Chapter 2 - The Open Systems Interconnection Specifications Flashcards

1
Q

Two types of packets are used at the Network layer:

A

Data Packets and Route-Update Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Packets These are used to transport user data through the internetwork. Protocols used to support data traffic are called routed protocols . Two examples of routed protocols are Internet Protocol (IP) and Internet Protocol version 6 (IPv6), which you’ll learn all about coming up in Chapter 7, “IP Addressing.”

A

Route-Update Packets These are used to update neighboring routers about the networks connected to all routers within the internetwork. Protocols that send route-update packets are called routing protocols, and some common ones are Routing Information Protocol (RIP), RIPv2, Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest Path First (OSPF). Route-update packets are used to help build and maintain routing tables on each router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hop count is the number of routers a packet passes through en route to a remote network.

A

routers break up broadcast domains and switches break up collision domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A router can also be referred to as a Layer 3 switch. These terms are interchangeable.

A

REMEMBER

Routers, by default, won’t forward any broadcast or multicast packets.

Routers use the logical address in a Network layer header to determine the next-hop router to forward the packet to.

Routers can use access lists, created by an administrator, to control security on the types of packets that are allowed to enter or exit an interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

REMEMBER

Routers can provide Layer 2 bridging functions if needed and can simultaneously route through the same interface.

Layer 3 devices (routers, in this case) provide connections between virtual LANs (VLANs).

Routers can provide quality of service (QoS) for specific types of network traffic.

A

The IEEE Ethernet Data Link layer has two sublayers:

Media Access Control (MAC)

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The OSI model is the primary architectural model for networks. It describes how data and network information are communicated from an application on one computer through the network media to an application on another computer.

A

a reference model is a conceptual blueprint of how communications should take place. It addresses all the processes required for effective communication and divides these processes into logical groupings called layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a communication system is designed in this manner, it’s known as layered architecture.

A

the central purpose of the OSI, and all networking models, is to allow different vendors’ networks to interoperate smoothly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

important advantages we gain by using the OSI layered model:

The OSI model divides network communication processes into smaller and simpler components, thus aiding component development, design, and troubleshooting.

It allows multiple-vendor development through the standardization of network components.

A

Continued … important advantages we gain by using the OSI layered model:

It encourages industry standardization by defining the specific functions that occur at each layer of the model.

It allows various types of network hardware and software to communicate.

It prevents changes in one layer from affecting other layers, facilitating development and making application programming much easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The OSI model has seven layers: Application (Layer 7) Presentation (Layer 6) Session (Layer 5) Transport (Layer 4) Network (Layer 3) Data Link (Layer 2) Physical (Layer 1)

A

The OSI’s seven layers are divided into two groups. The top three layers define the rules of how the applications working within host machines communicate with each other as well as with end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The bottom four layers define how the actual data is transmitted from end to end. Figure 2.2 shows the top three layers and their functions, and Figure 2.3 shows the four lower layers and their functions.

A

The Application Layer

Technically, users communicate with the network stack through application processes, interfaces, or APIs that connect the application in use to the operating system of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Application Layer

The Application layer chooses and determines the availability of communicating partners along with the resources necessary to make their required connections. It coordinates partnering applications and forms a consensus on procedures for controlling data integrity and error recovery.

A

The Application layer is also responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the requested communication exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Presentation Layer

The Presentation layer gets its name from its purpose: it presents data to the Application layer and is responsible for data translation and code formatting.

A

Presentation layer ensures that the data transferred from one system’s Application layer can be read and understood by the Application layer on another system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The OSI has protocol standards that define how standard data should be formatted. Tasks like data compression, decompression, encryption, and decryption are all associated with this layer. Some Presentation layer standards are even involved in multimedia operations.

A

The Session Layer

The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Session Layer

This layer also provides dialog control between devices, or nodes. It coordinates communication between systems and serves to organize their communication by offering three different modes: simplex, half duplex, and full duplex.

