost the connection. It will only show you what’s streaming at the moment. Lost packets will not be retransmitted here. UDP keeps sending the data. It doesn’t matter whether data reaches to destination or not. UDP is a connection, less protocol. That means it does not establish a connection with receiver like TCP does. UDP does not have any mechanism such as acknowledgement to check whether data has been received or not. It simply keeps sending the data, that makes it faster than TCP. Sites of UDP packet is also smaller than TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Host to host delivery or Source to Destination Delivery

A

Network layer explained - Host to host delivery simply means delivering data from sender to receiver. In the Transport Layer we have process to process delivery. Process to process delivery only happens when data reaches at the destination, and network layer does that. It delivers data to the receiver, than passes data to the Transport Layer and Transport Layer forwards data to the correct process. At the receiving end data moves bottom to up, so Transport Layer is above Network Layer. Network Layer delivers data to Destination and Transport Layer delivers data to the correct process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Logical Addressing

A

Network layer explained - Logical Addressing is the process of adding IP address of sender and receiver to the data segments. Network layer adds two IP addresses to form the received (from transport layer) packets. IP address basically locate where each device is. Each device that uses internet has unique IP address. IP addresses are added to data so packets can reach correct destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Routing

A

Network layer explained - Routing is very important function of Network Layer. Routing decides the best route or path that packets have to take to reach to destination.
Internet is basically a huge collection of different individual networks. Networks are interconnected (взаимосвързани). They communicate with each other to deliver data to correct destination. Remember, networks communicate with each other through routers, because routers connect the different networks. Each network has a device called router. Internet is basically a huge network of interconnected routers. Routers communicate with each other through direct or forward data packets to the correct destination. Packets have to travel through several routers to reach its destination.
Let’s take an example. Let’s say two devices want to communicate. User 1 is sitting in India and user 2 is sitting in a different network in United States. It doesn’t travel direct. A device can be connected to a server or another device on the internet in number of ways. Here in our example, routing has selected three routers that data needs to go through to reach the destination. The routers that data packets go through to reach the destination are also called nodes or hops. Network Layer uses different protocols to select the path such as OSPF (Open Shortest Path First), BGP (Border Gateway Protocol) and IS (Intermediate System).

17
Q

Fragmentation

A

Network layer explained - Fragmentation simply means simply means breaking a packet into smaller pieces or fragments. Why packets need to be fragmented? A single packet can carry maximum 1500 bytes. This is the standard for now. We have a new technology called Jumbo Frames that can carry 9000 bytes in a single packet! But jumbo Frames are mostly used by data centers for now, they are not common at all. This is also called MTU (Maximum Transmission Unit) – the total data that can be transmitted or sent in a single packet. Each network has its MTU. Let’s say a sender sends a packet of twelve hundred bytes to the receiver, but a receiver has a MTU of 600 in a single packet. In this case, a receiver will not be able to handle or accept packet of 1 200 bytes. Now the sender needs to find a way to cut down packet size to meet the receivers MTU. So to prevent this problem, Network Layer uses fragmentation. Fragmented packets are sent to the destination and reassembled (сглобен отново) at the receiver and to form the original packet.

18
Q

Protocols at the network layer

A

ICMP
IPsec
ICMP EIGRP
DDP OSPF
PIM
RIP
IPX
The most important protocol at the Network Layer is IP (internet protocol v4/v6). Network Layer adds IP header to each data segment that it’s received from Transport Layer to form the packets. IP header have information that we have discussed like src and dst IP address, routing, fragmentation, TTL (The Time-to-Live (TTL) is an 8-bit binary value that indicates the remaining “life” of the packet. The TTL value is decreased by at least one each time the packet is processed by a router ). So at the Network Layer we have two headers and data. TCP or UDP header is added by Transport Layer and IP header that Network Layer adds.

19
Q

Devices at the Network Layer

A

Network layer explained - Router is present in the network layer. It’s the most important device.

20
Q

Node to node data delivery

A

Data Link Layer explained - Node to Node delivery means Data Link layer delivers data from one node to another. The routers which are used for choosing path for delivering the data are called Nodes or Hops. The job of Data Link layer is to deliver data node to node or the next node that is on the way of destination. It takes care of the next node where it needs to forward or deliver the data. It resends it one by one until it reaches its dest. This is the main function of Data Link Layer. Do not confuse Node to Node delivery with Host to Host delivery. The Network Layer takes care of data delivery from sender to receiver. Network Layer directly talks to the receiver whereas (като има в преевдвид, че) Data Link Layer takes care of nodes.

