1.2 Understanding the OSI Model Flashcards

1
Q

With windowing, the client adjusts ________________ amount of data sent in each segment as the number of retransmissions occur, and adjust to a ________________ amount of data sent in each segment as the number of retransmissions are eliminated.

A

lower

higher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______________ allows us to take a big chunk of data and cut it up into smaller packets and send them all out in different directions. It allows the recipient to put the packet back together, and since it is sequenced can be put back together in order.

A

Packet reordering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You should think of a _________________ as a conversation that must be kept separate from others to prevent intermingling of the data.

A

session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Packet Switching the data may take different paths from the client to the host during a session, in ______________ the data takes the same path from the client to the host during that session.

A

Circuit Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_________________ includes transfer of data across the network, reestablisment of a disconnected session, and acknoledgment of data received.

A

Maintaining a Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does OSI stand for?

A

Open Systems Interconnection Reference Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The OSI serves as the ______________ model for a network.

A

reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________________ is used in Layer 6 to scramble the data in transit to keep it secure from prying eyes, and provide confidentiality of data.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Most networks use ______________ switching because we have other methods to check if it is being sent to the other in, if not it will try other paths until the data gets there.

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 2 devices vew networks ______________.

A

logically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 4 is for segments almost exclusively, but if your using UDP you are using a ________________.

A

datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Switches, the physical devices, are layer ______________ devices.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At the _________________ layer of the OSI model we are dealing with the IP addresses, any routing decisions being made here.

A

Layer 3 - Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________________ is where applications send out announcements to other devices on the network to state the services they offer. This can also be done by Active Directory if using it.

A

Service Advertisement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

H.323 and H.264 are both used to Setup, maintain and tear-down _________________connections such as Skype or Facetime.

A

video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Another ICMP used is called _______________ which traces a route that a packet takes through the network and tell you every router along the way it goes through.

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

________________ is the data type in the transport layer.

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In layers 5, 6, and 7 data is called ______________.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ASCII, EBCDIC, and UNICODE all tell us how to get _________________ out of 1’s and 0’s.

A

text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

There aren’t really Layer 5 _________________, mostly just protocols.

A

devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_________________ involves checking of user credentials and assigning numbers to sessions to help identify them, which allows to negotiate service needed for that session and determine who begins sending data.

A

Setting up a Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The SYN/SYN-ACK/ACK messaging of TCP is called the ________________.

A

Three-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The big question being answered at layer 3 is how data should be ______________ or ______________.

A

forwarded or routed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

H.323 and H.264 both operate over the _________________ protocol.

A

RTP (Real-Time Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the 7 layers of the OSI model?

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

________________ allows the clients to adjust the amount of data sent in each segment and continually adjusts to send more or less data per segment transmitted.

A

WIndowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_________________ is basically text, and 8 bit code that tells you what letter the code represents.

A

ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The _________________ layer of the OSI model involves the signaling, cabling, connectors. (Cable, NIC, Hub)

A

Layer 1 - Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The Internet Protocol comes in two versions ______________ and ______________.

A

IPv4 and IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Hubs, WAPs and Media Converters work at layer ______________ of the OSI model.

A

Physical Layer (Layer 1) (Dumb Devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NIC’s, Bridges, Swiches, and Mac Addresses are all Layer ______________ devices.

A

Layer 2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

At the _________________ layer of the OSI model handles a lot of the communication that will be encrypted and decrypted.

A

Layer 6 - Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Our networks today work under the ______________ model.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

At the _________________ layer of the OSI model we find the control protocols, and tunneling protocols.

A

Layer 5 - Session

35
Q

________________ is kind of like certified mail, you get proof that the data is delivered in full.

A

TCP

36
Q

The _________________ layer, Layer _________________, provides application-level services and is where the users communicate with the computer.

A

Application Layer (Layer 7)

37
Q

______________ is needed to prevent the sender from sending data faster than the recipient can accept it.

A

Flow control

38
Q

Route discovery and selection is manually configured as a static route or dynamically through a ______________, which help decide which path data will take.

A

routing protocol

39
Q

Numerous routed protocols were used for logical addressing over the years but only the ______________ remains dominant.

A

Internet Protocol (IP)

40
Q

GIF, JPG, TIF SVG, and PNG all tell us how to get _________________ out of 1’s and 0’s.

A

graphics

41
Q

At the _________________ layer of the OSI model shows what we see when using the application.

A

Layer 7 - Application

42
Q

The ______________ layer packages data into frames and transmits those frames on the network, performing error detection/correction, uniquely identifying network devices with an address (MAC), and providing flow control.

A

Data Link Layer (Layer 2)

43
Q

A ________________ works like a regular layer 2 switch and a layer 3 router combined.

A

multilayer switch

44
Q

Layer 3 of the OSI model is all about ______________, and is known as the ________________ layer.

A

Routing

Network Layer

45
Q

In layer 3 data is called ______________.

