OSI Model Flashcards
What does OSI stand for?
Open Systems Interconnection model (OSI Model) - how data is moved across a network.
What is layer 5 of the OSI model?
Session layer
What is layer 2 of the OSI model?
Data Control/Data Link layer (MAC address routing layer).
What is layer 6 of the OSI model?
Presentation layer.
What is the top layer/layer 7 of the OSI model?
Application Layer.
What is the bottom layer/layer 1 of the OSI model?
Physical layer - cabling, connectors, electrical signals - loopback tests, cable tests etc.
What are all 7 layers of the OSI model working from the bottom up?
- Physical
- Data link control (DLC) - switching layer via MAC address, frames/EUI addresses
- Network - routers and smart switches - PACKET routing via IP
- Transport (TCP/UDP IP) - post office layer - gets traffic from one side of network to the other
- Session - start,stop,restarting sessions - VPN
- Presentation
- Application
What layer do smart switches exist at?
Layer 3 (because they route packets based on IP)
What layer do dumb switches work at of the OSI model?
Layer 2 switches - because they route based on MAC address (good for small networks)
If there is a problem with an IP address or subnet mask configuration at what layer of the OSI are you looking?
Layer 3 - network layer encapsulates IP addressing and routing/subnetting.
What is the role of the presentation layer (Layer 6)?
The presentation layer makes data human readable, encryption/decryption. Closely linked/tied to the Application layer (7). Presentation preparation layer.
When looking at e.g. a webpage what layer of the OSI model are we seeing?
Layer 7 - the application layer is what you see.
HTTPS, pop3, etc protocols operate at this layer.
At what level are data PACKETS routed?
Layer 3 - the network layer is where data packets are exchanged.
What layer has TCP segments and UDP datagrams?
Layer 4 - Transport Layer has TCP segments and UDP datagrams.
At which layer would you find tunnelling and control protocols.
Layer 5 is the session layer where you’d find control protocols and tunnelling protocols.