Video Content Lesson 7 Flashcards

2
Q

OSI Reference Model

A
Protocols
Standards Organizations
OSI Overview
Logical Data Flow
Physical Data Flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocols

A

Computers need formal rules to communicate
Protocol - Formal set of rules that govern communication
Proprietary protocols only allow communication with similar machines (originally)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Standards Organizations

A

ISO - International Organization for Standardization (basic communication protocols)
IEEE - Institute of Electrical and Electronics Engineers (low level physical standards)
NSA - National Security Agency (Different levels for security being maintained)
NIST - National Institute for Standards and Technology
ANSI - American National Standards Institute (character sets)
CCITT - International Telegram and Telephone Consultative Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Overview

A
OSI Open Systems Interconnection reference model
Developed by ISO (also known as ISO/OSI)
Open network architectural guide 
Specifies how dissimilar systems can communicate
7 distinct protocol layers
Application
Presentation
Session
Transport
Network
Data-link
Physical
This standard allows developers to write software that works on many dissimilar machines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logical Data Flow

A

Flows from one layer on source machine to same layer on target machine (don’t have to worry about what happens in stack below us)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical Data Flow

A

Physically have to go down through every layer below, across medium, and back up each layer to the original layer)
Each Layer adds header and trailer to message (chunked into packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Layers

A
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data-link Layer
Physical Layer
TCP-IP Model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Layer

A

Provides services for high-level program (it is NOT the application)
HTTP, FTP, SMTP, EDI, POP3, IMAP, SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Presentation Layer

A

Provides data representation between systems
GIF, JPEG, MPEG
Responsible for encryption and compression (decryption and decompression)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Session Layer

A

Manages sessions and synchronizes data flow

NFS, SSL, RPC, Xwindows, AppleTalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transport Layer

A

Responsible for end-to-end transmission integrity
Provides a logical connection between machines
Ensures message delivery
TCP, UDP, SPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Layer

A

Determines the best way to get data to the destination
Providing Routing Capabilitites
IP, ICMP, IPX, RIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data-link Layer

A

Handles data packet transfer
Handles physical addressing, error handling, and flow control
SLIP, PPP, ARP, RARP, FDDI, ISDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical Layer

A

Transmits the bit stream onto the physical media

Can use transmission mechanism that is wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP-IP Model

A
Developed by the DOD
Simplified medel containing 4 layers
Application Layer
Transport Layer
Network Layer
Link Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Layer

A

All issues specific to a session or application

OSI layers 5, 6, and 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Transport Layer

A

Supports moving data between applications
OSI layer 4
Corresponds (supported by) to TCP and UDP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Layer

A

Supports moving data between netowrks
OSI layer 3
Corresponds to IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Link Layer

A

Provides physical communication and routing

Encapsulates 2 layers (physical layer 1 and data-link layer 2)

21
Q

Media-LAN Topologies

A
Twisted Pair
Coaxial
Fiber Optics
Wireless Technologies
Star Topology
Bus Topology
Ring Topology
Tree Topology
Mesh Topology
22
Q

Twisted Pair

A

Regular copper wire with each pair twisted around each other
UTP -Unshielded Twisted Pair
STP - Shielded Twisted Pair
Least expensive media

23
Q

Coaxial

A

Same media used for cable TV (copper cable core, insulator, wire mesh transmits data)
more expensive and harder to install

24
Q

Fiber Optics

A

Any transmission of light waves along glass or plastic wires
More expensive and costly to terminate
Not effected by EMI Electromagnetic interference

25
Q

Wireless Technologies

A

DSSS Direct-Sequence Spread Spectrum (transmission spread over large frequency band, reduces interference percentage)
FHSS Frequency-Hopping Spread Spectrum (Uses rapidly changing frequencies, reduces overall interferences)
OFDM Orthogonal Frequency Division Multiplexing (signal is subdivided into sub-bands, sub-bands can be transmitted together)
FDMA Frequency Division Multiple Access (analog-only sub-bands)
TDMA Time Division Multiple Access (can carry multiple conversations on each sub-band, each conversation gets a time slice)
CDMA Code Division Multiple Access (Spread spectrum like DSS, CDMA 2000 (tranmission rates up to 153.6 Mbps), Wideband CDMA (wider band that increases carrier input)
GSM Global Service for Mobile Communication (Most popular cellular technology, uses time-division multiplexing (can support up to 8 callers per simplex channel)

