7 Layer OSI Model

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the seven layers of the OSI Model (1-7)

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

TCP

3 way handshake is known as a ______ handshake

Internet of Things (IoT) Domain Security Energy Managment

Cisco caters to which tech markets? __________, ____________, and ____________

networking hardware and telecommunications equipment

Cisco develops, manufactures, and sells ____________ ________, _________ ____________, and other technology services and products

San Jose California

Cisco headquarters is in ______________ ?

Application Layer

End User Layer HTTP, FTP, IRC, SSH, DNS

Transport Layer

End to End Connections TCP, UDP

Data Link Layer

Frames Ethernet, PPP, Switch, Bridge

Physical Layer

Layer 1, This layer represents the electrical and physical representation of the system. This can include everything from the cable type, radio frequency link (as in an 802.11 wireless systems), as well as the layout of pins, voltages and other physical requirements. When a networking problem occurs, many networking pros go right to the physical layer to check that all of the cables are properly connected and that the power plug hasn't been pulled from the router, switch or computer, for example.

Data Link Layer

Layer 2, This Layer provides node-to-node data transfer (between two directly connected nodes), and also handles error correction from the physical layer. Two sublayers exist here as well - the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. In the networking world, most switches operate at Layer 2.

Network Layer

Layer 3, This layer is where you'll find most of the router functionality that most networking professionals care about and love. In its most basic sense, this layer is responsible for packet forwarding, including routing through different routers. You might know that your Boston computer wants to connect to a server in California, but there are millions of different paths to take. Routers at this layer help do this efficiently.

Transport Layer

Layer 4, This Layer deals with the coordination of the data transfer between end systems and hosts. How much data to send, at what rate, where it goes, etc. The best known example of this layer Layer is the Transmission Control Protocol (TCP), which is built on top of the Internet Protocol (IP), commonly known as TCP/IP. TCP and UDP port numbers work at Layer 4, while IP addresses work at Layer 3, the Network Layer.

Session Layer

Layer 5, When two devices, computers or servers need to "speak" with one another, a session needs to be created, and this is done at this layer. Functions at this layer involve setup, coordination (how long should a system wait for a response, for example) and termination between the applications at each end of the session.

Application Layer

Layer 7, At the top, what most users see, Applications that operate at layer 7 are ones in which the user interacts with directly. Example: Web Browser (Chrome, Firefox, Safari) also apps like skype, Outlook, Office

Network Layer

Packets IP, ICMP, IPSec, IGMP

Physical Layer

Physical Structure coax, fiber, wireless, hubs, repeaters

authentication

SSL is known as a _________ protocol

Transport

SSL is the predecessor to the ______ layer

web server and browser

SSL technologies creat secure links between a _______ _______ and a _________ to ensure private and itegral data transmission.

Session Layer

Synch and send to port API's, Sockets, WinSock

Presentation Layer

Syntax Layer SSL, SSH, IMAP, FTP, MPEG, JPEG

connection

TCP is a ________ oriented protocol, which means a connection is established and maintained until thhe application programs at each end have finshed exchanging messages.

Layer 4 (transport layer) Layer 5 (Session Layer)

TCP is the 7 layer osi model cover parts of layer _____ and Layer _______

Internet Protocol (IP)

TCP works with _______ ________, which defines how computers send packets of data to eachother.

handshaking dialogs

UDP does not employ ________ __________ for reliability, ordering, and data integrity. The protocol assumes that error-checking and correction is not required, thus avoiding procession at the network interface level

Video Conferencing and real time computer games

UDP is widely used in _______ _______ and real time ______ ________

Asymetric

Upload speeds are slower than download speeds. This type of network is used in small businesses and home enviornments where more downloading is done versus uploading

SIP (Session Initiation Protocol)

Used to initiate a session between two end points, does not carry any video or voice data, merely used to allow two endpoints to set up a connection. Routed through many different proxy servers before reaching its destination. Uses 408 as the error code and 404 for 'not found'

SSL certificate

When using SSL for secure internet transactions, a web server needs a _______ ________ to secure a SSL Connection

TCP

________: Is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data.

authentication

process by which a network confirms that the user is who they say they are. Examples of this include passwords, two factor authentication, and SSL.

1. Asymmetrical connections are almost always less expensive 2. Uploads may be slow but downloads are fast

pros of asymmetrical connections 1. 2.

1. Symmetrical connection ensures your upload speeds arent stained 2.Faster file uploads: upload speeds are just as fast as download speeds 3.clouds depend on high upload speeds, and symmetrical connection produces high upload speeds

pros of symmetrical connection 1. 2. 3. 4.

Secure Sockets Layer (SSL)

standard protocol used for secure transmission of documents over a network

Transport Control Protocol

SSL uses _______ _______ ________ for communication

Presentation Layer

Layer 6, This layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer "presents" data for the application or the network. A good example of this is encryption and decryption of data for secure transmission.

UDP

________ is part of the internet protocol suite used by programs running on different computers on a network. UDP is used to send short messages called datagrams but overall, it is an unreliable, connectionless protocol

UDP

___________ is an open systems interconnection transport layer protocol for client-server network applications

Asymmetric

___________ network is very common for both service providers and larger enterprise networks due to the nature of routing within a large complex environment that has multiple entry and exit points

RTP (Real-time Transport Protocol)

network protocol that is responsible for the delivery of audio and video over IP networks. Used in communication and streaming, such as telephone and video conferences. Enables (VoIP) Voice over internet protocol. This protocol uses User Datagram Protocol because it allows for faster delivery

1. Data Integrity: Data is protected from tampering 2. Data Privacy: Data Privacy is ensured through a series of protocols such as SSL Handshake Protocol 3. Client Server Authentication; SSL protocol uses standard cryptographic techniques to authenticate the client and server

the objectives of SSL are: 1. 2. 3.

Network

the word socket in secure sockets layer refers to the transferring of data between a client and a server over a _________

1. client node send a SYN data packet over an IP network to a server on the same external network ( done to ask if the server is open for connection) 2. the target server must have open ports that can accept and intiate new connection. once it recieives the SYN from the client it responds with confirmation reciept (ACK Packet) 3. the client node receives the ACK packet from the server and responds with an ACK Packet Once these three steps are done, the connection is created and the host and server can communicate

three way handshake: 1. 2. 3.

builds on passwords to create significantly more robust security solution. An example of this would be entering a password into a system and then receiving an authentication code sent to your email/cell phone

two factor authentication is?

symmetric

upload speeds just as fast as download speeds. This type of networking is commonly used in larger businesses that operate off of a cloud

User datagram protocol

what does UDP mean?

Local Area Network (LAN)

Cisco pioneered the concept of__________ __________ ____________which was used to connect computers over a multiprotocol router system

1984 Leonard Bosack Sandy Lerner

Cisco was founded in _____________ by _________ ________ and _______ _______

Transmission Control Protocol

What does TCP mean

it establishes the rules and standard procedures for the way information is communicated over the internet. It is the foundation for the internet as it exists today and ensures that data transmission is carried out uniformly.

Why is TCP important?


Ensembles d'études connexes

Chapter 19: Advertising, Public Relations, and Sales Promotions

View Set

VALUES 9-JESUS AND THE PEOPLE OF HIS TIME

View Set

CISSP - Domain 8. Software Development Security

View Set

Lap 4 APUSH College Board test review

View Set