Section 3: OSI Model Flashcards

1
Q

What is the Open Systems Interconnection model (OSI)?

A

A reference model for troubleshooting networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the OSI model layers from top to bottom?

A

7) Application
6) Presentation
5) Session
4) Transport
3) Network
2) Data Link
1) Physical

Please Do Not Throw Sausage Pizza Away!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the data types in the OSI model?

A
  • Application, Presentation, Session: Data
  • Transport: Segments
  • Network: Packets
  • Data Link: Frames
  • Physical: Bits

Don’t Some People Fear Birthdays?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the physical layer (Layer 1)?

A

Transmission of bits across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is considered standard wiring for RJ-45 cables and ports?

A

TIA/EIA-568-B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do crossover cables use? (List 2)

A

T-568A & T-568B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is broadband bandwidth? List an example

A

Divides bandwidth into separate channels

Cable TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is baseband bandwidth? List an example

A

Uses all available frequency on a medium (cable) to transmit data and uses a reference clock to coordinate the transmissions by both sender and receiver

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some examples of Layer 1 of the OSI Model? List at least 3

A

Ethernet, Fiber Optic, Wi-Fi, Bluetooth, WAPs, Hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the data link layer (Layer 2)?

A

Packages data into frames and transmitting those frames on the network, performing error detection/correction, and uniquely identifying network devices with an address, and flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a media access control (MAC) address?

A

A 48-bit physical address assigned to a network interface card (NIC) by manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is flow control?

A

Limits amount of data sender can send at one time to keep receiver from becoming overwhelmed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of Layer 2 of the OSI Model? List at least 3

A

NICs, Bridges, Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the network layer (Layer 3)?

A

Forwards routing traffic with logical address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two Internet Protocols (IPs)?

A

IPv4 & IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is internet control message protocol (ICMP)?

A

Used to send error messages and operational information about an IP destination

Used in troubleshooting (ping & traceroute)

17
Q

What are some example of Layer 3? List at least 3

A

Routers, Multilayer Switches, IPv4, IPv6, ICMP

18
Q

What is the transport layer (Layer 4)?

A

Connection-oriented protocol that is a reliable way to transport segments across the network

Data is sent in segments

19
Q

What is transmission control protocol (TCP)?

A

A connection-oriented protocol

A reliable transport of segments

20
Q

What is user datagram protocol (UDP)?

A

A connectionless protocol

An unreliable transport of segments

21
Q

What are some examples of Layer 4? List at least 3

A

TCP, UDP, WAN Accelerators, Firewalls, Load Balancers

22
Q

What is a session layer (Layer 5)?

A

Keeps conversations separate to prevent intermingling of the data

23
Q

What are some examples of Layer 5?

A

H.323 & NetBIOS

24
Q

What is the presentation layer (Layer 6)?

A

Formats the data exchanged and securing that data with proper encryption

25
Q

What is encryption?

A

Used to scramble the data in transit to keep it secure from prying eyes

Provides confidentiality of data

26
Q

What are some examples of Layer 6? List at least 3

A

HTML, XML, UNICODE, ASCII, GIF, JPG, TLS, SSL

27
Q

What is the application layer (Layer 7)?

A

Provides services where users communicate with the computer

28
Q

What are some examples of Layer 7? List at least 3

A

Email, Web Browsing, Remote Access, Domain Name Service, File Transfer Protocol

29
Q

What is encapsulation?

A

The process of putting headers (and sometimes trailers) around some data

Move down the OSI layers from 7 to 1, we encapsulate

30
Q

What is decapsulation?

A

Action of removing the encapsulation that was applied

Move up from layers 1 to 7, we decapsulate data

31
Q

What is the SYN (Synchronous) Flag?

A

The most well-known flag in TCP communications because it is used to synchronize the connection during the three-way handshake

32
Q

What is the ACK (Acknowledgement) flag?

A

Used during the three-way handshake, but is also used to acknowledge the successful receipt of packets

33
Q

What is the FIN (Finished) packet?

A

Used to tear down virtual connections created using the three-way handshake and the SYN flag

Appears when the last pakets are exchanged between a client and server

34
Q

What is the RST (Reset) flag?

A

Used when a client or server receives a packet that it was not expecting during the current connection

35
Q

What is a PSH (PUSH) flag?

A

Used to ensure that the data is given priority and is processed at the sending or receiving ends

36
Q

What is the URG (Urgent) flag?

A

Like the PUSH flag and identifies incoming data as “urgent”

Sent to tell the recipient to process it immediately and ignore others