OSI and TCP/IP Models Flashcards
4.1.1 Study Guide
What are the OSI Layers
Physical
Data Link
Network
Transport
Session
Presentation
Application
What happens at the physical layer
Converts a frame into bits for transmission/receiving over the physical connection medium.
Network hardware devices that function at layer 1 include NICs, hubs, repeaters, concentrators, amplifiers.
What are physical layer protocol data unit (PDU)
Bits
What are common physical layer protocols
Electrical signal (copper wire)
Light Signal (optical fibre)
Radio Signal (air)
What are some physical network topologies
Ring
Bus
Star
Mesh
What are physical layer attack vectors
Passive sniffing
Excessive Electrical Interference
Cutting a cable
What happens at the Data Link Layer
Responsible for formatting a packet for transmission
Adds the source and destination hardware address to the frame
Address Resolution Protocol (ARP) operates at layer 2
Switches and Bridges function at this layer
What sublayers of Data Link Layer
Logical Link Control (LLC)
Media Access Control (MAC)
What does the Logical Link Control do?
Controls packet synchronization, flow control, and error checking
What does the Media Access Control do?
It controls how devices on a network gain permission to transmit data.
What are common Data Link Layer protocols
MAC, ARP, Ethernet 802.3 (Wired)
LLDP, HDLC, PPP, DSL, IEEE 802.11(Wireless), SONET/SDH, VLANs
What are Data Link Attack Vectors
Address Resolution Protocol spoofing
Man in the Middle Attack
Session Hijacking
What happens at the Network Layer
Responsible for logical addressing Providing routing or delivery guidance (not necessarily verifying guaranteed delivery)
Manages error detection and traffic control
What are common Network Layers protocols
IPv4
IPv6
IPSec
OSPF
EIGRP
ICMP
RIP
NAT
What are Network Layer Attack Vectors
Man in the Middle Attack
Denial of Service
Spoofing IP address
What happens at the Transport Layer
Responsible for managing the integrity of a connection and controlling the session. Providing transparent data transport and end to end transmission control
Defines session rules like how much data each segment can contain, how to verify message integrity, and how to determine whether data has been lost
Segmentation, sequencing, and error checking happen on this layer
What are common Transport layer protocols
TCP
UDP
SSL
TLS
What are Transport layer attack vectors
SYN Flood Attack
Trojans and other malware tend to target specific TCP and UDP ports
Session Hijacking
What happens at the Session Layer
Responsible for establishing, maintaining, and terminating communication sessions between two computers
Uses data streams
What are the 3 communications session phases
Connection establishment
Data Transfer
Connection release