S.3 Dion Training Network+ (N10-009)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/144

flashcard set

Earn XP

Description and Tags

Section 3 OSI Model

Last updated 1:49 PM on 4/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

145 Terms

1
New cards

What is the OSI model used for?

Categorizing network functions and aiding troubleshooting.

2
New cards

What model do modern networks primarily use?

The TCP/IP model.

3
New cards

Name the 7 OSI layers in order.

Physical, Data Link, Network, Transport, Session, Presentation, Application

4
New cards

What are the data names at each OSI layer?

Bits (L1), Frames (L2), Packets (L3), Segments (L4), Data (L5–L7).

5
New cards

What happens at the Physical Layer?

Transmission of bits across the network using physical/electrical characteristics

6
New cards

What is the data type at Layer 1?

Bits (1s and 0s).

7
New cards

How does copper wire represent bits?

Voltage levels (0V for 0, +5V/−5V for 1).

8
New cards

How does fiber optic represent bits?

Light on = 1, light off = 0.

9
New cards

What connector is used for CAT5/CAT6 cables?

RJ‑45.

10
New cards

What are the two Ethernet wiring standards?

TIA/EIA‑568A and TIA/EIA‑568B.

11
New cards

What is a crossover cable?

568A on one end, 568B on the other.

12
New cards

What is a straight‑through cable?

568B on both ends.

13
New cards

Name the common physical topologies.

Bus, Ring, Star, Hub‑and‑Spoke, Full Mesh, Partial Mesh.

14
New cards

What is asynchronous communication?

Uses start/stop bits for out‑of‑sync transmission.

15
New cards

What is synchronous communication?

Real‑time communication using a common time source.

16
New cards

What is broadband?

Divides bandwidth into separate channels (e.g., cable TV).

17
New cards

What is baseband?

Uses the entire frequency of the cable all the time (e.g., telephone).

18
New cards

What is multiplexing?

Efficiently sharing a limited resource so multiple users can access it.

19
New cards

What is TDM?

Time Division Multiplexing — dedicated time slots.

20
New cards

What is StatTDM?

Dynamically allocates time slots based on demand.

21
New cards

What is FDM?

Frequency Division Multiplexing — divides medium into channels.

22
New cards

Name common Layer 1 media types.

Fiber optic, Ethernet, Coaxial.

23
New cards

Name wireless Layer 1 media.

Bluetooth, Wi‑Fi, NFC.

24
New cards

Name Layer 1 infrastructure devices.

Hubs, Access Points, Media Converters.

25
New cards

What logic do Layer 1 devices perform?

None — they simply repeat what they receive.

26
New cards

What is the primary job of the Data Link Layer?

Packaging bits from Layer 1 into frames and transmitting them across the network.

27
New cards

What key functions does Layer 2 perform?

Error detection/correction, MAC addressing, and flow control.

28
New cards

What is the data type at Layer 2?

Frames.

29
New cards

What is a MAC address?

A unique 48‑bit physical address assigned to every NIC.

30
New cards

How is a MAC address written?

In hexadecimal.

31
New cards

What do the first 24 bits of a MAC address represent?

The manufacturer (OUI).

32
New cards

What do the last 24 bits of a MAC address represent?

The specific device identifier.

33
New cards

Why are MAC addresses important?

Unique identifiers for devices on a network

34
New cards

What does LLC provide?

Connection services and message acknowledgment.

35
New cards

What is LLC’s basic form of flow control?

Limiting data sent to prevent receiver overwhelm.

36
New cards

How does LLC detect corrupted frames?

Using a checksum.

37
New cards

What is isochronous communication?

Uses a common reference clock with time slots and less overhead.

38
New cards

What is synchronous communication at Layer 2?

Devices share the same clock and use control characters for frame boundaries.

39
New cards

What is asynchronous communication at Layer 2?

Devices use their own clocks with no strict timing control.

40
New cards

Name common Layer 2 devices.

NICs, Bridges, Switches.

41
New cards

What makes switches “intelligent”?

They learn MAC addresses and forward frames selectively.

42
New cards

What table do switches use to map MAC addresses to ports?

Content Addressable Memory table.

43
New cards

What does selective forwarding enable?

Sending data only to the intended destination port.

44
New cards

What is the main responsibility of the Network Layer?

Routing and forwarding traffic using logical addresses.

45
New cards

What is the data type at Layer 3?

Packets.

46
New cards

What are the two IP variants used for logical addressing?

IPv4 and IPv6.

47
New cards

How is IPv4 written?

Dotted‑octet notation (e.g., 172.16.254.1).

48
New cards

What older protocols were replaced by IP?

AppleTalk and IPX.

49
New cards

What is packet switching?

