Telecommunications - Domain 2 Flashcards
What are the 7 layers of the OSI model and give an example:
Top Application - HTTP, Presentation - JPEG, Session - Appletalk, Transport - TCP/UDP, Network - IP/IPX (router), Data - Ethernet (switch) and Physical - Ethernet (hub) Bottom
Purpose of the OSI Model
- Increase interoperability between vendor products. 2. Clarify network services functionality and communications processes. 3. Modular approach so that component can be modified without affecting others.
Data Encapsulation - OSI Model
Each layer adds its own information to the data as it travels down the layers.
Physical Layer - OSI Model
- Specifies how signals are transmitted on the network. 2. Interface to media. 3. Responsible for encoding scheme - Manchester Encoding.
Data Link Layer - OSI Model
- Sender breaks data into frames. 2. Formats for proper technology - Token Ring, Ethernet, and ATM. 3. Media Access. 4. Media access methods a. CSMA/CD ethernet 802.3 b. Collision/Contention based c. Token Passing 802.5 Token Ring FDDI d. 802.11 Wireless e. 802.12 Polling 5. Synchronization and Error Control
Network Layer - OSI Model (Routing)
- Routes data between systems or different networks. 2. Confidentiality, authentication, and integrity can be provided at this layer. 3. Select route for packets to take. 4. Fragmentation for dissimilar frame sizes.
Transport Layer - OSI Model
- End to end packet xfer use connection-oriented or connection services. 2. Buffering of data until all is sent or receiving system can process. 3. Error control and recovery if necessary. 4. Use of ports to communicate with higher level protocols. 5. Segmenting packets for processing by the network layer. 6. Packet sequencing.
Session Layer - OSI Model - diagram
- Sets up communication with destination. 2. Maintenance of connection. 3. SQL, NFS, and RPC
Session Layer - OSI Model
- Allows applications to organize and synchronize how they will transfer data. 2. Exception reporting. 3. Session setup, maintenance, session tear down. 4. Provides recovery services if required. 5. Full-duplex: two way conversations at the same time. 6. Half-duplex - only on node can speak at a time.
Presentation Layer - OSI Model - diagram
- Translates message into standard presentations. 2. Formatting and encoding. 3. File level encryption. 4. File level compression.
Presentation Layer - OSI Model
- Specifies or negotiates how data is represented in binary when exchanged by applications. 2. Encoding (ASCII or EBCDIC). 3. Formatting (TIFF, GIF, JPEG).
Application Layer - OSI Model
- Functionality. 2. Services and protocols-FTP, Email, Access Control Services, Gateways, File Management, Web Browser, non-repudiation.
OSI Model - Acronym
APSTNDP All people seem to need delicious pizza.
OSI Model - PROTOCOLS - Application Layer
FTP TFTP BOOTP SNMP RLOGIN SMTP MIME FINGER TELNET NCP APPC AFP SMB HTTP
OSI Model - PROTOCOLS - Presentation Layer
ASCII TIFF GIF JPEG MPEG MIDI
OSI Model - PROTOCOLS - Session Layer
DNS NETBIOS NFS RPC SQL
OSI Model - PROTOCOLS - Transport Layer
TCP UDP SPX SSL TLS
OSI Model - PROTOCOLS - Network Layer
IP ICMP RIP IGMP IPX
OSI Model - PROTOCOLS - Data Layer
SLIP PPP ARP RARP L2F L2TP ETHERNET TOKEN RING X.25 FRAME RELAY ATM
OSI Model - PROTOCOLS - Physical Layer
HSSI X.21 EIA/TIA-232 EIA/TIA-449 SONET
Protocols - what are they?
- Rules used to allow two or more computers to send and receive data. 2. Allow different operating systems and applications to communicate. 3. Different protocols have different functionalities and goals. 4. Different network models specify services carried out by protocols. 5. Protocol stack means modules of functionality at different layers.
TCP/IP - Protocol of the Internet
- Transmission Control Protocol/Internet Protocol. 2. Suite of protocols that govern how data is transmitted. 3. Port numbers track different conversations-20 and 21 (FTP), 25 (SMTP), 161 (SNMP), 80 (HTTP), and 23 (TELNET). 4. Source port numbers are dynamic. 5. Destination values are usually under 1024.
TCP vs UDP
- TCP -Connection oriented, Reliable, and provides flow control. 2. UDP - connectionless, non-reliable, no handshake is performed, and it is best effort protocol.
IPv4 addressing
- 32 bits (4 bytes long) 2. uniquely identify a particular network interface 3. contains two parts-network ID and locally administered bits.
