OSI Model (Section 2)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

Protocol

A set of rules for formatting and processing data. Network protocols are like a common language for computers, allowing them to commuinicate

2
New cards
<p>OSI Model</p>

OSI Model

Open System Interconnection Model. A layered approach to how computers/devices communicate. Created to achieve interoperability of diverse vendor devices. Each layer describes a different set of unique functions, composed of various types of hardware and software

Partitions communication systems into abstraction layers.

Protocols are the standard terms that computers use to understand each other

  • Layer 1: Physical (ex: cables)

  • Layer 2: Data Link (ex: switch)

  • Layer 3: Network (ex: router)

  • Layer 4: Transport (ex: firewall)

  • Layer 5: Session

  • Layer 6: Presentation

  • Layer 7: Application

(Layer 7-5 = all software, 1-3 = responsible for movement of data, Layer 4 = sits on top of the communication)

Please Do Not Throw Sausage Pizza Away (mnemonic device), or All People Seem To Need Data Processing (7-1)

<p>Open System Interconnection Model. A layered approach to how computers/devices communicate. Created to achieve interoperability of diverse vendor devices. Each layer describes a different set of unique functions, composed of various types of hardware and software</p><p>Partitions communication systems into abstraction layers.</p><p>Protocols are the standard terms that computers use to understand each other</p><ul><li><p>Layer 1: Physical (ex: cables)</p></li><li><p>Layer 2: Data Link (ex: switch)</p></li><li><p>Layer 3: Network (ex: router)</p></li><li><p>Layer 4: Transport (ex: firewall)</p></li><li><p>Layer 5: Session</p></li><li><p>Layer 6: Presentation</p></li><li><p>Layer 7: Application</p></li></ul><p></p><p>(Layer 7-5 = all software, 1-3 = responsible for movement of data, Layer 4 = sits on top of the communication)</p><p>Please Do Not Throw Sausage Pizza Away (mnemonic device), or All People Seem To Need Data Processing (7-1)</p>
3
New cards

Layer 1 (OSI Model)

Physical: Converts bits into electrical signal over copper cables, or pulses of light for fiber optic cables, or radiofrequency for wireless communication

Physical topologies

Devices: Cables, Connectors, wireless access point, hub, modems, etc

Common connections/cables:

  • EIA/TIA-232 and EIA/TIA-449

  • High-Speed Serial Interface (HSSI)

  • Synchronous Optical Networking (SONET)

  • V.24 and V.35

  • Integrated Services Digital Network (ISDN)

  • Digital Subscriber Line (DSL)

  • 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX

4
New cards

Layer 2 (OSI Model)

Data Link: Provides communication within the same network via MAC addresses

Gets packets from the Network Layer

Transmits frames

Detects errors within frames (but doesn’t correct them)

Converts information into bits

Uses MAC/Hardware addresses to communicate

Moves data to the next physically connected device

Two sublayers:

  • Logical Link Layer (LLC): Upper sublayer, provides flow control and error control

  • Media Access Control (MAC): Manages protocol access to the physical network medium. It’s responsible for the addressing and channel access control mechanisms that enable several nodes to communicate within a network, typically using a MAC address

Devices: Switches and bridges

Common Protocols:

  • Address Resolution Protocol (ARP): Resolves IP into MAC

  • Reverse Address Resolution Protocol (RARP): Resolves MAC into IP addresses

  • Point-to-Point Protocol (PPP)

  • Serial Line Internet Protocol (SLIP)

  • Layer 2 Forwarding (L2F)

  • Layer 2 Tunneling Protocol (L2TP)

  • Point to Point Tunneling Protocol (PPTP)

  • Ethernet (IEEE 802.3) - only remaining

  • Fiber Distributed Data Interface (FFDI)

  • Asynchronous Transfer Mode (ATM)

  • Copper DDI (CDDI)

5
New cards

Layer 3 (OSI Model)

Network: Provides communication between different networks via IP addresses. Moves data between two hosts that are not generally physically connected. Uses IP

IP is at this layer. IP doesnt use guarantee delivery as its not a connection oriented communication (it only finds the best delivery route)

Uses routing tables to deliver info

Common protocols:

  • Internet Protocol

  • Internet Control Message Protocol (ICMP)

  • Routing Information Protocol (RIP)

  • Open Shortest Path First (OSPF)

  • Border Gateway Protocol (BGP)

