OSI Model

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

59 Terms

1
New cards

To standardize the process of networking, what was created?

The Open Systems Interconnection (OSI) model

2
New cards

What are the seven layers of the OSI?

  1. Physical Layer

  2. Data Link Layer

  3. Network Layer

  4. Transport Layer

  5. Session Layer

  6. Presentation Layer

  7. Application Layer

3
New cards

Application Layer (Layer 7)

  • The Topmost Layer

  • Involves communication between end-user applications (the program you interact with on your computer) and the network

    • This involves a user interface and protocols to allow communication

  • Services at this layer include web browsing, email, file transfer, and remote access

4
New cards

Hypertext Transfer Protocol (HTTP)

Used to retrieve content from web servers to enable web browsing

5
New cards

File Transfer Protocol (FTP)

Transfer files from client to server

6
New cards

Simple Mail Transfer Protocol (SMTP)

Sends electronic mail from clients to mail server, or between mail servers.

7
New cards

Secure Shell (SSH)

Remote access and command over another machine, with traffic encrypted

8
New cards

Presentation Layer (Layer 6)

  • Involves the from in which data is presented and is responsible for:

    • Data Translation: Ensuring the data sent by one system can be understood by the other.

    • Data Compression: Decreasing the size of data to increase efficiency

    • Data Encryption: Enhancing security by converting data into an unreadable format, reversible by the intended recipient

9
New cards

Data Translation

  • Necessary because not all systems represent data in the same way

  • Ex. Some systems use Little Endian and others use Big Endian, so we need to ensure data is translatable across systems

10
New cards

Data Compression

  • Allows us to optimize communication by reducing the number of bits that need to be transmitted across the network

  • Compression methods vary, but they tend to leverage patterns to reduce the amount of data needed to express the same concept.

11
New cards

Data Compression can be ___ or ___

lossless or lossy

12
New cards

Lossless Compression

The original data can be perfectly reconstructed (ex. ZIP files). This is essential for text files, executables, etc.

13
New cards

Lossy Compression

Less important or redundant data is removed entirely, resulting in loss. This is permissible when reducing size is more important than retaining quality

14
New cards

Session Layer (Layer 5)

  • Involves managing the session between two communicating devices - i.e., a single, continuous exchange of data.

  • Negotiating a session may involve:

    • Authentication: Verifying the identity of a user/device

    • Authorization: Checking permissions of a user/device

    • Agreeing on the structure of the conversation (e.g. who gets to talk and when)

15
New cards

For two (or more) applications to communicate across a network, a ___ must be established

Session

16
New cards

Each participant in a session receives a unique ___ to distinguish it from other traffic

identifier (a string, a UUID*, etc.)

17
New cards

Full Duplex

Allows both endpoints to communicate simultaneously (ex. video call). Most modern devices permit concurrent communication.

18
New cards

Half Duplex

Only allows one endpoint to communicate at a time (i.e. they must take turns).

19
New cards

Terms of a conversation must be ___. This decision is based on ___, not on physical medium

negotiated, protocol

20
New cards

Transport Layer (Layer 4)

  • Involves managing the traffic between hosts and destinations. Responsibilities include:

    • Segmentation: Breaking data into small chunks (i.e. segments) and reassembling them at the destination.

    • Flow Control: Adjusting the speed/quantity of data transmissions based on the receiver’s capacity

    • Error Control: Ensuring that data is delivered correctly, detecting corruption, and resubmitting lost data (if desired).

21
New cards

Flow Control

Ensures the host sends data at a rate that the destination can receive. One device may be able to transmit data more quickly than the other can accept it, which will lead to buffer overflow. The same can be true if the hose is sending data too slowly, leading to buffer underflow.

If this is a problem, the receiver can send data to the host explaining how much data it can accept, and the host can adjust its transmission speed.

22
New cards

What are the two most common Transport Layer protocols?

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

23
New cards

Transmission Control Protocol (TCP)

Allows for reliable, well-ordered transmission with error checking. It is used for web browsing, email, file transfers, etc., where correctness is more important than performance.

24
New cards

User Datagram Protocol (UDP)

Allows for unreliable, unordered transmission of data without error checking or flow control. It is used for voice calls, online video games, streaming services, etc. where performance is more important than reliability

25
New cards

Network Layer (Layer 3)

  • Involves routing packets across networks to ensure they arrive at the appropriate destinations (this is the layer in which routers are involved).

  • Elements of the Layer include:

    • Logical Addressing: Assigning and using logical addresses to identify devices across the network

    • Path Determination/Routing: Determining the optimal course through the network and moving packets along it.

26
New cards

The most prominent Network Layer protocol is called ___ ___, which is responsible for most logical addressing

Internet Protocol (IP)

27
New cards

Each device on a network has a unique ___ ___ that is used for routing purposes

IP Address

28
New cards

IP Addresses allow the network to __

send data to the appropriate destination

29
New cards

What are the two types of IP addresses?

