The OSI Reference Model Flashcards
Commonly referred to as the OSI model or the OSI stack. This seven-layer model categorizes various network technologies.
Open Systems Interconnection (OSI) reference model
The name given to data at different layers of the OSI model. Specifically, the PDU for Layer 4 is segment. The Layer 3 PDU is packet, the Layer 2 PDU is frame, and the Layer 1 PDU is bit.
protocol data unit (PDU)
(data service unit)
One way to electrically or optically represent a binary 1 or 0 is to use current state modulation, which represents a binary 1 with the presence of voltage (on a copper cable) or the presence of light (on a fiber-optic cable). Similarly, the absence of light or voltage represents a binary 0.
current state modulation
(Layer 1 - The Physical Layer)
One way to electrically or optically represent a binary 1 or 0 is to use the transition between a voltage level (for example, going from a state of no voltage to a state of voltage, or vice versa, on a copper cable) or the transition of having light or no light on a fiber-optic cable to represent a binary 1. Similarly, a binary 0 is represented by having no transition in a voltage level or light level from one time period to the next. This approach of representing binary digits is called state transition modulation.
state transition modulation
(Layer 1 - The Physical Layer)
A mathematical algorithm that is executed on a data string by both the sender and the receiver of the data string. If the calculated CRC values match, the receiver can conclude that the data string was not corrupted during transmission.
cyclic redundancy check (CRC)
Layer 1 of the OSI model. This layer is concerned with the transmission of bits on a network.
Examples of devices defined by Layer 1 standards include hubs, wireless access points, and network cabling.
physical layer
Layer 1 devices view a network as a physical topology (as opposed to a logical topology).
As Layer 2 of the OSI model, this layer is concerned with the packaging of data into frames and transmitting those frames on a network, performing error detection/correction, uniquely identifying network devices with an address (MAC or LLC), and handling flow control.
data link layer
Layer 2 devices view a network as a logical topology.
Examples of devices defined by data link layer standards include switches, bridges, and NICs.
Layer 3 of the OSI model. This layer is primarily concerned with forwarding data based on logical addresses.
network layer
Examples of devices found at the network layer include routers and multilayer switches. The most common Layer 3 protocol in use, and the protocol on which the Internet is based, is IPv4. However, IPv6 is beginning to be more common on networks today.
As Layer 4 of the OSI model, it acts as a dividing line between the upper layers and the lower layers. Specifically, messages are taken from the upper layers (Layers 5–7) and encapsulated into segments for transmission to the lower layers (Layers 1–3). Similarly, data streams coming from lower layers are decapsulated and sent to Layer 5 (the session layer) or some other upper layer, depending on the protocol.
transport layer (OSI model)
In addition to TCP and UDP, Internet Control Message Protocol (ICMP) is another transport layer protocol you are likely to meet. ICMP is used by utilities such as ping and traceroute, which are discussed in Lesson 10,”Command-Line Tools.”
As Layer 5 of the OSI model, it’s responsible for setting up, maintaining, and tearing down sessions.
session layer
Layer 6 of the OSI model. This layer is responsible for the formatting of data being exchanged and securing the data with encryption.
presentation layer
Layer 7 of the OSI model. This layer provides application services to a network. An important yet often-misunderstood concept is that end-user applications do not reside at the application layer. Instead, the application layer supports services used by end-user applications. Another function of the application layer is advertising available services.
application layer (OSI model)
Recall that even though the application layer is numbered as Layer 7, it is at the top of the OSI stack because its networking functions are closest to the end user.
The network interface layer of the TCP/IP stack (also known as the network access layer) encompasses the technologies addressed by Layers 1 and 2 (that is, the physical and data link layers) of the OSI model.
network interface layer
This layer of the TCP/IP stack maps to Layer 3 (network layer) of the OSI model. Although multiple routed protocols (for example, IPv4 and IPv6) may reside at the OSI model’s network layer, the Internet layer of the TCP/IP stack focuses on IP as the protocol to be routed through a network.
Internet layer
The transport layer of the TCP/IP stack maps to Layer 4 (transport layer) of the OSI model. The two primary protocols found at the TCP/IP stack’s transport layer are TCP and UDP.
transport layer (TCP/IP stack)
Addresses concepts described by Layers 5, 6, and 7 (that is, the session, presentation, and application layers) of the OSI model.
application layer (TCP/IP stack)
Supports different communication sessions (for example, different telephone conversations in a telephony network) on the same physical medium by allowing sessions to take turns. For a brief period of time, defined as a time slot, data from the first session is sent, followed by data from the second session. This continues until all sessions have had a turn, and the process repeats itself.
time-division multiplexing (TDM)
A connection-oriented transport protocol. Connection-oriented transport protocols provide reliable transport, in that if a segment is dropped, the sender can detect that drop and retransmit that dropped segment. Specifically, a receiver acknowledges segments that it receives. Based on those acknowledgments, a sender can determine which segments were successfully received.
Transmission Control Protocol (TCP)
A connectionless transport protocol. Connectionless transport protocols provide unreliable transport, in that if a segment is dropped, the sender is unaware of the drop, and no retransmission occurs.
User Datagram Protocol (UDP)
Also known as the DoD model, this four-layer model (as opposed to the seven-layer OSI model) targets the suite of TCP/IP protocols.
