• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/90

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

90 Cards in this Set

  • Front
  • Back
OSI Layer Services: service user
the OSI layer that requests services from an adjacent OSI layer
OSI Layer Services: service provider
the OSI layer that provides services to service users
OSI Layer Services: service access point (SAP)
a conceptual location at which one OSI layer can request the services of another OSI layer (kinda like the border between layers)
Internetworking evolved as a solution to three key problems:
isolated LANs, duplication of resources, and a lack of network management
control information
headers & trailers added to data at different layers of the osi model.
OSI Model: Physical Layer
the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. Physical layer specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical connectors. Physical layer implementations can be categorized as either LAN or WAN specifications.
OSI Model: Data Link Layer
provides reliable transit of data across a physical network link. Different data link layer specifications define different network and protocol characteristics, including physical addressing (ie MAC addresses), network topology (bus, ring), error notification, sequencing of frames, and flow control. split into Logical Link Control (LLC) and Media Access Control (MAC)
OSI Model: Data Link Layer: Logical Link Control Layer
manages communications between devices over a single link of a network.IEEE 802.2. supports both connectionless and connection-oriented services
OSI Model: Data Link Layer: Media Access Control Layer
manages protocol access to the physical network medium. IEEE MAC specification defines MAC addresses
OSI Model: Network Layer
defines the network address. defines the logical network layout. IP lives here.
OSI Model: Transport Layer
TCP & UDP live here. segments the data for transport across the network. responsible for making sure that the data is delivered error-free and in the proper sequence. Flow control. Virtual circuits are established, maintained, and terminated by the transport layer. error checking, error recovery.
OSI Model: Session Layer
establishes, manages, and terminates communication sessions. Some examples of session-layer implementations include Zone Information Protocol (ZIP), the AppleTalk protocol ; and Session Control Protocol (SCP), the DECnet Phase IV session layer protocol.
OSI Model: Presentation Layer
provides a variety of coding and conversion functions that are applied to application layer data. ensure that information sent from the application layer of one system would be readable by the application layer of another system. Some examples of presentation layer coding and conversion schemes include common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes. Think ASCII, JPEG, 3DES, etc...
OSI Model: Application Layer
interacts directly with user. Telnet, File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP), HTTP. functions typically include identifying communication partners, determining resource availability, and synchronizing communication
frame, packet, datagram, segment, message, cell
frame - data link layer
packet - network layer
datagram - network layer (connectionless)

segment - transport layer
message - application layer
cell - data link layer for ATM & SMDS (contains 5 byte header & 48 byte payload
service data units (SDUs), protocol data units, bridge protocol data units (BPDUs)
SDU - information units from upper-layer protocols that define a service request to a lower-layer protocol

PDU - OSI terminology for a packet

BPDU - used by the spanning-tree algorithm as hello messages
end system (ES), intermediate system (IS), area, and autonomous system (AS)
ES - no routing or traffic forwarding ie desktop
IS - performs routing and traffic forwarding (ie routers, switches, bridges.) Interdomain and Intradomain IS's are defined
Area - logical group of network segments and their attached devices. subdivisions of an AS
AS - collection of networks under a common administration that share a common routing strategy (aka domain).
connectionless vs connection-oriented network services
layer 4. TCP vs UDP. TCP = establish connection, transmit, dissolve connection.
Data Link Layer Addresses
physical or hardware address. flat address space. pre-established and typically fixed relationship to a specific device
MAC Addresses
type of data link layer address. used in LANs. Defined by IEEE MAC spec.48 bits as 12 hex digits. First 6 are Organizationally Unique Identifier (OUI) given by IEEE to vendor. Last 6 values administered by the specific vendor
Address Resolution Protocol
maps network addresses to MAC addresses. Hello protocol enables network devices to learn the MAC addresses of other network devices
Network layer protocols that Imbed MAC addresses
IPX, DECNET, Phase IV, XNS
Network Layer Address
hierarchical address space. called virtual or logical addresses. Each Network Interface Must Be Assigned a Network Address for Each Protocol Supported
Flow Control
a function that prevents network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data. L4
three commonly used methods for handling network congestion
buffering - temporarily store bursts of excess data in memory until they can be processed.

transmitting source-quench messages - receiving device sends source-quench messages to request that the source reduce its current rate of data transmission 1 message per dropped packet

