OSI Model Flashcards

1
Q

OSI mOdel Overview

A

Developed in 1977 by International Organization for Standardization (ISO)
▪ Called the OSI model or OSI stack
▪ Consists of 7 layers
▪ Useful in troubleshooting networks
▪ Serves as a reference model in networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purposes of Reference Model

A

Categorize functions of the network into particular layer(s)
▪ Compare technologies across different manufacturers
▪ By understanding its functions, you can understand how best
to communicate with that device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Model Layers

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Types in OSI Model

A
  1. Application —————- Data
  2. Presentation—————-Data
  3. Session————————Data
  4. Transport———Segments
  5. Network————–Packets
  6. Data Link—————Frames
  7. Physical—————Bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 1 (Physical)

A

Transmission of bits across the network
▪ Physical and electrical characteristics
▪ Characteristics:
● How bits are represented on the medium
● Wiring standards for connectors and jacks
● Physical topology
● Synchronizing bits
● Bandwidth usage
● Multiplexing strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 1 Examples

A

Cables
● Ethernet
● Fiber optic
▪ Radio frequencies
● Wi-Fi
● Bluetooth
▪ Infrastructure devices
● Hubs
● Wireless Access Points
● Media Converters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 2 (Data link)

A

▪ Packages data into frames and transmitting those frames on the network,
performing error detection/correction, and uniquely identifying network
devices with an address (MAC), and flow control
● MAC
● Physical addressing
● Logical topology
● Method of Transmission
● Link Layer Control (LLC)
o Connection services
o Synchronizing transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 2 Examples

A

Network Interface Cards (NIC)
▪ Bridges
▪ Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 3 (Network)

A

Forwards traffic (routing) with logical address
● Example: IP Address (IPv4 or IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Link Control (LLC)

A

Provides connection services
▪ Acknowledgement of receipt of a message
▪ Flow control
● Limits amount of data sender can send at one time to keep
receiver from becoming overwhelmed
▪ Error control
● Allows receiver to let sender know when an expected data frame
wasn’t received or was corrupted by using a checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical Address

A

Numerous routed protocols were used for logical addressing over the
years:
● AppleTalk
● Internetwork Packet Exchange (IPX)
● Internet Protocol (IP)
▪ Only Internet Protocol (IP) remains dominant
● IP v4
● IP v6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How should data be forwarded or routed? Layer 3

A

Packet switching (known as routing)
● Data is divided into packets and forwarded
▪ Circuit switching
● Dedicated communication link is established between two devices
▪ Message switching
● Data is divided into messages, similar to packet sw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICMP (Layer 3)

A

Used to send error messages and operational information about an IP
destination
▪ Not regularly used by end-user applications
▪ Used in troubleshooting (ping and traceroute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 3 Examples

A

▪ Routers
▪ Multilayer switches
▪ IPv4 protocol
▪ IPv6 protocol
▪ Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 4 (Transport Layer)

A

▪ Dividing line between upper and lower layers of the OSI model
▪ Data is sent as segments
▪ TCP/UDP
▪ Windowing
▪ Buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP (LAYER 4)

A

▪ Connection-oriented protocol
▪ Reliable transport of segments
● If segment is dropped, protocol detects it and resends segment
▪ Acknowledgements received for successful communications
▪ Used for all network data that needs to be assured to get to its
destination

17
Q

Layer 4 Examples

A

▪ TCP
▪ UDP
▪ WAN Accelerators
▪ Load Balancers
▪ Firewalls

18
Q

Layer 5( Session)

A

▪ Think of a session as a conversation that must be kept separate from
others to prevent intermingling of the data
▪ Setting up sessions
▪ Maintaining sessions

19
Q

Layer 5 Examples

A

H.323
● Used to setup, maintain, and tear down a voice/video connection
▪ NetBIOS
● Used by computers to share files over a network

20
Q

Layer 6 (Presentation)

A

▪ Responsible for formatting the data exchanged and securing that data
with proper encryption
▪ Functions
▪ Data formatting
▪ Encryption

21
Q

Layer 6 Examples

A

HTML, XML, PHP, JavaScript, …
▪ ASCII, EBCDIC, UNICODE, …
▪ GIF, JPG, TIF, SVG, PNG, …
▪ MPG, MOV, …
▪ TLS, SSL, …

22
Q

Layer 7 (Application)

A

Provides application-level services
● Not Microsoft Word or Notepad
▪ Layer where the users communicate with the computer
▪ Functions:
● Application services
● Service advertisement

23
Q

Layer 7 Examples

A

E-mail (POP3, IMAP, SMTP)
▪ Web Browsing (HTTP, HTTPS)
▪ Domain Name Service (DNS)
▪ File Transfer Protocol (FTP, FTPS)
▪ Remote Access (TELNET, SSH)
▪ Simple Network Management Protocol (SNMP)

24
Q

Encapsulation

A

The process of putting headers (and sometimes trailers) around some data

25
Decapsulation
o Action of removing the encapsulation that was applied o If we move down the OSI layers from 7 to 1, we encapsulate data o If we move upward from layers 1 to 7, we decapsulate data o A protocol data unit is a single unit of information transmitted within a computer network ▪ Layer 1 - bits ▪ Layer 2 - frames ▪ Layer 3 - packets ▪ Layer 4 - segments if TCP or datagrams if UDP
26
SYN (Synchronization flag)
▪ The most well-known flag in TCP communications because it is used to synchronize the connection during the three-way handshake
27
ACK (acknowledge flag)
Used during the three-way handshake, but it is also used to acknowledge the successful receipt of packets
28
FIN (Finished flag)
▪ Used to tear down the virtual connections created using the three-way handshake and the SYN flag ▪ The FIN flag always appears when the last packets are exchanged between a client and server and the host is ready to shutdown the connection
29
RST (reset flag)
Used when a client or server receives a packet that it was not expecting during the current connection
30
PSH (push flag)
▪ Used to ensure that the data is given priority and is processed at the sending or receiving ends
31
URG (urgent flag)
▪ It is like the Push flag and identifies incoming data as “urgent” ▪ The main difference is PSH is used by a sender to indicate data with a higher priority level where URG is sent to tell the recipient to process it immediately and ignore anything else in queue ● Source and Destination ports o are just like the ones used in UDP, they dictate where the data is coming from and where it is going to ● Length o Used to indicate how many bytes the UDP packet is, including its header and its data ● Checksum o Not a mandatory field, but it can be used to provide some validation that the UDP data being sent was received with some level of integrity
32
EtherType field
Used to indicate which protocol is encapsulated in the payload of the frame ▪ As data moves from layer 7 to layer 1, that data is encapsulated ● At layer 4, we add our source and destination ports ● At layer 3, we add our source and destination IP addresses ● At layer 2, we add our source and destination MAC addresses ▪ Once we get to layer 1, we are simply transmitting our layer 2 frames as a series of 1’s and 0’s over the medium ▪ Once that host is found, it will keep decapsulating the information all the way up to layer 7, where its application can read and understand the underlying data
33