OSI Model Flashcards

1
Q

OSI mOdel Overview

A

Developed in 1977 by International Organization for Standardization (ISO)
▪ Called the OSI model or OSI stack
▪ Consists of 7 layers
▪ Useful in troubleshooting networks
▪ Serves as a reference model in networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purposes of Reference Model

A

Categorize functions of the network into particular layer(s)
▪ Compare technologies across different manufacturers
▪ By understanding its functions, you can understand how best
to communicate with that device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Model Layers

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Types in OSI Model

A
  1. Application —————- Data
  2. Presentation—————-Data
  3. Session————————Data
  4. Transport———Segments
  5. Network————–Packets
  6. Data Link—————Frames
  7. Physical—————Bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 1 (Physical)

A

Transmission of bits across the network
▪ Physical and electrical characteristics
▪ Characteristics:
● How bits are represented on the medium
● Wiring standards for connectors and jacks
● Physical topology
● Synchronizing bits
● Bandwidth usage
● Multiplexing strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 1 Examples

A

Cables
● Ethernet
● Fiber optic
▪ Radio frequencies
● Wi-Fi
● Bluetooth
▪ Infrastructure devices
● Hubs
● Wireless Access Points
● Media Converters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 2 (Data link)

A

▪ Packages data into frames and transmitting those frames on the network,
performing error detection/correction, and uniquely identifying network
devices with an address (MAC), and flow control
● MAC
● Physical addressing
● Logical topology
● Method of Transmission
● Link Layer Control (LLC)
o Connection services
o Synchronizing transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 2 Examples

A

Network Interface Cards (NIC)
▪ Bridges
▪ Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 3 (Network)

A

Forwards traffic (routing) with logical address
● Example: IP Address (IPv4 or IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Link Control (LLC)

A

Provides connection services
▪ Acknowledgement of receipt of a message
▪ Flow control
● Limits amount of data sender can send at one time to keep
receiver from becoming overwhelmed
▪ Error control
● Allows receiver to let sender know when an expected data frame
wasn’t received or was corrupted by using a checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical Address

A

Numerous routed protocols were used for logical addressing over the
years:
● AppleTalk
● Internetwork Packet Exchange (IPX)
● Internet Protocol (IP)
▪ Only Internet Protocol (IP) remains dominant
● IP v4
● IP v6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How should data be forwarded or routed? Layer 3

A

Packet switching (known as routing)
● Data is divided into packets and forwarded
▪ Circuit switching
● Dedicated communication link is established between two devices
▪ Message switching
● Data is divided into messages, similar to packet sw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICMP (Layer 3)

A

Used to send error messages and operational information about an IP
destination
▪ Not regularly used by end-user applications
▪ Used in troubleshooting (ping and traceroute)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 3 Examples

A

▪ Routers
▪ Multilayer switches
▪ IPv4 protocol
▪ IPv6 protocol
▪ Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 4 (Transport Layer)

A

▪ Dividing line between upper and lower layers of the OSI model
▪ Data is sent as segments
▪ TCP/UDP
▪ Windowing
▪ Buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP (LAYER 4)

A

▪ Connection-oriented protocol
▪ Reliable transport of segments
● If segment is dropped, protocol detects it and resends segment
▪ Acknowledgements received for successful communications
▪ Used for all network data that needs to be assured to get to its
destination

17
Q

Layer 4 Examples

A

▪ TCP
▪ UDP
▪ WAN Accelerators
▪ Load Balancers
▪ Firewalls

18
Q

Layer 5( Session)

A

▪ Think of a session as a conversation that must be kept separate from
others to prevent intermingling of the data
▪ Setting up sessions
▪ Maintaining sessions

19
Q

Layer 5 Examples

A

H.323
● Used to setup, maintain, and tear down a voice/video connection
▪ NetBIOS
● Used by computers to share files over a network

20
Q

Layer 6 (Presentation)

A

▪ Responsible for formatting the data exchanged and securing that data
with proper encryption
▪ Functions
▪ Data formatting
▪ Encryption

21
Q

Layer 6 Examples

A

HTML, XML, PHP, JavaScript, …
▪ ASCII, EBCDIC, UNICODE, …
▪ GIF, JPG, TIF, SVG, PNG, …
▪ MPG, MOV, …
▪ TLS, SSL, …

22
Q

Layer 7 (Application)

A

Provides application-level services
● Not Microsoft Word or Notepad
▪ Layer where the users communicate with the computer
▪ Functions:
● Application services
● Service advertisement

23
Q

Layer 7 Examples

A

E-mail (POP3, IMAP, SMTP)
▪ Web Browsing (HTTP, HTTPS)
▪ Domain Name Service (DNS)
▪ File Transfer Protocol (FTP, FTPS)
▪ Remote Access (TELNET, SSH)
▪ Simple Network Management Protocol (SNMP)

24
Q

Encapsulation

A

The process of putting headers (and sometimes trailers) around some data

25
Q

Decapsulation

A

o Action of removing the encapsulation that was applied
o If we move down the OSI layers from 7 to 1, we encapsulate data
o If we move upward from layers 1 to 7, we decapsulate data
o A protocol data unit is a single unit of information transmitted within a
computer network
▪ Layer 1 - bits
▪ Layer 2 - frames
▪ Layer 3 - packets
▪ Layer 4 - segments if TCP or datagrams if UDP

26
Q

SYN (Synchronization flag)

A

▪ The most well-known flag in TCP communications because it is used to
synchronize the connection during the three-way handshake

27
Q

ACK (acknowledge flag)

A

Used during the three-way handshake, but it is also used to acknowledge
the successful receipt of packets

28
Q

FIN (Finished flag)

A

▪ Used to tear down the virtual connections created using the three-way
handshake and the SYN flag
▪ The FIN flag always appears when the last packets are exchanged
between a client and server and the host is ready to shutdown the
connection

29
Q

RST (reset flag)

A

Used when a client or server receives a packet that it was not expecting
during the current connection

30
Q

PSH (push flag)

A

▪ Used to ensure that the data is given priority and is processed at the
sending or receiving ends

31
Q

URG (urgent flag)

A

▪ It is like the Push flag and identifies incoming data as “urgent”
▪ The main difference is PSH is used by a sender to indicate data with a
higher priority level where URG is sent to tell the recipient to process it
immediately and ignore anything else in queue
● Source and Destination ports
o are just like the ones used in UDP, they dictate where the
data is coming from and where it is going to
● Length
o Used to indicate how many bytes the UDP packet is,
including its header and its data
● Checksum
o Not a mandatory field, but it can be used to provide some
validation that the UDP data being sent was received with
some level of integrity

32
Q

EtherType field

A

Used to indicate which protocol is encapsulated in the payload of the
frame
▪ As data moves from layer 7 to layer 1, that data is encapsulated
● At layer 4, we add our source and destination ports
● At layer 3, we add our source and destination IP addresses
● At layer 2, we add our source and destination MAC addresses
▪ Once we get to layer 1, we are simply transmitting our layer 2 frames as a
series of 1’s and 0’s over the medium
▪ Once that host is found, it will keep decapsulating the information all the
way up to layer 7, where its application can read and understand the
underlying data

33
Q
A