windowing - a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted
Error-checking schemes
determine whether transmitted data has become corrupt or otherwise damaged while traveling from the source to the destination.
cyclic redundancy check (CRC)
detects and discards corrupted data
Multiplexing
multiple data channels are combined into a single data or physical channel at the source (ie, different types of layer 7 data make it into 1 layer 3 packet.
OR
when data from different hosts is put on the same physical channel)
multiplexer
a physical layer device that combines multiple data streams into one or more output channels at the source and demultiplexes the channels into multiple data streams at the remote end.
Types of Multiplexing
time-division multiplexing (TDM), asynchronous time-division multiplexing (ATDM), frequency-division multiplexing (FDM), and statistical multiplexing.
Time Division Multiplexing
information from each data channel is allocated bandwidth based on preassigned time slots, regardless of whether there is data to transmit
Asychronous Time Division Multiplexing
ATDM, information from data channels is allocated bandwidth as needed by using dynamically assigned time slots. Basically, the same as TDM, but no slots wasted on hosts that have no data to send.
Frequency Division Multiplexing
information from each data channel is allocated bandwidth based on the signal frequency of the traffic
Statistical Multiplexing
bandwidth is dynamically allocated to any data channels that have information to transmit
nternational Organization for Standardization (ISO)
OSI reference model and the OSI protocol suite
American National Standards Institute (ANSI)
subsidiary of ISO, Fiber Distributed Data Interface (FDDI) and other communications standards
Electronic Industries Association (EIA)
electrical transmission standards. EIA/TIA-232 standard (formerly known as RS-232) which defines pinout for DCE/DTE
Institute of Electrical and Electronic Engineers (IEEE)
IEEE 802.3 and IEEE 802.5
International Telecommunication Union Telecommunication Standardization Sector (ITU-T)
developed X.25 and other communications standards.
Internet Activities Board (IAB)
set Internet policies through decisions and task forces. The IAB designates some Request For Comments (RFC) documents as Internet standards, including Transmission Control Protocol/Internet Protocol (TCP/IP) and the Simple Network Management Protocol (SNMP).
Local Area Network (LAN)
a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LAN protocols function at the lowest two layers of the OSI reference model
LAN Media Access
CSMA/CD & token passing
CSMA/CD
Carrier Sense Multiple Access/Collision Detection -- used in Ethernet networks
1. Listen, if no traffic
2. Transmit
3. Look for collision
4. If collision, random backoff
restart at 1.
Token Passing
Media Access used by Token Ring and Fiber Distributed Data Interface (FDDI). a special network frame called a token is passed around the network from device to device. When a device has data to send, it must wait until it has the token and then sends its data. When the data transmission is complete, the token is released so that other devices may use the network media. main advantage is it is easy to calculate max time until each device will get the token. Good for factories.
LAN Transmission Methods
unicast, multicast, and broadcast
LAN Topologies
bus, ring, star, and tree--logical architectures
LAN Bus Topology
a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations--used by Ethernet/IEEE 802.3 networks-including 100BaseT
LAN Ring Topology
a LAN architecture that consists of a series of devices connected to one another by unidirectional transmission links to form a single closed loop--used by Token Ring/IEEE 802.5 and FDDI
LAN Tree Topology
a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case
LAN Star topology
a LAN architecture in which the endpoints on a network are connected to a common central hub, or switch, by dedicated links. Logical bus and ring topologies are often implemented physically in a star topology
WAN
a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. They generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer
WAN L3 Protocols
X.25 PLP
WAN L2 Protocols
Frame Relay, HDLC, PPP,
Point-to-Point Links
single pre-established connection between 2 remote networks leased from a carrier (ie phone company). hardware is dedicated. more expensive than shared tech like Frame Relay.
Circuit Switching
only connected when needed. same idea as POTS, wherein one switch circuit "calls" the other end, establishes connection, sends data, disconnects. ISDN is an example.
Packet Switching
users share common carrier resources.
the increased efficiency gained from shared resources translates to much lower costs.
-employs virtual circuits
-ie ATM, Frame Relay, Switched Multimegabit Data Services (SMDS), X.25
WAN Virtual Circuit
logical circuit between 2 networks.
2 types - Switched Virtual Circuit and Permanent Virtual Circuit
Switched Virtual Circuit
virtual circuits that are dynamically established on demand and terminated when transmission is complete

three phases: circuit establishment, data transfer, and circuit termination

used in situations in which data transmission between devices is sporadic
Permanent Virtual Circuit
a permanently established virtual circuit that consists of one mode: data transfer

used in situations in which data transfer between devices is constant
WAN Switch
a multiport internetworking device used in carrier networks

typically switch such traffic as Frame Relay, X.25, and SMDS, and operate at the data link layer of the OSI reference model
Access Server
acts as a concentration point for dial-in and dial-out connections
Modem
a device that interprets digital and analog signals, enabling data to be transmitted over voice-grade telephone lines