26
Various Topologies
Star (multiple machines connected through one) Bus (multiple machines connected through bus) Ring (multiple machines connected to its neighbor) Tree (variation of Bus Topology) Mesh (most complex of topologies)
27
Star Topology
All nodes are connected to a central device All Messages must travel through the center advantage simple, disadvantage single point of failure
28
Bus Topology
All nodes are connected to a shared media, often called the backbone or bus the messages travel the length of the bus end of bus must be terminated
29
Ring Topology
each computer is connected to its neighbor on each side messages travel from node to node until they reach their destination advantage no sigle point of failure because NIC passes message automatically if disconnected
30
Tree Topology
Variation of Bus Topology (nodes may be connected to more than one bus) multiple bus connections create the branches of the tree single point of failure only exists on the node that crosses multiple branches
31
Mesh Topology
every node is connected to every other node very complex, but highly fault tolerant partial mesh (not connected to all machines but to many so there are multiple paths)
32
LAN-WAN-Remote Access
``` Ethernet Other Access Methods Signaling Types Network Types Dial-up ISDN DSL Wireless-Cable ```
33
Ethernet
Most common LAN access method IEEE 802.3 standard uses CSMA/CD (Carrier Sense Media Access with Collision Detection) Listen first and then talk (Carrier signal is sampled off physical media, hardware listens for carrier signal (if carrier signal is heard this tells it that noone else is talking, headware sends message off wire) (listens to what is being echoed back to him, if same message then it was correctly sent otherwise retransmits) Cable standards (ThinNet-10Base2, coaxial up to 185 meters; ThickNet-10Base5, coaxial up to 500 meters; most common used is UTP-10BaseT, 100BaseT, 1000BaseT used with central hub (Star Typology))
34
Other Access Methods
ARCnet (one of earliest LAN technologies, token passed methods, have to hold token to talk, uses bus or ring typology Ring typology uses MAU Multistation Access Unit which has all end nodes connected to it FDDI Fiber Distributed Data Interface (token passing method, 100 Mbps using dual fiber-optic rings, rings operate in opposite directions, if one ring breaks, other ring is used to maintain a complete network)
35
Signaling Types
``` Baseband transmission (digital signal, entire media filled with one signal) Broadband (analog signal, Cable TV, multiple communication channels used simultaneously, tranmitted in channels on a carrier, digital data must be modulated first) ```
36
Network Types
LAN Local Area Network (Group of networked computers and devices in relatively close proximity to one another) WAN Wide area network (Network of computers and devices that spans a large geographic area) Remote access/telecommuting (method of connecting to a WAN or LAN through dial-up or high-speed access lines
37
Dial-up
POTS Plain Old Telephone Service (uses MODEM 56 Kbps, speed based on proximity to central office, condition of line, noise on the line, multiplexing, bandwidth artificially limited)
38
ISDN
Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) (Two 64-KB channels (digital, audio, video, communication) and one 16-KB channel (digital transfer) Primary Rate Interface (PRI) (23 64-KB channels and one 16-KB channel) Expensive
39
DSL
Digital Subscriber Line (higher speed connection than dial-up using existing twisted pair) inexpensive option ADSL (Asynchronous digital subscriber line) used at home because higher speed for downloads and slower speeds for uploads SDSL (Synchronous digital subscriber Line) same upload and download capability VDSL (Very-high-speed digital subscriber line) DSL Lite (doesn't require splitter used by ADSL, SDSL, and VDSL)
40
Wireless-Cable
Wireless (networking without wires) Several emerging standards (802.11a, 802.11b, 802.11g) Cable Modems (great alternative to DSL) (can be substantially faster than DSL if number of concurrent users is not excessive)
41
Remote Access Security
``` VPN PPTP IPSec Connection Security User Authentication Node Authentication ```
42
VPN
Virtual Private Network Tunnel (like envelope--encapsulation technique) often associated with secure transmissions can connect two systems or two networks offers an inexpensive secure communication using public networks
43
PPTP
Point-to-Point Tunneling Protocol Built to provide encrypted PPP tunnel After negotiation all PPP traffic is encrypted L2F Layer 2 Forwarding (developed by Cisco to provide mutual authentication tunneling) L2TP Layer 2 Tunneling Protocol (extended PPTP and L2F, supports TACACS+ and RADIUS)
44
IPSec
``` Operates as a standalone VPN protocol OR along with L2TP can provide encryption for L2TP Transport mode (payload is encrypted but header is NOT) for connecting two systems Tunnel mode (both payload and header are encrypted) for connecting two networks ```
45
Connection Security
Remote access without VPN SSH - Secure Shell (more secure than Telnet) provides a sure method to access a remote machine SSL/TLS - Secure Sockets Layer (secures communication between client and web server) (ONLY encrypts communication between client and web server not behind them)
46
User Authentication
Centralized remore user authentication 1-RADIUS Remote Authentication Dial-in User Service 2-TACACS - Terminal Access Controller Access Control System TACACS+ (adds two-factor authentication)
47
Node Authentication
Password Authentication Protocol (PAP) (this is standard authentication protocol for PPP; no encryption; user IDs and passwords passed in the clear) Challenge Handshake Authentication Protocol (CHAP) (similar to PAP; encrypts user IDs and password; operates over PPP)