A

packets

46
Q

_________________ and _________________ are level 6 encryptions algorithyms that takes the 1’s and 0’s and scrambles them up so noone else can read them.

A

TLS

SSL

47
Q

Packet Switching is known as ______________, where data is divided into packets and forwarded.

A

routing

48
Q

_________________ such as HTML, XML, PHP, and JavaScript are all Layer 6 (Presentation), because they tell ASCII how to display the text.

A

Scripting Languages

49
Q

________________ is really good for audio and visual streaming because you send a lot of data, and there is a lot less overhead vs using TCP. You won’t notice dropped packets with streaming in UDP.

A

UDP

50
Q

_________________ unite communicating components from more than one network application.

A

Application Services

51
Q

Layer 7 email does not deal with applications like Outlook, but the _________________ applications of email such as POP3, IMAP, and SMTP.

A

lower-level

52
Q

Do Some People Fear Birthdays

A
data - 7,6,5
segments - 4
packets - 3
frames -2
bits - 1
53
Q

In layer 1 data is called ______________.

A

bits

54
Q

POP3, IMAP, SMTP, HTTP, HTTPS, DNS, FTP, FTPS, Telnet, SSH, and SNMP are all application services used in Layer _________________.

A

Layer 7, Application Layer

55
Q

Within the IP communication is the _________________ layer of the OSI model, we find the TCP/UDP protocols here.

A

Layer 4 - Transport

56
Q

Layer 5 is the _________________ layer.

A

Session Layer

57
Q

The most common protocols used in Layer 3 are ________________, ______________, and _____________.

A

IPv4 protocol
IPv6 protocol
Internet Control Message Protocol (ICMP)

58
Q

IPv4 and IPv6 are both Layer ______________ protocols.

A

3

59
Q

If a TCP segment is dropped, the protocol will ask for acknowledgment each and every time data is sent. If it does not get the acknowledgment it will resend the data. That’s why we call it a ________________ protocol.

A

connection full protocol

60
Q

_________________ is done by the computer to have compatability between different devices.

A

Data formatting

61
Q

With a ______________ routing protocol, all of the routers continually talk to each other to decide the best way for data to be routed from client to host.

A

dynamic

62
Q

The _______________ protocol is used to send error messages and operational information about an IP desitnation.

A

ICMP (Internet Control Message Protocol)

63
Q

TCP, UDP, WAN accelerators, Load Balancers, and Firewalls are all of examples of Layer _________________ protcols and devices.

A

Layer 4 Transport

64
Q

_________________ is ending of a session due to mutual agreement (after the transfer is done) or when the other party disconnects.

A

Tearing Down a Session

65
Q

______________ involves taking some limited amount of resource and using it more efficiently. Allows multiple users to use a baseband connection at the same time.

A

multiplexing

66
Q

The two main protocols of the Layer 4 Tranport Layer, are ________________ and ________________.

A

TCP (Transmission Control Protocol)

UDP (User Datagram Protocol)

67
Q

The ________________ is the dividing line between the upper and lower layers of the OSI model.

A

Transport Layer (Layer 4)

68
Q

_________________ occurs when devices, such as routers, allocate memory to store segments if bandwidth isn’t readily available.

A

Buffering

69
Q

In ______________ data is divided into messages, similar to packet switching, except these messages may be stored then forwarded more like an email.

A

Message Switching

70
Q

Layer 3 switching is called ______________.

A

routing

71
Q

In layer 2 data is called ______________.

A

frames

72
Q

In layer 4 data is called ______________.

A

segments

73
Q

The _________________ layer, Layer _________________, is responsible for formatting the data exchanged and securing that data with the proper encryption.

A

Presentation Layer (Layer 6)

74
Q

_________________ is used by computers to share files over a network, and by WIndows to share files on the inside.

A

NetBIOS

75
Q

When you think of Layer 6 you should think about _________________ and _________________.

A

data formatting

data encryption

76
Q

MP4, MPG, and MOV all tell us how to get _________________ out of 1’s and 0’s.

A

video

77
Q

______________ is called different names as it flows though different layers of the OSI model.

A

data

78
Q

_________________ provides encryption between your computer and websites, such as HTTPS.

A

TLS (Transport Layer Security)

79
Q

In the _________________ layer of the OSI model we might find MAC addresses in the frame of communication, all of the switching decisions occur here.

A

Layer 2 - Data Link

80
Q

Their is no sequencing, or aknowlegement with the ________________ protocol.

A

UDP

81
Q

The most common examples of Layer 3 devices are ___________________ and _______________

A

Routers

Multilayer Switches

82
Q

The most common ICMP used is called _______________, which sends out a single packet to a test to an IP address and tells you if it was received or not and how long it took.

A

ping

83
Q

With TCP, the client sends a ________________ message asking if the server is ready for data, the server sends back a ________________ message saying it is ready to receive data, then the client sends a ________________ message notifiying that data is on the way.

A

SYN (synchronization)
SYN-ACK (synchronization acknowledgment)
ACK (acknowledgment)