21
Q

Flow control

A

Data Link Layer explained - It’s the same of what we’ve learned in the Transport Layer. The difference is that Transport Layer controls the data flow directly between sender and receiver. Transport Layer takes care of destination. How much data the receiver can handle or receive. Flow control in the Data Link Layer means Data Link layer checks the size and speed, or reads how much data the next node can handle where it needs to send the data accordingly. Data Link layer control the data flow amongst the nodes. Data Link layer makes sure that sender doesn’t send more data than the receiving node can handle. Data Link layer uses different algorithms for flow control:
- Stop and Wait
- Go back N
- Selective Repeat

22
Q

Error control

A

Data Link Layer explained - In Data Link Layer error control means detecting and correcting data frames that have been either corrupted or lost during the transmission. Data Link Layer checks for errors in each node. Errors can be of 3 types:
- Can be a single bit is missing; this is called single bit error.
- Burst (избухване, срив) error: when more than one consecutive (sequacious последователен) bits are corrupted or missing.
- Multiple bits error: when more than one bits are corrupted or missing
Again we have error control at Transport Layer but there is src to dst unlike (за разлика от) Data Link Layer which checks every node for errors or hop. Data Link Layer uses different techniques to detect errors like:
- Parity check
- Checksum
- CRC (Cyclic Redundancy (излишък/претрупаност) Check – проверка на цикличността )

23
Q

Physical addressing

A

Data Link Layer explained -Physical addressing is the process of assigning MAC addresses. Data Link Layer assigns MAC addresses of sender and receiver to the packet to form the frames. MAC addresses is a unique dual (двоен) alphanumeric number, which is embedded (вграден) in the network (мрежова) card of a computer. It cannot be changed. If two devices on the same network wants to communicate to each other, then it can be achieved with MAC address. You don’t need Network Layer here. Communication or data transferring on the same network can be achieved with Data Link Layer.

Data or data unit at the Data Link Layer is called frame. Data Link Layer receives packets from the Network layer in the form of packets and converts them into frames. Data Link Layer properly formats data before it is send to the physical layer – that’s called framing. Like Transport and Network Layer, Data Link Layer also adds its own information. Data Link Layer adds header and trailer to each packet that it receives from the Network Layer to form the frame. Each frame contain frame header, frame body and frame trailer.

  • Header – incudes a MAC address of src and dst. Frame header also includes flow control.
  • Data / Payload – Frame body contain the data or payload to be delivered to the destination. Payload for frame is the packet that is received from network Layer.
  • Trailer – Trailer is added in the end of each frame. It includes error detection code.
24
Q

Media Access Control

A

Data Link Layer explained - Data Link Layer is divided into two sub layers:
1. LLC (Logical Link Control) – It handles protocols, synchronization flow control and error checking etc.

  1. Media Access Control – It handles the data collision. Let’s say there are fewer devices connected to a network though a shared medium or central cable. Connected devices send and receive data through the shared cable. Things become problematic when multiple devices send data at the same time. In such scenario, data collision will happen, and if there is collision, then it causes data loss. So in order to send data, each connected device has to access or use the cable when no other connected device is using it or sending data. Here, Data Link Layer manages the Media Access Control. It avoids the data collision. It makes sure that devices do not interfere (меся се, преча, бъркам се) with data from other computers.

CSMA/CD (Carrier-sense multiple access with collision detection) - The technology used for avoiding data collision

25
Q

Devices & Protocols at the Data Link Layer

A
  • Devices - Switch, Bridge, NIC (Networks interface card)
  • Protocols - Link Access Procedure (LAP)
    Link Control Protocol (LCP)
    Network Control Protocol (NCP)
    Ethernet, Frame Relay,
    Point to point Protocol (PPP)
    High-Level Data Link Protocol (HDlC)
    Synchronous Data Link Protocol (SDLP)
26
Q

How Physical Layer works?

A

Physical Layer receives data from Data Link layer in the form of binaries – zeroes and ones. This is the digital data. It cannot be send over transmission mediums such as cables or radio waves, etc. First, it has to be converted into the appropriate signals. So Physical Layer converts data or binary sequence into the appropriate signals. It depends on the media that you are using to connect or access the internet. If you are connected to the network through:

  • WI-FI – then digital data or a binary sequence is converted into radio signals.
  • Ethernet cable – data is converted into electrical signals. After converting data into signals, then Physical Layer transmits data over physical mediums from one node to next or two connected nodes that data has to go through to reach the destination.
27
Q

What is Physical Layer

A

Physical Layer - Physical Layer is first layer from the bottom. It is responsible for physically receiving and transmitting data over physical mediums. Physical Layer interacts with hardware that is involved in the data transmission, such as cables or optical wires etc. Before transmitting data, the Physical Layer generates the signals based on the medium that you are using to access the internet.

28
Q

Protocols & devices at the Physical Layer

A
  • Protocols - DSL; ISDN; Etherloop; Frame; Relay
  • Devices Hubs; Cables; Wireless access point; Modem