Obj 1.1 OSI Model & Encapsulation Flashcards

1
Q

OSI Model

A

The OSI (Open Systems Interconnection) Model is a conceptual framework used to understand how different network protocols interact in a communication system. It divides networking into seven layers, from physical connections to application-level data handling, which helps in troubleshooting and standardizing communications between systems.

For the exam, you should know the purpose of each layer (Physical, Data Link, Network, Transport, Session, Presentation, and Application) and how they interact with each other. Focus on key functions of each layer, common protocols associated with them, and how data is encapsulated as it moves down and up the layers. Understanding which devices and protocols operate at each layer is important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSI Model Layer 1 - Physical

A

The Physical layer (Layer 1) of the OSI Model is responsible for the transmission of raw bitstreams over a physical medium like cables, fiber optics, or radio waves. It defines the hardware elements such as cables, switches, and network interface cards, along with the electrical or optical signaling used to move data.

For the exam, you need to know that this layer deals with things like signal transmission, data rates, and physical connections. Understanding concepts such as cabling standards (like Ethernet or fiber optics), pin configurations, and signal types (analog vs. digital) will help you answer questions related to this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Model Layer 2 - Data Link

A

The Data Link layer (Layer 2) of the OSI Model is responsible for establishing a reliable link between two directly connected nodes. It handles data framing, error detection, and flow control, ensuring that data packets are delivered correctly between devices on the same local network. It also manages access to the physical medium.

For the exam, focus on how this layer uses MAC addresses to identify devices and frames data. Key protocols like Ethernet and technologies such as switches and VLANs operate at this layer. You should also be familiar with the two sublayers: the Media Access Control (MAC) and Logical Link Control (LLC) layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI Model Layer 3 - Network

A

The Network layer (Layer 3) of the OSI Model is responsible for routing data between different networks and managing logical addressing. This layer ensures that packets are forwarded from the source to the destination across multiple networks, using IP addresses to identify devices.

For the exam, understand that this layer is where IP addressing and routing protocols like IPv4, IPv6, and ICMP operate. You should know how routers function at this layer to direct traffic between networks, and concepts like subnetting, packet forwarding, and network congestion management are important. This layer determines the best path for data to travel across different networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Model Layer 4 - Transport

A

The Transport layer (Layer 4) of the OSI Model is responsible for delivering data between systems in a reliable and error-free manner. It ensures end-to-end communication, flow control, and error checking. This layer can provide either reliable, connection-oriented communication (like TCP) or unreliable, connectionless communication (like UDP), depending on the needs of the application.

For the exam, focus on the differences between TCP and UDP, especially how TCP provides reliable data delivery through error correction, acknowledgments, and retransmissions, while UDP is faster but less reliable. Knowing how ports work (like HTTP on port 80 or DNS on port 53) and the concept of segmentation is also key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Model Layer 5 - Session

A

The Session layer (Layer 5) of the OSI Model manages the establishment, maintenance, and termination of communication sessions between applications. It ensures that sessions between devices or applications remain open for the duration of the communication and can restart if disrupted. This layer handles session control like managing login and logout processes, maintaining dialogue, and controlling data exchange.

For the exam, you should understand that the Session layer manages things like session initiation and termination, and handles dialog control, especially for ongoing communication between systems. It’s also involved in setting up, coordinating, and ending sessions in a way that ensures data is properly synchronized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Model Layer 6 - Presentation

A

The Presentation layer (Layer 6) of the OSI Model is responsible for translating data between the application layer and the network format. It ensures that data sent by the application is in a readable format for the receiving system by handling encryption, compression, and data conversion (e.g., translating between different encoding types like ASCII or EBCDIC).

For the exam, focus on how this layer is involved in data formatting and encryption/decryption processes. It ensures that data is properly encoded for transmission and then decoded at the destination, and also handles data compression to optimize the transmission speed. Understanding how this layer ensures data is readable between different systems is important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Model Layer 7 - Application

A

The Application layer (Layer 7) of the OSI Model is the closest layer to the end user and interacts directly with software applications to provide network services. It handles high-level protocols and user interfaces, enabling services such as file transfers, email, and web browsing. This layer acts as a bridge between the network and the application programs.