A

To sum up, the Session layer basically keeps applications’ data separate from other applications’ data. For a good example, the Session layer allows multiple web browser sessions on your desktop at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Transport layer segments and reassembles data into a data stream. Services located in the Transport layer handle data from upper-layer applications and unite it onto the same data stream. They provide end-to-end data transport services and can establish a logical connection between the sending host and destination host on an internetwork.

A

The Transport layer is responsible for providing the mechanisms for multiplexing upper-layer applications, establishing virtual connections, and tearing down virtual circuits. It also hides the many and sundry details of any network-dependent information from the higher layers, facilitating data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Connection-Oriented Communication Before a transmitting host starts to send segments down the model, the sender’s TCP process contacts the destination’s TCP process to establish a connection. The resulting creation is known as a virtual circuit. This type of communication is called connection-oriented.

A

During this initial handshake, the two TCP processes also agree on the amount of information that will be sent in either direction before the respective recipient’s TCP sends back an acknowledgment. With everything agreed on in advance, the path is paved for reliable communication to take place.

17
Q

The two operating systems communicate by sending messages over the network confirming that the transfer is approved and that both sides are ready for it to take place. After all of this required synchronization occurs, a connection is fully established and the data transfer begins. This virtual circuit setup is called overhead.

A

To summarize, a service is considered connection-oriented if it has the following characteristics: A virtual circuit is set up (such as a three-way handshake). It uses sequencing. It uses acknowledgments. It uses flow control.

18
Q

Windows are used to control the amount of outstanding, unacknowledged data segments.

A

The quantity of data segments (measured in bytes) that the transmitting machine is allowedto send without receiving an acknowledgment is represented by something called a window.

19
Q

It’s important to understand that the size of the window controls how much information is transferred from one end to the other. Although some protocols quantify information by observing the number of packets, TCP/IP measures it by counting the number of bytes.

A

When you’ve configured a window size of 1, the sending machine waits for an acknowledgment for each data segment it transmits before transmitting another. If you’ve configured a window size of 3, the sending machine is allowed to transmit three data segments before an acknowledgment is received.

20
Q

If a receiving host fails to receive all the segments that it should acknowledge, the host can improve the communication session by decreasing the window size.

A

positive acknowledgment with retransmission—a technique that requires a receiving machine to communicate with the transmitting source by sending an acknowledgment message back to the sender when it receives data.

21
Q

The Network layer manages logical device addressing, tracks the location of devices on the network, and determines the best way to move data. This means that the Network layer must transport traffic between devices that aren’t locally attached. Routers are Layer 3 devices that are specified at the Network layer and provide the routing services within an internetwork.

A

Data Packets These are used to transport user data through the internetwork. Protocols used to support data traffic are called routed protocols. Two examples of routed protocols are Internet Protocol (IP) and Internet Protocol version 6 (IPv6), which you’ll learn all about coming up in Chapter 7, “IP Addressing.”

22
Q

routers break up broadcast domains and switches break up collision domains.

A

Here are some key points about routers that you really should commit to memory: Routers, by default, won’t forward any broadcast or multicast packets. Routers use the logical address in a Network layer header to determine the next-hop router to forward the packet to. Routers can use access lists, created by an administrator, to control security on the types of packets that are allowed to enter or exit an interface. Routers can provide Layer 2 bridging functions if needed and can simultaneously route through the same interface. Layer 3 devices (routers, in this case) provide connections between virtual LANs (VLANs).

23
Q

Routers can provide quality of service (QoS) for specific types of network traffic.

A

The Data Link layer provides the physical transmission of the data and handles error notification, network topology, and flow control. This means the Data Link layer ensures that messages are delivered to the proper device on a LAN using hardware (MAC) addresses and translates messages from the Network layer into bits for the Physical layer to transmit.

24
Q

The Data Link layer formats the message into pieces, each called a data frame, and adds a customized header containing the destination and source hardware addresses.