MODulator/DEModulator
CSU/DSU
channel service unit/digital service unit

a digital-interface device used to connect a router to a digital circuit like a T1

also provides signal timing for communication between these devices
Switches & Bridges
Layer 2 Devices that break up LANs into different network segments (1 collision domain per port on switches)
store-and-forward switching
an entire frame must be received before it is forwarded--can add latency in cases where frame is large
Cut-through switching
allows the switch to begin forwarding the frame when enough of the frame is received to make a forwarding decision. unlike store-and-forward, this type of switching can result in corrupted frames being forwarded.
ATM Switch
provide high-speed switching and scalable bandwidths in the workgroup, the enterprise network backbone, and the wide area.
switch fixed size data units called "cells"
LAN Switch
used to interconnect multiple LAN segments.
provides dedicated, collision-free communication between network devices
designed to switch data frames at high speeds.
Packet Switching
Routing. Moving packets across the network towards their destination
Path Determination
using metrics to evaluate what path will be the best for a packet to travel
Routing Metric
a standard of measurement used to determine the best path for data to take through the network. (ie bandwidth, hop count, etc...)
Routing Tables
Information on best paths to destinations around the network as decided by routing algorithms. Contain
1. next hop for each destination network in the table
2. desirability/cost of each path
3. Info on which routing protocol reported the route
Switching algorithms
a host determines that it must send a packet to another host. Having acquired a router's address by some means, the source host sends a packet addressed specifically to a router's physical (Media Access Control [MAC]-layer) address, this time with the protocol (network layer) address of the destination host
Routing Algorithms:
Single Path vs Multipath
multipath algorithms can load balance, or keep more than 1 path to a destination network in the routing table
Routing Algorithms:
Flat vs hierarchical
flat routing algorithms consider all Routers to be equal. Hierarchical routing algorithms dedicate certain routers as 'backbone' this is beneficial because it supports areas, domains, etc...
Routing Algorithms:
Host-Intelligent vs Router-Intelligent
Host Intelligent = source routing = host knows where its going so just forward packet to next hop.

Router Intelligent = routers decide best path based on calculations
Routing Algorithms:
Link-State vs Distance Vector
link state = spf. every router sends its full link information out to all and from others knows all paths in the area, calculates its own best paths
faster to converge, more resource intensive, more scalable, more expensive

distance vector =Bellman-Ford algorithms. each router sends routing table to neighbors. "routing by rumor"
Network Management
a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks
Proxy ARP
Used in a situation in which a host believes its destination is on the same network when it is not. If the router knows the destination IP is on another network, it will respond to an ARP request for a remote host with its own MAC address. and then pass the data on once its received by the router
ARP
Address Resolution Protocol. mechanism on Ethernet to allow host to obtain layer 2 MAC address of a host given the layer 3 IP address.
1. Host sends a broadcast addressed to an IP address.
2. If the destination host is on the same subnet, it responds with its MAC address
3. Source host puts ethernet address/IP address mapping in the ARP table
Reverse ARP
Used to help a host get an IP. In reverse ARP a host broadcasts its Ethernet address and the DHCP server responds with an IP.
ISO Network Management Model
Performance Management
Configuration Management
Accounting Management
Fault Management
Security Management
ISO Network Management Model: Performance Management
Gather Data about network performance, Define thresholds, Alert if thresholds exceeded. (optimize)
ISO Network Management Model:
Configuration Management
Maintain a database of version information and configuration information for all devices on the network to assist in troubleshooting.
ISO Network Management Model: Accounting Management
Measure network utilization by users or groups--especially important when the costs of the network must be billed. Also, it can be used to see who is overusing or misusing the network resources. establishing quotas falls under accounting mgt.
ISO Network Management Model: Fault Management
detect, log, notify (and if possible fix) faults on the network. most network mgt resources reside here.determine symptoms, identify problem, identify solution, test, (plan and) deploy
ISO Network Management Model: Security Management
identify sensitive assets, control access, monitor usage,
Internet Protocol
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing information and some control information that enables packets to be routed. RFC 791

provides connectionless, best-effort delivery of datagrams through an internetwork

provides fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes
IP Packet Format
Version-Indicates the version of IP currently used.

IP Header Length (IHL)-Indicates the datagram header length in 32-bit words.

Type-of-Service-Specifies how an upper-layer protocol would like a current datagram to be handled, and assigns datagrams various levels of importance.

Total Length-Specifies the length, in bytes, of the entire IP packet, including the data and header.

Identification-Contains an integer that identifies the current datagram. This field is used to help piece together datagram fragments.

Flags-Consists of a 3-bit field of which the two low-order (least-significant) bits control fragmentation. The low-order bit specifies whether the packet can be fragmented. The middle bit specifies whether the packet is the last fragment in a series of fragmented packets. The third or high-order bit is not used.

Fragment Offset-Indicates the position of the fragment's data relative to the beginning of the data in the original datagram, which allows the destination IP process to properly reconstruct the original datagram.

Time-to-Live-Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly.

Protocol-Indicates which upper-layer protocol receives incoming packets after IP processing is complete.

Header Checksum-Helps ensure IP header integrity.

Source Address-Specifies the sending node.

Destination Address-Specifies the receiving node.

Options-Allows IP to support various options, such as security.

Data-Contains upper-layer information.
distance vector vs link state
distance vector rp's broadcast their full routing table to their directly connected neighbors. in distance vector rp's.information on all known links are sent on adjacency formation and then only updates to links are sent. but updates are only sent to neighbors with full adjacency. link state routers have to do all of their own calculations, so more resource intensive.