For the exam, focus on how this layer supports network services like HTTP, FTP, SMTP, and DNS. It’s important to know that while it interacts with applications, it does not represent the application itself. Understanding common protocols and their functions (like web browsing over HTTP) is key for recognizing how the Application layer provides network services to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encapsulation

A

Data encapsulation within the OSI model context refers to the process of wrapping data with protocol-specific information as it moves down through the layers of the model. Each layer adds its own header (and possibly a trailer) to the data, creating a data unit specific to that layer, which facilitates proper communication and data handling.

For the exam, understand that encapsulation begins at the Application layer (Layer 7) with application data. As the data moves down to Layer 6 (Presentation), it may be formatted or encrypted. At Layer 5 (Session), session information is added. Moving to Layer 4 (Transport), a transport header is added, indicating the source and destination ports and providing error checking and flow control. When the data reaches Layer 3 (Network), it gets an IP header that contains logical addressing information, and at Layer 2 (Data Link), the Ethernet header and trailer are added, containing MAC addresses. Finally, at Layer 1 (Physical), the encapsulated data is converted into signals for transmission. This layered approach ensures that each part of the communication process is managed effectively, leading to reliable data delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Decapsulation

A

Data decapsulation within the OSI model context is the process of removing the protocol-specific information added during encapsulation as data moves back up through the layers of the OSI model. Each layer removes its corresponding header (and possibly trailer) and processes the data before passing it to the layer above.

For the exam, it’s important to understand that decapsulation starts at the Physical layer (Layer 1), where the received signals are converted back into a bitstream. As the data ascends to the Data Link layer (Layer 2), the Ethernet header and trailer are stripped away, revealing the Network layer data. At the Network layer (Layer 3), the IP header is removed, leaving the Transport layer segment. The Transport layer (Layer 4) then removes its header, revealing the session data for the Session layer (Layer 5), which processes the information further. Finally, at the Presentation layer (Layer 6), the data may be formatted or decrypted before reaching the Application layer (Layer 7), where the end user can interact with it. Understanding this process is crucial for grasping how data is properly processed and delivered in a network communication context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethernet Header

A

The Ethernet header is a critical component of Ethernet frames at the Data Link layer (Layer 2) of the OSI Model. It contains essential information for the proper delivery of data across a local area network (LAN). Typically, the Ethernet header includes several key fields: the destination MAC address, the source MAC address, and the EtherType or Length field, which indicates the protocol used in the data payload.

For the exam, you should focus on knowing the structure and purpose of each field in the Ethernet header. The destination and source MAC addresses are 48 bits each and are used to identify the sender and receiver on the local network. The EtherType field, which is typically 16 bits, tells the receiving device what protocol to use for processing the encapsulated data. Understanding the Ethernet header’s role in framing and its importance in local network communication is crucial for your studies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Protocol (IP) header

A

The Internet Protocol (IP) header is a crucial part of the Network layer (Layer 3) in the OSI model. It contains information necessary for routing and delivering packets across networks. Key fields in the IP header include the source and destination IP addresses, which are used to identify the sender and receiver, respectively, and other fields like the Time to Live (TTL), which limits the lifespan of a packet, and protocol type, which indicates whether the packet is using TCP or UDP.

For the exam, you should understand that the IP header plays a central role in ensuring packets are routed correctly across different networks. An advantage of the IP header is that it provides the information necessary for devices to route data efficiently, ensuring packets reach the correct destination even across complex networks. However, a disadvantage is that the IP header adds overhead to each packet, which can slow down transmission speeds slightly, and IP addressing doesn’t provide built-in reliability, meaning errors in packet delivery must be handled by other protocols like TCP. Understanding the structure and function of the IP header is key for handling network-layer operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Transmission Control Protocol (TCP)/
A

Transmission Control Protocol (TCP) is a core transport layer protocol in the OSI model, primarily responsible for ensuring reliable communication between devices over a network. It establishes a connection-oriented communication channel, meaning it establishes a session between the sender and receiver before data transmission begins. TCP uses a three-way handshake process to establish this connection, which involves exchanging SYN and ACK packets to confirm readiness for data transfer.