IPv4 and IPv6

30
New cards

IPv4 Address

They are 32 bits total and are represented as four 8-bit decimal values divided by periods

ex. 192.168.5.12

31
New cards

The IP Address identifies both the ___ and the ___

network, host

32
New cards

The ___ ___ of the address is always at the beginning, and the ___ ___ of the address is always at the end

network portion, host portion

33
New cards

Originally, IPv4 addresses were divided into ___

classes

34
New cards

What does the class of an address determine?

How many bits were dedicated to the network and how many were dedicated to the host

35
New cards

Class A address

allows for a small number of networks with a large number of devices

These were intended for use by governments and very large organizations

Start: 0.0.0.0

End: 127.255.255.255

36
New cards

Class B address

Allows for more networks than class A, but fewer devices per network

These were intended for medium-sized organizations and internet service providers (ISPs)

Start: 128.0.0.0

End: 191.255.255.255

37
New cards

Class C address

Allows for a large number of networks with a smaller number of devices

These were intended for small businesses and personal home networks

Start: 192.0.0.0

End: 223.255.255.255

38
New cards

Class D address

Not used for standard networking. Instead, used for multicast communication

Multicasting means sending data to multiple (not all) hosts at once. Video calls, online games, etc.

Start: 224.0.0.0

End: 239.255.255.255

39
New cards

Class E address

Not used. These addresses are reserved for experimental purposes

Not used on the public Internet and are ostensibly for research and development purposes

Start: 240.0.0.0

End: 255.255.255.255

40
New cards

Classful Networking

Dividing IP address ranges

41
New cards

What are the issues with classful networking?

  • Fixed size: address space is assigned in fixed chunks; each network in a class will have the same number of host addresses assigned to it

  • Inefficiency: Assigned address space is too large; class A networks, for example, can have up to 16 million hosts each.

  • Space exhaustion: the two issues above causes us to run out of addresses more quickly than we otherwise would

42
New cards

What was introduced to solve the issues of classful networking?

Classless Inter-Domain Routing (CIDR)

43
New cards

Classless Inter-Domain Routing (CIDR)

Replaces classful networking with a more refined system that allows us to create networks of virtually any size though applying a network mask

44
New cards

Network Mask

A number of bits that specifies the size of the network portion for each individual network

45
New cards

Where does the Network Mask appear in an IP address?

at the end of the address, preceded by a forward slash

ex. 192.168.5.12/24

the number represents the first # of bits that are dedicated to the network portion, whereas the remainder of the bits are dedicated to the host portion

46
New cards

What do Network Masks look like in traditional classful addressing?

Class A: 255.0.0.0 (/8)

Class B: 255.255.0.0 (/16)

Class C: 255.255.255.0 (/24)

47
New cards

By taking a network mask and applying a ___ ___ operation with a given IP address, you produce the ___ ___

bitwise AND, network address

Bitwise AND opreationg compares two bits. If both are 1, corresponding bit is 1. Otherwise, it is 0.

48
New cards

IPv6 Addresses

  • Intended to solve the problem of exhausting address space

  • 128 bits and are represented using eight groups of four hexits separated by colons.

  • Ex. 2001:0DB8:85A3:0000:0000:8A2E:0370:7334

  • Highly unlikely to exhaust this address space

49
New cards

Because IPv6 addresses are so long, we often abbreviate them by doing what?

Eliminating leading 0’s and (once per address) replacing and entire block of 0’s with a double colon (::)

ex. 2001:DB8:85A3::8A2E:370:7334

50
New cards

For what reasons is IPv6 still not widely used?

  • Address exhaustion was not as significant an issue with IPv4 as was expected

  • Changing systems is costly and effort-intesnvie

  • IPv6 is not backwards compatible with IPv4, making integration difficult

51
New cards

Data Link Layer (Layer 2)

  • Involves organizing raw bits from the Physical Layer (Layer 1) into frames containing information about the source and destination, the payload, and error checking mechanisms

  • Includes Media Access Control (MAC) addresses, which facilitate access to physical devices on the same network

52
New cards

Media Access Control (MAC) Address

Address used for communication in the Data Link Layer

53
New cards

MAC addresses are assigned to the __ __ __ by the manufacturer

Network Interface Card (NIC) - the hardware that handles Layer 2 data transmission and reception

54
New cards

Each MAC Address is ___ and is ___ into the device itself, meaning it cannot be changed by conventional means

unique, hardcoded

55
New cards

MAC Addresses are typically ___ bit addresses displayed as ___ hexits

48, 12

Windows: 00-1A-2B-3C-4D-5E

56
New cards

MAC Addresses are used to ___ individual devices at Layer 2

Identify

57
New cards

IP addresses can ___; ISPs may provide new ___, or the device may ___ between networks

change, addresses, move

58
New cards

True or False: MAC Addresses will change when going to new networks or changing networks

False

59
New cards

Physical Layer (Layer 1)

  • Involves the raw, physical transmission of signals across media

  • Digital data is communicated through hardware in the form of electric signals, light pulses, radio waves, etc.

  • The Physical Layer exists independently of meaning; the data is just a physical signal - raw bits. Assigning significance is the responsibility of higher layers.