A

This added information forms a sort of capsule that surrounds the original message in much the same way that engines, navigational devices, and other tools were attached to the lunar modules of the Apollo project.

25
Q

The IEEE Ethernet Data Link layer has two sublayers: Media Access Control (MAC) Defines how packets are placed on the media. Contention media access is “first come, first served” access, where everyone shares the same bandwidth—hence the name.

Logical Link Control (LLC) Responsible for identifying Network layer protocols and then encapsulating them, an LLC header tells the Data Link layer what to do with a packet once a frame is received.

A
  1. 1 LAN/MAN Management (and Media Access Control Bridges)
  2. 2 Logical Link Control
  3. 3 CSMA/CD (Ethernet)
  4. 4 Token Passing Bus
  5. 5 Token Passing Ring
  6. 6 Distributed Queue Dual Bus (DQDB) Metropolitan Area Network (MAN)
  7. 7 Broadband Local Area Networks
  8. 8 Fiber-Optic LANs and MANs
  9. 9 Isochronous LANs
  10. 10 LAN/MAN Security
  11. 11 Wireless LAN
26
Q
  1. 12 Demand Priority Access Method 802.15 Wireless Personal Area Network 802.16 Wireless Metropolitan Area Network (also called WiMAX)
  2. 17 Resilient Packet Ring
A

From this list in the sidebar, “Project 802”, you just need to remember that 802.3 calls out anything having to do with Ethernet and 802.11 is anything wireless.

27
Q

The Physical Layer Finally, we’re hitting bottom. Well, not in a bad way—we’ve now arrived at the Physical layer, which does two important things: it sends bits and receives bits. Bits come only in values of 1 or 0—a Morse code with numerical values. The Physical layer communicates directly with the various types of actual communication media.

A

The Physical layer specifies the electrical, mechanical, procedural, and functional requirements for activating, maintaining, and deactivating a physical link between end systems. This layer is also where you identify the interface between the data terminal equipment (DTE) and the data communication equipment (DCE).

28
Q

(Some older phone company employees still call DCE data circuit-terminating equipment.) The DCE is usually located at the customer, whereas the DTE is the attached device. The services available to the DTE are most often accessed via the DCE device, which is a modem or channel service unit/data service unit (CSU/DSU).

A

the Physical layer specifies the layout of the transmission media, otherwise known as its topology.

29
Q

When a host transmits data across a network to another device, the data goes through encapsulation: It’s wrapped with protocol information at each layer of the OSI model. Each layer communicates only with its peer layer on the receiving device.

A

To communicate and exchange information, each layer uses Protocol Data Units (PDUs). These hold the control information attached to the data at each layer of the model. They’re usually attached to the header in front of the data field but can also be in the trailer, or end, of it.

30
Q

At a transmitting device, the data-encapsulation method works like this:

  1. User information is converted to data for transmission on the network.
  2. Data is converted to segments, and a reliable connection is set up between the transmitting and receiving hosts.
A
  1. Segments are converted to packets or datagrams, and a logical address is placed in the header so each packet can be routed through an internetwork. A packet carries a segment of data.
  2. Packets or datagrams are converted to frames for transmission on the local network. Hardware (Ethernet) addresses are used to uniquely identify hosts on a local network segment. Frames carry packets.
  3. Frames are converted to bits, and a digital encoding and clocking scheme is used.
31
Q

The purpose of digital modulation is to transfer a digital bit stream over an analog bandpass channel. (A good example would be data transmitting over the public switched telephone network, where a bandpass filter limits the frequency range to 300–3400Hz, or over a limited radio frequency band.)

A

Analog and digital modulation use something called frequency-division multiplexing (FDM), where several low-pass information signals are transferred simultaneously over the same shared physical network, using separate passband channels (several different frequencies).

32
Q

Time-division multiplexing (TDM) is a method of transmitting and receiving many independent signals over a common signal path by means of synchronized network devices at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern. The receiving end demultiplexes the signal back to its original form.

A

End