For the exam, you should understand that TCP provides reliable data transmission through features like error checking, data segmentation, acknowledgments, and retransmission of lost packets. It maintains the order of data segments, ensuring that packets arrive in sequence, which is critical for applications requiring data integrity, such as file transfers and web browsing. Key TCP concepts to remember include the use of port numbers to differentiate services, flow control mechanisms like sliding window, and how TCP handles congestion control to prevent network overload. Understanding these aspects of TCP is crucial for grasping how reliable communications are achieved in networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User Datagram Protocol (UDP) headers

A

User Datagram Protocol (UDP) is a transport layer protocol in the OSI model that enables connectionless communication. Unlike TCP, UDP is designed for applications that require fast, efficient transmission of data without the overhead of establishing a connection or ensuring reliable delivery. The UDP header is much simpler than the TCP header and consists of four fields: source port, destination port, length, and checksum.

For the exam, focus on the function of each UDP header field. The source and destination port fields identify the sending and receiving applications, allowing multiple services to run on a single device. The length field indicates the total length of the UDP header and data, while the checksum field provides a basic error-checking mechanism to verify the integrity of the data. However, UDP does not guarantee delivery, order, or error correction, making it suitable for applications where speed is prioritized over reliability, such as video streaming, online gaming, or VoIP. Understanding the characteristics and uses of UDP is essential for distinguishing it from TCP in network communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • TCP flags
A

TCP flags are control bits in the TCP header that indicate the state of a TCP connection and manage various aspects of communication between devices. Each flag serves a specific purpose in establishing connections, controlling data flow, and ensuring reliable data transmission. The most commonly used TCP flags include SYN (Synchronize), ACK (Acknowledgment), FIN (Finish), RST (Reset), PSH (Push), and URG (Urgent).

For the exam, it’s important to understand how these flags function. The SYN flag initiates a connection during the three-way handshake process, while the ACK flag acknowledges the receipt of packets. The FIN flag is used to gracefully close a connection, and the RST flag resets a connection in case of errors. The PSH flag indicates that data should be immediately pushed to the receiving application, while the URG flag signifies that the data is urgent and should be prioritized. Recognizing how these flags work together to control the state and reliability of TCP communications is essential for grasping the protocol’s operation in network environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Payload

A

In networking, the term “payload” refers to the actual data carried within a packet, frame, or segment, excluding any headers or trailers that contain protocol-related information. The payload is the part of the data that is delivered to the receiving application or user, representing the actual content being transmitted, such as a file, a message, or a media stream.

For the exam, it’s important to understand that the size of the payload can vary depending on the protocol and the encapsulation process. While headers and trailers are necessary for routing, addressing, and error-checking, the payload is what holds the valuable information that applications use. Different protocols have different maximum payload sizes, influenced by factors like the underlying network technology and maximum transmission unit (MTU) settings. Grasping the concept of payload helps in understanding how data is structured and transmitted across networks.

17
Q

Maximum transmission unit (MTU)

A

Maximum Transmission Unit (MTU) refers to the largest size of a single packet, or frame, that can be sent over a network medium without the need for fragmentation. The MTU is an important parameter in network communication, as it directly affects the efficiency and performance of data transmission. Different network technologies have different MTU values; for example, the default MTU for Ethernet is typically 1500 bytes.

For the exam, it’s crucial to understand that a smaller MTU can lead to more packets being sent, which may increase overhead and reduce performance due to the additional headers and acknowledgments required. Conversely, a larger MTU allows for more data to be sent in a single packet, reducing overhead but increasing the likelihood of fragmentation if the packet exceeds the capacity of the network path. Understanding how MTU impacts data transmission, including the implications of fragmentation and the need for proper MTU configuration, is essential for effective network design and troubleshooting.