  • Supports multicasting

  • Internetwork Packet Exchange (IPX)

  • Internet Protocol Security (IPSec)

  • Network Address Translation (NAT)

  • Simple Key Management for Internet Protocols (SKIP)

6
New cards

Layer 4 (OSI Model)

Transport: Handles the End-to-End communication either via TCP for connection-oriented communication or UDP for connectionless communication

One of the busiest layers. Creates an end-to-end transport between peer hosts. Responsible for checking the data. UDP is connectionless and known as “best effort”, TCP is connection oriented and known as reliable (TCP uses flags). Port numbers are assigned at this layer

Common protocols:

  • Transmission Control Protocol (TCP): full-duplex connection-oriented

  • User Datagram Protocol (UDP): simplex connectionless

  • Secure Sockets Layer (SSL)

  • Transport Layer Security (TLS)

  • Sequenced Packet Exchange (SPX)

  • TCP and UDP ports

  • Well-known ports: Ports 0-1023

  • Registered ports: Ports 1024-49151, registered by vendors

  • Dynamic or Private Ports: Ports 49152-65535

Ports help tell the machine what kind of data it is

7
New cards

Layer 5 (OSI Model)

Session: Provides dialog control by allowing multiple persistent connections from different sources to be properly combined or synchronized.

Provides a logical persistent connection between peer hosts; basically manages conversation between applications exchanging data.

Creates, monitors, and tears down sessions

Full Duplex (send and receive data simultaneously - ex. switch), Half Duplex (only send or receive at a time - ex. hub), Simplex (a device that can only send data - ex. satellite)

Protocols:

  • Network File System (NFS)

  • Structured Query Language (SQL)

  • NetBIOS

  • Remote Procedure Call (RPC)

8
New cards

Layer 6 (OSI Model)

Presentation: Gets the data ready for the application layer by converting, translating, encoding, compressing, and encrypting data.

This layer is concerned about formatting the data. Main services:

  • Data Conversion

  • Character Code Translation

  • Compression

  • Encryption/Decryption

Format examples:

  • American Standard Code for Information Interchange (ASCII)

  • Extended Binary-Coded Decimal Interchange Mode (EBCDIC)

  • Tagged Image File Format (TIFF)

  • Joint Photographic Experts Group (JPEG)

  • Motion Picture Experts Group (MPEG)

  • Musical Instrument Digital Interface (MIDI)

9
New cards

Layer 7 (OSI Model)

Application: Generates data to be transmitted, processes data that is received. Application refers to application-level protocols and services used by end-user applications to communicate/send data over a network.

The entry door to network services at a lower level. Apps use this layer to get services when they transfer or receive data over a network.

Applications sit on top of this layer

Responsible for interfacing user applications, network mgmt. services, remote access, etc.

Prone to hackers

ex protocols in this layer:

  • Simple Mail Transfer Protocol (SMTP) - 25

  • Simple Network Management Protocol (SNMP) - 161

  • Hypertext Transfer Protocol (HTTP) - 80

  • Line Printer Daemon (LPD)

  • File Transfer Protocol (FTP) - 21

  • Telnet - 23

  • Trivial File Transfer Protocol - 69

  • Electronic Data Interchange (EDI)

  • Post Office Protocol version 3 (POP3) - 110

  • Internet Message Access Protocol (IMAP) - 143

  • Network News Transport Protocol (NNTP)

  • Secure Remote Procedure Call (S-RPC) RPC - Session

  • Secure Electronic Transaction (SET)

10
New cards

Encapsulation/De-encapsulation

When data goes from one machine to another, data is encapsulated into different things (Data Stream>Segment/Datagram>Packet>Frame>Bits), and then de-encapsulated upon arrival in reverse order.

Ex: Segment section may add port number to the Data Stream, Packet adds IP address, Frame adds MAC address

Dont Stop Pouring Free Beer mnemonic

<p>When data goes from one machine to another, data is encapsulated into different things (Data Stream&gt;Segment/Datagram&gt;Packet&gt;Frame&gt;Bits), and then de-encapsulated upon arrival in reverse order. </p><p>Ex: Segment section may add port number to the Data Stream, Packet adds IP address, Frame adds MAC address</p><p></p><p>Dont Stop Pouring Free Beer mnemonic</p>
11
New cards

At which layer of the OSI model does the encapsulation process begin?

Answer: application