TCP/IP stack
As previously described, the OSI model consists of seven layers:
All People Seem To Need Data Processing
or
Please Do Not Throw Sausage Pizza Away
Layer 1: The physical layer
Layer 2: The data link layer
Layer 3: The network layer
Layer 4: The transport layer
Layer 5: The session layer
Layer 6: The presentation layer
Layer 7: The application layer
Layer 1 PDU
bit (binary)
Layer 2 PDU
frame
Layer 3 PDU
packet
Layer 4 PDU
segment
Bacon Frying Produces Salivation
Bits
Frames, Packets
Packets, Datagrams
Segments, Packets
For two networked devices to successfully communicate at the physical layer, they must agree on when one bit stops and another bit starts. Specifically, the devices need a method to synchronize the bits. Two basic approaches to bit synchronization include asynchronous and synchronous synchronization:
Synchronizing bits
With this approach, a sender states that it is about to start transmitting by sending a start bit to the receiver. When the receiver sees this, it starts its own internal clock to measure the next bits. After the sender transmits its data, it sends a stop bit to say that it has finished its transmission.
Asynchronous
This approach synchronizes the internal clocks of both the sender and the receiver to ensure that they agree on when bits begin and end. A common approach to make this synchronization happen is to use an external clock (for example, a clock given by a service provider). The sender and receiver then reference this external clock.
Synchronous
_______ technologies divide the bandwidth available on a medium (for example, copper or fiber-optic cabling) into different channels. A sender can then transmit different communication streams over the various channels. For example, consider frequency-division multiplexing (FDM) used by a cable modem. Specifically, a cable modem uses certain ranges of frequencies on the cable coming into your home from the local cable company to carry incoming data, another range of frequencies for outgoing data, and several other frequency ranges for various TV stations.
Broadband
_____ technologies, in contrast, use all the available frequencies on a medium to send data. Ethernet is an example of a networking technology that uses _____.
Baseband
_____ allows multiple communications sessions to share the same physical medium. Cable TV, as previously mentioned, allows you to receive multiple channels over a single physical medium (for example, a coaxial cable plugged into the back of your television).
Multiplexing
A downside to TDM is that each communication session receives its own time slot, even if one of the sessions does not have any data to send at the moment. To make a more efficient use of available bandwidth, _____ dynamically assigns time slots to communications sessions on an as-needed basis.
Statistical time-division multiplexing (StatTDM)
_____ divides a medium’s frequency range into channels, and different communication sessions send their data over different channels. As previously described, this approach to bandwidth usage is called broadband.
Frequency-division multiplexing (FDM)
Physical addressing: A common example of a Layer 2 address is a _____, which is a 48-bit address assigned to a device’s network interface card (NIC). _____ are written in hexadecimal notation (for example, 58:55:ca:eb:27:83). The first 24 bits of the 48-bit address is the vendor code. The IEEE Registration Authority assigns a manufacturer one or more unique vendor codes. You can use the list of vendor codes at http://standards.ieee.org/develop/regauth/oui/oui.txt to identify the manufacturer of a networking device, based on the first half of the device’s _____. The last 24 bits of a _____ are assigned by the manufacturer, and they act as a serial number for the device. No two _____ in the world should have the same value.
Logical topology: Layer 2 devices view a network as a logical topology. Examples of a logical topology include bus and ring topologies, as described in Lesson 1.
Method of transmitting on the media: With several devices connected to a network, there needs to be some strategy for deciding when a device sends on the media. Otherwise, multiple devices might send at the same time and thus interfere with one another’s transmissions.
Characteristics of the Media Access Control (MAC)
When a device on a network receives a message from another device on the network, that recipient device can give feedback to the sender in the form of an acknowledgment message.
Connection services
(Characteristics of the Logical Link Control (LLC) sublayer)
Limits the amount of data a sender can send at one time; this prevents the sender from overwhelming the receiver with too much information.
Flow control
(Connection services)
Allows the recipient of data to let the sender know whether the expected data frame was not received or whether it was received but is corrupted. The recipient figures out whether the data frame is corrupt by mathematically calculating a checksum of the data received. If the calculated checksum does not match the checksum received with the data frame, the recipient of the data draws the conclusion that the data frame is corrupted and can then notify the sender via an acknowledgment message.
Error control
(Connection services)
Senders and receivers of data frames need to coordinate when a data frame is being transmitted and should be received.
Synchronizing transmissions
(Characteristics of the Logical Link Control (LLC) sublayer)
With _____ transmission, network devices look to a common device in the network as a clock source, which creates fixed-length time slots. Network devices can determine how much free space, if any, is available within a time slot and then insert data into an available time slot. A time slot can accommodate more than one data frame. _____ transmission does not need to provide clocking at the beginning of a data string (as does synchronous transmission) or for every data frame (as does asynchronous transmission). As a result, _____ transmission uses little overhead when compared to asynchronous or synchronous transmission methods.
Isochronous
(Synchronizing transmissions)
With _____ transmission, network devices reference their own internal clocks, and network devices do not need to synchronize their clocks. Instead, the sender places a start bit at the beginning of each data frame and a stop bit at the end of each data frame. These start and stop bits tell the receiver when to monitor the medium for the presence of bits.
An additional bit, called the parity bit, might also be added to the end of each byte in a frame to detect an error in the frame. For example, if even parity error detection (as opposed to odd parity error detection) is used, the parity bit (with a value of either 0 or 1) would be added to the end of a byte, causing the total number of 1s in the data frame to be an even number. If the receiver of a byte is configured for even parity error detection and receives a byte where the total number of bits (including the parity bit) is even, the receiver can conclude that the byte was not corrupted during transmission.
Using a parity bit to detect errors might not be effective if a byte has more than one error (that is, more than one bit that has been changed from its original value).
asynchronous