IPv4 Class A addressing
RFC 721 0.0.0.0 to 126.0.0.0 - first byte defines network 8 networks 24 hosts 126 total networks 16.7 M hosts
IPv4 Class B addressing
RFC 721 128.0.0.0 to 191.0.0.0 - first two byte defines network 16 networks 16 hosts 65K total networks 65K hosts
IPv4 Class C addressing
RFC 721 192.0.0.0 to 223.0.0.0 - first three byte defines network 24 networks 8 hosts 16.7M total networks 254 hosts
IPv4 Class D addressing
RFC 721 224.0.0.0 to 239.0.0.0 - Multicast
IPv4 Class E addressing
RFC 721 240.0.0.0 to 255.0.0.0 - reserved for future use.
IPv6
- 128 bit addresses. 2. Eight blocks for four hex digits. 3. colon’d hex. 4. Can be shortened be deleting leading zeros. Adjacent blocks of zero’s can be replaced with ::, but only once.
Unique local Addresses
- Equivalent of IPv4 private address (10.x.x.x, 172.16.x.x, and 192.168.x.x). 2. Routable between subnets on a private network only. 3. Begin with “fd”. 4. The next 40 bits are the global ID and is randomly generated value that identifies a specific sit within the organization. 5. Next 16 bits represent subnet ID. 6. Last 64 bits represent the interface ID.
Signals
- Analog-varying electromagnetic waves and varied by amplification vs 2. Digital-electric pulses representation binary digits (on and off only).
Signaling Techniques
- Sync Transmission-stream of data, two systems sync before data is sent and used to transfer large amounts of data. 2. Async Transmission-bits are sent sequentially, xfer small amounts of data, start and stop bits used, and modems and dialup are main tech.
Baseband vs Broadband
- Baseband-cable only uses one channel and uses dedicated freqs. 2. Broadband-cable uses several channels and can xmit more data per unit of time.
Coaxial Cable construction
Sheath then braided shielding then insulation then conducting core.
Twisted pair construction
Low speed xmit using twisted copper-STP, UTP. UTP vulnerable to interference. UTP is less secure then STP and fiber.
Fiber characteristics
- Data travels as light over glass medium. 2. Hi-speed less attenuation. 3. Extremely resistant to eavesdropping. 4. Very expensive. 5. Hard to work. 6. Most secure cabling type.
Cable issues
- Noise-dirty signals. 2. Attenuation-LOS. 3. Cross talk-signals spills onto other wires. UTP most susceptible.
Twisted Pair Speeds
- UTP/STP 100M RJ-45 connector. 2. CAT 3-10 MBPS 2 pairs. 3. CAT 5-100M 4 pairs. 4. CAT 5e/6 1000M. 5. CAT 7 10 GBPS.
Fiber Optic design
- Singe Mode 2000M. 2. Multimode 500M-both ST (twist), SC (clip) connectors.
Transmission methods
1.Unicast-one to one. 2. Multicast-one to many. 3. Broadcast-one to all.
LAN Protocols - Address Resolution Protocol (ARP)
- Maps the IP address to the MAC. 2. MAC is only used to forward frames on the same network segment, not for routing. 3. LAN media only understand MAC addresses not IP.
LAN Protocols - Reverse Address Resolution Protocol (RARP)
- Has MAC address and broadcasts to get matching IP address. 2. RARP server responds to RARP broadcast. 3. Used in dumb terminals. 4. BOOTP was created after RARP and has more functions-gives station IP, gateway IP, and name server IP.
LAN Protocols - Dynamic Host Configuration Protocol (DHCP)
- Automates IP config. 2. Creates scopes to manage. 3. Options added to scope to set add’l TCP/IP parms. 4. Support for Superscopes and Multicast scopes. 5. Integration with DNS.
DHCP Leasing Process- DORA acronym
- Client boots and broadcasts DHCPDiscover message. 2. Server(s) respond and returns a DHCPOffer message. 3. Client chooses first DHCPO it receives and sends DHCPRequst accepting info from that server. 4. Server sends DHCPAck. 5. DHCP renewal-client requests from original server 50% lease time, if no response, sends request to any server for 87.5% lease time.
Internet Control Message Protocol
- Message protocol for IP. 2. IP sends ICMP. 3. Status and error messages. 4. Ping. 5. Routers put ICMP messages into IP datagrams to indicate a message could not be delivered. 6. Can be used to trick routers into changing their tables thus redirecting traffic.
Hub characteristics
- Layer 1. 2. Connects multiple LAN devices.
Switch characteristics (Bridge)
- Layer 2. Forwards frame to correct network segment. 3. Data link layer device. 4. Subject to MAC flooding.
Router characteristics
- Layer 3. 2. Routes packets based on IP address in header. 3. Can connect to similar or different networks. 4. Uses ACL security. 5. Network layering device.
Routing protocol types
- Distance vector based. 2. Link states. 3. Border protocols. - interior routing (RIP, OSPF) exterior routing (BGP).