1.1 Explain concepts related to the Open Systems Interconnection (OSI) reference model. Flashcards

1
Q

What are the primary functions of the Physical layer in the OSI model, and how does it handle data transmission?

A

The Physical layer handles the transmission of raw bit streams over a physical medium. It includes hardware like cables, hubs, NICs, switches (port level), transceivers, modems, wap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can you describe the types of hardware associated with the Physical layer and their roles in network communication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do different transmission media (e.g., copper cables, fiber optics, wireless) impact the performance and reliability of the Physical layer?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the Data Link layer ensure error-free data transmission between nodes, and what mechanisms are used for error detection and correction?

A

The Data Link layer of the OSI model ensures error-free data transmission between nodes using several key mechanisms for error detection and correction. Here’s how it works:

  • Parity Check: A simple mechanism where an extra bit (parity bit) is added to the data to make the number of set bits either even (even parity) or odd (odd parity). It helps detect single-bit errors.
  • Cyclic Redundancy Check (CRC): A more robust method where a sequence of redundant bits (CRC codes) is appended to the data frame. The sender calculates the CRC value based on the data and sends it along. The receiver recalculates the CRC value upon receiving the data. If the calculated CRC value matches the received CRC value, the data is considered error-free.
  • Checksum: This method involves adding the binary values of the data segments, with the sum being sent along with the data. The receiver performs the same addition and compares the checksum. Any mismatch indicates an error.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the differences between MAC (Media Access Control) and LLC (Logical Link Control) sublayers within the Data Link layer?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can you explain the role of protocols such as Ethernet and Wi-Fi at the Data Link layer, and how they manage data framing and addressing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of the Network layer in routing and addressing, and how does it facilitate data transfer across different networks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do protocols like IP (Internet Protocol) and ICMP (Internet Control Message Protocol) operate at the Network layer?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can you discuss the concept of subnetting and its importance in network design and management?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main responsibilities of the Transport layer, and how does it ensure reliable data transfer between end systems?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) differ in terms of connection establishment, reliability, and use cases?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can you explain the process of flow control and congestion control at the Transport layer, and why they are important?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the Session layer manage sessions between applications, and what are the key functions it performs?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can you provide examples of session management protocols and their use cases in real-world applications?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the Session layer handle session establishment, maintenance, and termination?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of the Presentation layer in data translation, encryption, and compression, and how does it interact with the Application layer?

A
17
Q

Can you explain the importance of data encoding and decoding at the Presentation layer, and provide examples of common encoding schemes?

A
18
Q

How do protocols like SSL/TLS (Secure Sockets Layer/Transport Layer Security) ensure secure data transmission at the Presentation layer?

A

Encryption: SSL/TLS encrypts the data being transmitted between the client and server, ensuring that any intercepted data cannot be read by unauthorized parties. This encryption uses symmetric cryptography for the actual data transfer and asymmetric cryptography for the initial key exchange.

Authentication: SSL/TLS uses digital certificates to authenticate the identity of the server (and optionally the client). This ensures that the client is communicating with the intended server and not an imposter, preventing man-in-the-middle attacks.

Data Integrity: SSL/TLS ensures data integrity by using message authentication codes (MACs). These codes verify that the data has not been altered during transmission, ensuring that the received data is exactly what was sent.

19
Q

What services are provided by the Application layer, and how does it facilitate communication between software applications and the network?

A

Directory Services: These services provide access to distributed database sources, which contain information about various network resources and users.
Mail Services: The Application layer provides email services.
File Transfer, Access, and Management (FTAM): This service enables users to access and manage files on a remote host.
Network Virtual Terminal: This service allows a user to log on to a remote host

20
Q

Can you discuss the role of protocols such as HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), and SMTP (Simple Mail Transfer Protocol) at the Application layer?

A

These protocols enable essential functions like web browsing, file sharing, and email communication at the Application layer.

21
Q

How does the Application layer handle user authentication, data integrity, and privacy in network communication?

A

User Authentication: Verifies user identity using methods like passwords or multi-factor authentication.
Data Integrity: Ensures data hasn’t been altered using checksums and digital signatures.
Privacy: Encrypts data to protect it from unauthorized access.