Telecommunications - Domain 2 Flashcards
(126 cards)
What are the 7 layers of the OSI model and give an example:
Top Application - HTTP, Presentation - JPEG, Session - Appletalk, Transport - TCP/UDP, Network - IP/IPX (router), Data - Ethernet (switch) and Physical - Ethernet (hub) Bottom
Purpose of the OSI Model
- Increase interoperability between vendor products. 2. Clarify network services functionality and communications processes. 3. Modular approach so that component can be modified without affecting others.
Data Encapsulation - OSI Model
Each layer adds its own information to the data as it travels down the layers.
Physical Layer - OSI Model
- Specifies how signals are transmitted on the network. 2. Interface to media. 3. Responsible for encoding scheme - Manchester Encoding.
Data Link Layer - OSI Model
- Sender breaks data into frames. 2. Formats for proper technology - Token Ring, Ethernet, and ATM. 3. Media Access. 4. Media access methods a. CSMA/CD ethernet 802.3 b. Collision/Contention based c. Token Passing 802.5 Token Ring FDDI d. 802.11 Wireless e. 802.12 Polling 5. Synchronization and Error Control
Network Layer - OSI Model (Routing)
- Routes data between systems or different networks. 2. Confidentiality, authentication, and integrity can be provided at this layer. 3. Select route for packets to take. 4. Fragmentation for dissimilar frame sizes.
Transport Layer - OSI Model
- End to end packet xfer use connection-oriented or connection services. 2. Buffering of data until all is sent or receiving system can process. 3. Error control and recovery if necessary. 4. Use of ports to communicate with higher level protocols. 5. Segmenting packets for processing by the network layer. 6. Packet sequencing.
Session Layer - OSI Model - diagram
- Sets up communication with destination. 2. Maintenance of connection. 3. SQL, NFS, and RPC
Session Layer - OSI Model
- Allows applications to organize and synchronize how they will transfer data. 2. Exception reporting. 3. Session setup, maintenance, session tear down. 4. Provides recovery services if required. 5. Full-duplex: two way conversations at the same time. 6. Half-duplex - only on node can speak at a time.
Presentation Layer - OSI Model - diagram
- Translates message into standard presentations. 2. Formatting and encoding. 3. File level encryption. 4. File level compression.
Presentation Layer - OSI Model
- Specifies or negotiates how data is represented in binary when exchanged by applications. 2. Encoding (ASCII or EBCDIC). 3. Formatting (TIFF, GIF, JPEG).
Application Layer - OSI Model
- Functionality. 2. Services and protocols-FTP, Email, Access Control Services, Gateways, File Management, Web Browser, non-repudiation.
OSI Model - Acronym
APSTNDP All people seem to need delicious pizza.
OSI Model - PROTOCOLS - Application Layer
FTP TFTP BOOTP SNMP RLOGIN SMTP MIME FINGER TELNET NCP APPC AFP SMB HTTP
OSI Model - PROTOCOLS - Presentation Layer
ASCII TIFF GIF JPEG MPEG MIDI
OSI Model - PROTOCOLS - Session Layer
DNS NETBIOS NFS RPC SQL
OSI Model - PROTOCOLS - Transport Layer
TCP UDP SPX SSL TLS
OSI Model - PROTOCOLS - Network Layer
IP ICMP RIP IGMP IPX
OSI Model - PROTOCOLS - Data Layer
SLIP PPP ARP RARP L2F L2TP ETHERNET TOKEN RING X.25 FRAME RELAY ATM
OSI Model - PROTOCOLS - Physical Layer
HSSI X.21 EIA/TIA-232 EIA/TIA-449 SONET
Protocols - what are they?
- Rules used to allow two or more computers to send and receive data. 2. Allow different operating systems and applications to communicate. 3. Different protocols have different functionalities and goals. 4. Different network models specify services carried out by protocols. 5. Protocol stack means modules of functionality at different layers.
TCP/IP - Protocol of the Internet
- Transmission Control Protocol/Internet Protocol. 2. Suite of protocols that govern how data is transmitted. 3. Port numbers track different conversations-20 and 21 (FTP), 25 (SMTP), 161 (SNMP), 80 (HTTP), and 23 (TELNET). 4. Source port numbers are dynamic. 5. Destination values are usually under 1024.
TCP vs UDP
- TCP -Connection oriented, Reliable, and provides flow control. 2. UDP - connectionless, non-reliable, no handshake is performed, and it is best effort protocol.
IPv4 addressing
- 32 bits (4 bytes long) 2. uniquely identify a particular network interface 3. contains two parts-network ID and locally administered bits.