7 Layer OSI Model
What are the seven layers of the OSI Model (1-7)
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
TCP
3 way handshake is known as a ______ handshake
Internet of Things (IoT) Domain Security Energy Managment
Cisco caters to which tech markets? __________, ____________, and ____________
networking hardware and telecommunications equipment
Cisco develops, manufactures, and sells ____________ ________, _________ ____________, and other technology services and products
San Jose California
Cisco headquarters is in ______________ ?
Application Layer
End User Layer HTTP, FTP, IRC, SSH, DNS
Transport Layer
End to End Connections TCP, UDP
Data Link Layer
Frames Ethernet, PPP, Switch, Bridge
Physical Layer
Layer 1, This layer represents the electrical and physical representation of the system. This can include everything from the cable type, radio frequency link (as in an 802.11 wireless systems), as well as the layout of pins, voltages and other physical requirements. When a networking problem occurs, many networking pros go right to the physical layer to check that all of the cables are properly connected and that the power plug hasn't been pulled from the router, switch or computer, for example.
Data Link Layer
Layer 2, This Layer provides node-to-node data transfer (between two directly connected nodes), and also handles error correction from the physical layer. Two sublayers exist here as well - the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. In the networking world, most switches operate at Layer 2.
Network Layer
Layer 3, This layer is where you'll find most of the router functionality that most networking professionals care about and love. In its most basic sense, this layer is responsible for packet forwarding, including routing through different routers. You might know that your Boston computer wants to connect to a server in California, but there are millions of different paths to take. Routers at this layer help do this efficiently.
Transport Layer
Layer 4, This Layer deals with the coordination of the data transfer between end systems and hosts. How much data to send, at what rate, where it goes, etc. The best known example of this layer Layer is the Transmission Control Protocol (TCP), which is built on top of the Internet Protocol (IP), commonly known as TCP/IP. TCP and UDP port numbers work at Layer 4, while IP addresses work at Layer 3, the Network Layer.
Session Layer
Layer 5, When two devices, computers or servers need to "speak" with one another, a session needs to be created, and this is done at this layer. Functions at this layer involve setup, coordination (how long should a system wait for a response, for example) and termination between the applications at each end of the session.
Application Layer
Layer 7, At the top, what most users see, Applications that operate at layer 7 are ones in which the user interacts with directly. Example: Web Browser (Chrome, Firefox, Safari) also apps like skype, Outlook, Office
Network Layer
Packets IP, ICMP, IPSec, IGMP
Physical Layer
Physical Structure coax, fiber, wireless, hubs, repeaters
authentication
SSL is known as a _________ protocol
Transport
SSL is the predecessor to the ______ layer
web server and browser
SSL technologies creat secure links between a _______ _______ and a _________ to ensure private and itegral data transmission.
Session Layer
Synch and send to port API's, Sockets, WinSock
Presentation Layer
Syntax Layer SSL, SSH, IMAP, FTP, MPEG, JPEG
connection
TCP is a ________ oriented protocol, which means a connection is established and maintained until thhe application programs at each end have finshed exchanging messages.
Layer 4 (transport layer) Layer 5 (Session Layer)
TCP is the 7 layer osi model cover parts of layer _____ and Layer _______
Internet Protocol (IP)
TCP works with _______ ________, which defines how computers send packets of data to eachother.
handshaking dialogs
UDP does not employ ________ __________ for reliability, ordering, and data integrity. The protocol assumes that error-checking and correction is not required, thus avoiding procession at the network interface level
Video Conferencing and real time computer games
UDP is widely used in _______ _______ and real time ______ ________
Asymetric
Upload speeds are slower than download speeds. This type of network is used in small businesses and home enviornments where more downloading is done versus uploading
SIP (Session Initiation Protocol)
Used to initiate a session between two end points, does not carry any video or voice data, merely used to allow two endpoints to set up a connection. Routed through many different proxy servers before reaching its destination. Uses 408 as the error code and 404 for 'not found'
SSL certificate
When using SSL for secure internet transactions, a web server needs a _______ ________ to secure a SSL Connection
TCP
________: Is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data.
authentication
process by which a network confirms that the user is who they say they are. Examples of this include passwords, two factor authentication, and SSL.
1. Asymmetrical connections are almost always less expensive 2. Uploads may be slow but downloads are fast
pros of asymmetrical connections 1. 2.
1. Symmetrical connection ensures your upload speeds arent stained 2.Faster file uploads: upload speeds are just as fast as download speeds 3.clouds depend on high upload speeds, and symmetrical connection produces high upload speeds
pros of symmetrical connection 1. 2. 3. 4.
Secure Sockets Layer (SSL)
standard protocol used for secure transmission of documents over a network
Transport Control Protocol
SSL uses _______ _______ ________ for communication
Presentation Layer
Layer 6, This layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer "presents" data for the application or the network. A good example of this is encryption and decryption of data for secure transmission.
UDP
________ is part of the internet protocol suite used by programs running on different computers on a network. UDP is used to send short messages called datagrams but overall, it is an unreliable, connectionless protocol
UDP
___________ is an open systems interconnection transport layer protocol for client-server network applications
Asymmetric
___________ network is very common for both service providers and larger enterprise networks due to the nature of routing within a large complex environment that has multiple entry and exit points
RTP (Real-time Transport Protocol)
network protocol that is responsible for the delivery of audio and video over IP networks. Used in communication and streaming, such as telephone and video conferences. Enables (VoIP) Voice over internet protocol. This protocol uses User Datagram Protocol because it allows for faster delivery
1. Data Integrity: Data is protected from tampering 2. Data Privacy: Data Privacy is ensured through a series of protocols such as SSL Handshake Protocol 3. Client Server Authentication; SSL protocol uses standard cryptographic techniques to authenticate the client and server
the objectives of SSL are: 1. 2. 3.
Network
the word socket in secure sockets layer refers to the transferring of data between a client and a server over a _________
1. client node send a SYN data packet over an IP network to a server on the same external network ( done to ask if the server is open for connection) 2. the target server must have open ports that can accept and intiate new connection. once it recieives the SYN from the client it responds with confirmation reciept (ACK Packet) 3. the client node receives the ACK packet from the server and responds with an ACK Packet Once these three steps are done, the connection is created and the host and server can communicate
three way handshake: 1. 2. 3.
builds on passwords to create significantly more robust security solution. An example of this would be entering a password into a system and then receiving an authentication code sent to your email/cell phone
two factor authentication is?
symmetric
upload speeds just as fast as download speeds. This type of networking is commonly used in larger businesses that operate off of a cloud
User datagram protocol
what does UDP mean?
Local Area Network (LAN)
Cisco pioneered the concept of__________ __________ ____________which was used to connect computers over a multiprotocol router system
1984 Leonard Bosack Sandy Lerner
Cisco was founded in _____________ by _________ ________ and _______ _______
Transmission Control Protocol
What does TCP mean
it establishes the rules and standard procedures for the way information is communicated over the internet. It is the foundation for the internet as it exists today and ensures that data transmission is carried out uniformly.
Why is TCP important?