OSI Model (Network+ 009)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:05 PM on 3/31/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

58 Terms

1
New cards

Open Systems Interconnection (OSI)

Developed in 1977

- A reference model used to categorize the functions of a network.

- Useful for Troubleshooting

- Has 7 Layers

2
New cards

Layer 1: Physical

Data in layer 1 is bits.

3
New cards

Layer 2: Data Link

Data in Layer 2 is called Frames

4
New cards

Layer 3: Network

Data in Layer 3 is called Packets.

5
New cards

Layer 4: Transport

TCP: Segments

UDP: Datagrams

6
New cards

Layer 5: Session

Data in Layer 5 is called Data

7
New cards

Layer 6: Presentation

Data in Layer 6 is called Data

8
New cards

Layer 7: Application

Data in Layer 7 is called Data

9
New cards

What are the two types of transition modulation and how do they work?

Copper Wire: Uses voltage (0V for 0, +5V/-5V for 1)

Fiber Optic: Uses light (on for 1, off for 0)

10
New cards

What's the difference between crossover and straight-through cables?

Crossover: TIA/EIA-568A on one end, 568B on the other

Straight-through: TIA/EIA-568B on both ends

11
New cards

What's the difference between broadband and baseband?

Broadband: Divides bandwidth into separate channels (e.g., cable TV)

Baseband: Uses all frequency all the time (e.g., telephone)

12
New cards

What are the three types of multiplexing?

TDM (Time Division): Allocates dedicated time slots

StatTDM (Statistical TDM): Dynamically allocates time slots

FDM (Frequency Division): Divides medium into channels

13
New cards

Name 3 Layer 1 devices

Hubs, Access Points, Media Converters, Cables

14
New cards

What is the key characteristic of Layer 1 devices?

They simply repeat whatever they receive - no logic or decision-making

15
New cards

What is a MAC address and what is its structure?

48-bit physical address assigned to every NIC

Written in hexadecimal

First 24 bits: Manufacturer ID

Last 24 bits: Specific device ID

16
New cards

What are the two main functions of the Data Link Layer?

Logical Link Control (LLC) - connection services, flow control, error detection

MAC addressing - device identification

17
New cards

What are the three synchronization methods at Layer 2?

Isochronous: Common reference clock, time slots

Synchronous: Same clock, frames with control characters

Asynchronous: Own clock cycles, no strict timing

18
New cards

Name 3 Layer 2 devices

NICs, Bridges, Switches

19
New cards

How do switches operate?

Use CAM tables with MAC addresses to identify physical ports and selectively transmit data to specific devices

20
New cards

What does LLC provide?

Connection services, acknowledgment of messages, flow control, and checksum for error detection

21
New cards

What are the two main logical addressing schemes?

IPv4: Dotted octet notation (e.g., 172.16.254.1)

IPv6:

22
New cards

What are the three switching/routing methods?

Packet Switching: Data divided into packets (most common)

Circuit Switching: Dedicated communication link

Message Switching: Messages stored and forwarded

23
New cards

What does ICMP stand for and what are its two main uses?

Internet Control Message Protocol

PING: Tests connectivity and response times

Traceroute: Traces packet route through network

24
New cards

Name 3 Layer 3 devices/protocols

Routers, Multi-layer switches, IPv4, IPv6, ICMP

25
New cards

What is the difference between a regular switch and a multi-layer switch?

Regular switch: Layer 2 only

Multi-layer switch: Combines Layer 2 switch and Layer 3 router features

26
New cards

What is the Three-Way Handshake?

SYN (Synchronization)

SYN-ACK (Synchronization-Acknowledgement)

ACK (Acknowledgement)

27
New cards

TCP

Reliable

Connection-oriented

Uses three-way handshake

Acknowledgments and retransmission

Windowing and flow control

Sequencing

28
New cards

UDP

Unreliable

Connectionless

No handshake

No acknowledgments or retransmission

No windowing

No sequencing

29
New cards

When would you use TCP vs UDP?

TCP: Network data that must reach destination (web, email, file transfer)

UDP: Audio/visual streaming where speed matters more than reliability

30
New cards

What is windowing?

Allows clients to adjust the amount of data in each segment to optimize throughput; can open or close based on retransmissions

31
New cards

What is buffering at Layer 4?

Temporary memory storage for segments when bandwidth isn't readily available

32
New cards

Name 3 Layer 4 devices/protocols

TCP, UDP, WAN accelerators, Load balancers, Firewalls

33
New cards

What are the three main functions of the Session Layer?

Setting up sessions (credentials, session numbers)

Maintaining sessions (data transfer, acknowledgments)

Tearing down sessions (ending communication)

34
New cards

Name 2 Layer 5 protocols and their purposes

H.323: Sets up/maintains/tears down voice and video (uses RTP)

NetBIOS: File sharing over network (Windows file sharing)

35
New cards

What happens if a session breaks during maintenance?

It requires re-establishment of the connection

36
New cards

What does the Session Layer ensure?

Separate conversations to prevent data intermingling between different sessions

37
New cards

What are the two main functions of the Presentation Layer?

Data Formatting (compatibility between devices)

Encryption (data security)

38
New cards

Name 3 text format types

ASCII, Unicode, EBCDIC

39
New cards

Name 3 image formats

GIF, JPEG, PNG, TIFF, SVG

40
New cards

Name 3 movie formats

MP4, MPEG, MOV

41
New cards

Name 3 scripting languages at Layer 6

HTML, XML, PHP, JavaScript

42
New cards

What encryption protocols work at Layer 6?

TLS (Transport Layer Security), SSL (Secure Sockets Layer)

43
New cards

What does TLS do?

Creates an encrypted tunnel to protect sensitive information during transfer

44
New cards

What does the Application Layer provide?

Application-level services where users communicate with the computer

45
New cards

Name the email protocols (3)

POP3 (Post Office Protocol 3)

IMAP (Internet Message Access Protocol)

SMTP (Simple Mail Transfer Protocol)

46
New cards

Name the web browsing protocols (2)

HTTP, HTTPS

47
New cards

Name the file transfer protocols (3)

FTP, FTPS, SFTP

48
New cards

Name the remote access protocols (3)

Telnet, SSH, SNMP

49
New cards

What is DNS?

Domain Name Service - translates domain names to IP addresses

50
New cards

What is service advertisement?

Applications send announcements to advertise their services on the network (e.g., printers, file servers)

51
New cards

What is encapsulation?

The process of putting headers (and sometimes trailers) around data as it moves DOWN the OSI model (Layer 7→1)

52
New cards

What is decapsulation?

Removing headers/trailers to access original data as it moves UP the OSI model (Layer 1→7)

53
New cards

Name 6 TCP control flags

SYN: Synchronize connection

ACK: Acknowledgment

FIN: Tears down connection

RST: Reset when unexpected packet received

PSH: Prioritizes data

URG: Marks data as urgent

54
New cards

What information is in a TCP header? (Name 5 mandatory fields)

Source port

Destination port

Sequence number

Acknowledgment number

Control flags

Window size

Checksum

55
New cards

What information is in an IP header? (Name 5 fields)

Version

Source IP

Destination IP

TTL (Time to Live)

Protocol

Header checksum

56
New cards

What information is in an Ethernet header?

Source MAC address

Destination MAC address

EtherType field (IPv4/IPv6)

Optional VLAN tag

57
New cards

What is the Maximum Transmission Unit (MTU) for Ethernet? What are Jumbo Frames?

1500 bytes

Frames larger than 1500 bytes (requires reconfiguring MTU)

58
New cards

What is the minimum payload size?

46 bytes (no VLANs)

42 bytes (with VLANs)