Dividing data into packets and forwarding them independently.

50
New cards

What is circuit switching?

Establishing a dedicated communication link between two devices.

51
New cards

What is message switching?

Sending data as messages that may be stored and forwarded.

52
New cards

What do routers maintain to determine the best path?

Routing tables.

53
New cards

What do dynamic routing protocols like RIP and OSPF do?

Share and update route information between routers.

54
New cards

What do routing protocols decide?

How data flows across the network and how routers communicate path info.

55
New cards

What does Layer 3 add to Layer 2 services?

Flow control and packet reordering.

56
New cards

Why is packet reordering needed?

To ensure packets arrive and reassemble in the correct order.

57
New cards

What is ICMP (Internet Control Message Protocol) used for?

Sending error messages and operational information.

58
New cards

What does PING do?

Tests connectivity and response times.

59
New cards

What does traceroute do?

Traces the path a packet takes through the network.

60
New cards

Name common Layer 3 devices.

Routers and multi‑layer switches.

61
New cards

When is a switch considered a Layer 3 device?

Only when specifically identified as a multi‑layer switch.

62
New cards

Name common Layer 3 protocols.

IPv4, IPv6, ICMP.

63
New cards

What is the Transport Layer responsible for?

Providing end‑to‑end communication between devices and dividing upper vs. lower OSI layers.

64
New cards

What is the data type at Layer 4?

Segments (TCP) and Datagrams (UDP).

65
New cards

Is TCP connection‑oriented or connectionless?

Connection‑oriented.

66
New cards

What makes TCP reliable?

Acknowledgments, sequencing, retransmissions, and flow control.

67
New cards

What is the TCP three‑way handshake?

SYN → SYN‑ACK → ACK.

68
New cards

What does TCP use for flow control?

Windowing.

69
New cards

When is TCP used?

When data must be guaranteed to reach its destination.

70
New cards

Is UDP connection‑oriented or connectionless?

Connectionless.

71
New cards

Is UDP reliable?

No — no acknowledgments, sequencing, or retransmissions.

72
New cards

What is UDP commonly used for?

Audio and video streaming.

73
New cards

What is the data type for UDP?

Datagram.

74
New cards

List key TCP characteristics.

Reliable, connection‑oriented, sequencing, acknowledgments, windowing, retransmissions.

75
New cards

List key UDP characteristics.

Unreliable, connectionless, no sequencing, no acknowledgments, no windowing.

76
New cards

What does windowing allow?

Adjusting the amount of data sent before requiring an acknowledgment.

77
New cards

Why adjust the window size?

To optimize throughput and bandwidth.

78
New cards

What is buffering?

Allocating memory to store segments when bandwidth isn’t available.

79
New cards

What is a buffer?

Temporary storage for segments.

80
New cards

Why is buffering important?

Prevents overflow by clearing stored segments.

81
New cards

What protocols operate at Layer 4?

TCP and UDP.

82
New cards

What devices operate at Layer 4?

WAN accelerators, load balancers, and firewalls.

83
New cards

What is the main purpose of the Session Layer?

Managing sessions and keeping conversations separate so data doesn’t intermingle.

84
New cards

What happens when a session is set up?

User credentials are checked and session numbers are assigned.

85
New cards

What does maintaining a session involve?

Continuous data transfer and acknowledging data.

86
New cards

What happens if a connection breaks?

The session must be re‑established.

87
New cards

How is a session terminated?

By mutual agreement or when one party disconnects.

88
New cards

What is H.323 used for?

Setting up, maintaining, and tearing down voice/video connections over RTP.

89
New cards

What is NetBIOS used for?

File sharing between computers, commonly in Windows environments.

90
New cards

Are there specific hardware devices for Layer 5?

No — Layer 5 issues involve software and protocols, not physical devices.

91
New cards

What is the main purpose of the Presentation Layer?

Formatting data for exchange and securing it through encryption.

92
New cards

Why does Layer 6 format data?

To ensure compatibility between different devices.

93
New cards

What does ASCII provide?

A text‑based language ensuring data is readable and properly structured.

94
New cards

What does Layer 6 negotiate for Layer 7?

Data transfer syntax.

95
New cards

Name common text formats.

ASCII, Unicode, EBCDIC.

96
New cards

Name common image formats.

GIF, JPEG, TIFF, SVG, PNG.

97
New cards

Name common movie/video formats.

MP4, MPEG, MOV.

98
New cards

Why is encryption used at Layer 6?

To scramble data and provide confidentiality during transit and storage.

99
New cards

What is TLS used for?

Creating an encrypted tunnel for secure data transfer.

100
New cards

What older encryption protocol did TLS replace?

SSL.